Summary of the invention
The purpose of the present invention is to provide one kind can search for symmetric encryption method, device and equipment, with improve keyword with
The safety of corresponding relationship between ciphertext, so that it is guaranteed that the safety of data stored in cloud server.
To achieve the above object, the embodiment of the invention provides following technical solutions:
One kind can search for symmetric encryption method, is applied to proxy server, which comprises
Receive the retrieval request that Cloud Server is sent;The trapdoor letter that data consumer sends is carried in the retrieval request
Breath, the trap door information are generated using key and keyword;
The target ciphertext text searched comprising the keyword is concentrated from cryptograph files according to the trap door information and concordance list
Part;It include the corresponding relationship between different keywords and different cryptograph files in the concordance list;
The target cryptograph files are sent to the data consumer, so that the data consumer passes through the key
The target cryptograph files are decrypted.
Wherein, before the retrieval request for receiving Cloud Server transmission, further includes:
Receive data owner send the cryptograph files collection encrypted by the key, and with the cryptograph files collection
Corresponding concordance list;
The cryptograph files collection and the concordance list are stored, and the cryptograph files collection and the concordance list are uploaded to institute
State cloud server.
Wherein, the cryptograph files collection and the concordance list are sent to the cloud server, comprising:
Secondary encryption is carried out to the cryptograph files collection, and will be on secondary encrypted cryptograph files collection and the concordance list
Reach Cloud Server.
One kind can search for symmetric cryptography device, is applied to proxy server, and described device includes:
Retrieval request receiving module, for receiving the retrieval request of Cloud Server transmission;Number is carried in the retrieval request
According to the trap door information that user sends, the trap door information is generated using key and keyword;
Cryptograph files collection retrieval module, for including from cryptograph files concentration lookup according to the trap door information and concordance list
The target cryptograph files of the keyword;It include the corresponding pass between different keywords and different cryptograph files in the concordance list
System;
Cryptograph files collection sending module, for the target cryptograph files to be sent to the data consumer, so that institute
Data consumer is stated to decrypt by target cryptograph files described in the key pair.
Wherein, this programme further include:
Receiving module, the cryptograph files collection encrypted by the key that owner sends for receiving data, Yi Jiyu
The corresponding concordance list of the cryptograph files collection;
Memory module, for storing the cryptograph files collection and the concordance list;
Uploading module, for the cryptograph files collection and the concordance list to be uploaded to the cloud server.
Wherein, the uploading module includes:
Secondary encryption unit, for carrying out secondary encryption to the cryptograph files collection;
Uploading unit, for secondary encrypted cryptograph files collection and the concordance list to be uploaded to the cloud service
Device.
One kind can search for symmetric encryption system, comprising:
Cloud Server, for sending retrieval request to proxy server;Data consumer's hair is carried in the retrieval request
The trap door information sent, the trap door information are generated using key and keyword;
The proxy server, for receiving the retrieval request of Cloud Server transmission;According to the trap door information and index
Table is concentrated from cryptograph files and searches the target cryptograph files comprising the keyword;In the concordance list include different keywords with
Corresponding relationship between different cryptograph files;The target cryptograph files are sent to the data consumer, so that the number
It is decrypted according to user by target cryptograph files described in the key pair.
Wherein, the proxy server is also used to:
Receive data owner send the cryptograph files collection encrypted by the key, and with the cryptograph files collection
Corresponding concordance list;The cryptograph files collection and the concordance list are stored, and will be on the cryptograph files collection and the concordance list
Reach the cloud server.
Wherein, the agency service implement body carries out secondary encryption to the cryptograph files collection, and will be secondary encrypted
Cryptograph files collection and the concordance list are uploaded to Cloud Server.
One kind can search for symmetric cryptography equipment, comprising:
Memory, for storing computer program;
Processor realizes above-mentioned the step of can search for symmetric encryption method when for executing the computer program.
By above scheme it is found that one kind provided in an embodiment of the present invention, which can search for symmetric encryption method, is applied to agency's clothes
Business device, which comprises receive the retrieval request that Cloud Server is sent;Data consumer is carried in the retrieval request to send
Trap door information, the trap door information is generated using key and keyword;According to the trap door information and concordance list from ciphertext
The target cryptograph files comprising the keyword are searched in file set;It include different keywords and different ciphertexts in the concordance list
Corresponding relationship between file;The target cryptograph files are sent to the data consumer, so that the data consumer
It is decrypted by target cryptograph files described in the key pair.
As it can be seen that in the present solution, putting in symmetric cryptography the step of retrieval according to keyword to ciphertext will be can search for
Onto the proxy server between data owner and cloud server end, realize the work that will be calculated and search for from Cloud Server
Unloading and migration, so that cloud service provider is not known keyword and the corresponding relationship of ciphertext.After data owner's encryption simultaneously
Cryptograph files collection carried out secondary encryption further through proxy server during being uploaded to Cloud Server, even if attacker
Data beyond the clouds are stored come decrypted user by technological means, what is obtained after decryption is also encryption file.To ensure that number
According to safety.The invention also discloses one kind can search for symmetric cryptography device and equipment, is equally able to achieve above-mentioned technical effect.
Specific embodiment
Following will be combined with the drawings in the embodiments of the present invention, and technical solution in the embodiment of the present invention carries out clear, complete
Site preparation description, it is clear that described embodiments are only a part of the embodiments of the present invention, instead of all the embodiments.It is based on
Embodiment in the present invention, it is obtained by those of ordinary skill in the art without making creative efforts every other
Embodiment shall fall within the protection scope of the present invention.
The embodiment of the invention discloses one kind can search for symmetric encryption method, device and equipment, with improve keyword with it is close
The safety of corresponding relationship between text, so that it is guaranteed that the safety of data stored in cloud server.
Referring to Fig. 1, one kind provided in an embodiment of the present invention can search for symmetric encryption method, be applied to proxy server, institute
The method of stating includes:
S101, the retrieval request that Cloud Server is sent is received;Falling into for data consumer's transmission is carried in the retrieval request
Door information, the trap door information are generated using key and keyword;
It should be noted that this programme is before receiving the retrieval request that Cloud Server is sent, further includes:
Receive data owner send the cryptograph files collection encrypted by the key, and with the cryptograph files collection
Corresponding concordance list;The cryptograph files collection and the concordance list are stored, and will be on the cryptograph files collection and the concordance list
Reach the cloud server.It is wherein, described that the cryptograph files collection and the concordance list are sent to the cloud server,
It include: secondary encryption to be carried out to the cryptograph files collection, and secondary encrypted cryptograph files collection and the concordance list are uploaded
To Cloud Server.
Specifically, in the present embodiment, aiming at the problem that can search for mode, the safety etc. of symmetric cryptography, in original
Some data owners, Cloud Server between data consumer, increase a proxy server;Referring to fig. 2, Fig. 2 is the present invention
A kind of general frame schematic diagram can search for symmetric encryption method disclosed in embodiment;It can be seen that this programme by the figure to exist
It can search in symmetric cryptography, increase a proxy server between data owner and Cloud Server, data owner extracts
Key word information in clear text file indexes to establish, the established cryptograph files collection for indexing and passing through key encryption and generate
It is sent to proxy server.Specifically, the encryption of clear text file collection is mainly included the following steps:
1.1, key generates: K=KeyGen (1λ);It is executed by data owner, wherein λ is security parameter, passes through key
Generating algorithm generates key K according to security parameter λ.
1.2, file primary encryption: (I, C)=Encrypt (K, D);The key K that data owner will generate in step 1.1
To clear text file set D=(D1,D2,...,Dn) encrypted, the file index I and cryptograph files collection C after output encryption
=(C1,C2,...,Cn) and be uploaded to proxy server.
Proxy server in this programme using carry domestic cryptographic algorithm can computing module, by the firmware of safety and
Software makes proxy server become trusted servers.After proxy server receives the encryption file of data owner, agency's clothes
Business device carries out secondary encryption to index and cryptograph files collection and is uploaded to Cloud Server again, and proxy server not external disclosure from
Oneself key.Even if attacker is decrypted by technological means obtains the data of user's storage beyond the clouds, after attacker's decryption
What is arrived is also encryption file, greatly protects the safety of data.It specifically, mainly include such as to the encryption of cryptograph files collection
Lower step:
1.3, file secondary encryption (I', C')=Encrypt (K', C): proxy server is by Encryption Algorithm to step
The cryptograph files collection uploaded in 1.2 is uploaded to Cloud Server after carrying out secondary encryption again, and proxy server is in ciphering process
In key K' only oneself retain, not external disclosure.
It is understood that when data consumer wants to include the file of keyword from Cloud Server retrieval, it can be from data
Owner obtains key, which is the key encrypted to clear text file;Trapdoor letter is generated by the key and keyword
Breath, is sent to Cloud Server for the trap door information.After Cloud Server obtains the request of data consumer, inquiry inspection can't be executed
Rope operation, but the trap door information that data consumer submits is forwarded to proxy server, specifically, the generation of trapdoor is main
Include the following steps:
1.4, trapdoor generates TW=Trapdoor (K, W): the algorithm is mainly executed by data consumer, in step 1.1
Key K and data consumer need the keyword W that inquires as input, generate the corresponding trapdoor TW of keyword W.
S102, concentrate target of the lookup comprising the keyword close from cryptograph files according to the trap door information and concordance list
File;It include the corresponding relationship between different keywords and different cryptograph files in the concordance list;
Specifically, due to the concordance list and cryptograph files that originally just store data owner's upload in proxy server
Collection, therefore, proxy server can be according to the trap door information of data consumer and the concordance list of data owner to cryptograph files
It scans for, searching the cryptograph files comprising keyword is the target cryptograph files in the present embodiment, specifically, ciphertext
The retrieval of file mainly includes the following steps:
1.5, query and search C (W)=Search (I, TW): data consumer submits to the trap door information TW of step 1.4
Cloud Server, and initiate query and search request to Cloud Server, Cloud Server by trap door information that data consumer submits with ask
It asks and is transmitted to proxy server, the index I of file in the trapdoor TW and step 1.2 that proxy server is generated according to step 1.4
The file comprising keyword W, the file set C (W) of output and input Keywords matching are scanned on file set C.
As can be seen that this programme will be put on the proxy server stage that ciphertext scans for according to keyword, generation
Reason server realizes the migration calculated with search mission come the work for calculating and searching for.So that cloud service provider does not know pass
Keyword and the corresponding relationship of ciphertext, realize and quickly and accurately find required file by can search for symmetric encryption method
On the basis of, and can guarantee the safety problem of corresponding relationship between keyword and ciphertext, to guarantee the safety of user data.
S103, the target cryptograph files are sent to the data consumer, so that the data consumer passes through institute
State the decryption of target cryptograph files described in key pair.
After retrieving the target cryptograph files comprising keyword through the above steps, need to send the target cryptograph files
To data consumer, data consumer is decrypted to obtain clear text file according to key pair target cryptograph files.Specifically, close
The decrypting process of file mainly includes the following steps:
1.6, file decryption: Di=Decrypt (K, Ci);Data consumer is using the key K of step 1.1 to cryptograph files
Ci(Ci∈ C) it is decrypted, generate clear text file Di(Di∈D)。
Referring to Fig. 3, Fig. 3 is a kind of overall flow signal that can search for symmetric encryption method disclosed by the embodiments of the present invention
Figure;Data owner is locally encrypting the file that will be uploaded using encryption key, and is formed with ciphertext keyword set
Concordance list upload proxy server together.Proxy server uploads to Cloud Server after carrying out secondary encryption to it again.By
The data consumer of data owner's authorization generates trap door information using key pair keyword to be checked, is sent to cloud service
Device.Cloud Server can't execute query and search operation, but the request that the data consumer is initiated is believed to relevant trapdoor
Breath transfers to proxy server to handle.On trap door information that proxy server is submitted according to data consumer and combined data owner
The concordance list for passing in proxy server each upper transmitting file is retrieved, return include trapdoor keyword cryptograph files.Number
It is decrypted according to user using the cryptograph files that decruption key returns to proxy server.
Through overtesting, this programme compares the symmetric cryptography that can search under existing cloud computing environment, and proxy server is to ciphertext
File carry out it is secondary encryption and on proxy server according to keyword to ciphertext carry out retrieval than on Cloud Server execute should
Operational safety is higher.
That is, this programme increases a proxy server between Cloud Server and data owner, and act on behalf of clothes
Business device is mainly situated in client, i.e. this end of data owner.Ciphertext is inquired according to the concordance list that keyword generates
Retrieval, realizes the unloading and migration of calculating task.In it can search for symmetric cryptography, ciphertext of the proxy server to data owner
File and index upload to Cloud Server after carrying out secondary encryption again.By it is this by can search in symmetric cryptography according to key
Word scans for being put on proxy server without the work for calculating and retrieving on Cloud Server to ciphertext, takes cloud
Business provider does not know keyword and the corresponding relationship of ciphertext.In view of beyond the clouds clothes may be acted on behalf of by various security attacks
Business device is by the encryption to encryption file secondary, the still encryption file for obtaining attacker.Better assure that the peace of data
Quan Xingyu privacy.
The symmetric cryptography device provided in an embodiment of the present invention that can search for is introduced below, it is described below to can search for pair
Claim encryption device can be cross-referenced with the above-described symmetric encryption method that can search for.
Referring to fig. 4, one kind provided in an embodiment of the present invention can search for symmetric cryptography device, be applied to proxy server, institute
Stating device includes:
Retrieval request receiving module 110, for receiving the retrieval request of Cloud Server transmission;It is carried in the retrieval request
The trap door information that data consumer sends, the trap door information are generated using key and keyword;
Cryptograph files collection retrieval module 120 is searched for being concentrated according to the trap door information and concordance list from cryptograph files
Target cryptograph files comprising the keyword;It include pair between different keywords and different cryptograph files in the concordance list
It should be related to;
Cryptograph files collection sending module 130, for the target cryptograph files to be sent to the data consumer, so that
The data consumer is decrypted by target cryptograph files described in the key pair.
Referring to Fig. 5, another kind provided in an embodiment of the present invention can search for symmetric cryptography apparatus structure schematic diagram, in this implementation
In example, which includes:
Retrieval request receiving module 110, for receiving the retrieval request of Cloud Server transmission;It is carried in the retrieval request
The trap door information that data consumer sends, the trap door information are generated using key and keyword;
Cryptograph files collection retrieval module 120 is searched for being concentrated according to the trap door information and concordance list from cryptograph files
Target cryptograph files comprising the keyword;It include pair between different keywords and different cryptograph files in the concordance list
It should be related to;
Cryptograph files collection sending module 130, for the target cryptograph files to be sent to the data consumer, so that
The data consumer is decrypted by target cryptograph files described in the key pair.
Receiving module 140, the cryptograph files collection encrypted by the key that owner sends for receiving data, and
Concordance list corresponding with the cryptograph files collection;
Memory module 150, for storing the cryptograph files collection and the concordance list;
Uploading module 160, for the cryptograph files collection and the concordance list to be uploaded to the cloud server;Its
In, uploading module 160 includes: secondary encryption unit 161, for carrying out secondary encryption to the cryptograph files collection;
Uploading unit 162 takes for secondary encrypted cryptograph files collection and the concordance list to be uploaded to the cloud
Business device.
The symmetric encryption system provided in an embodiment of the present invention that can search for is introduced below, it is described below to can search for pair
Claim encryption system can be cross-referenced with the above-described symmetric encryption method that can search for.
One kind provided in an embodiment of the present invention can search for symmetric encryption system, comprising:
Cloud Server, for sending retrieval request to proxy server;Data consumer's hair is carried in the retrieval request
The trap door information sent, the trap door information are generated using key and keyword;
The proxy server, for receiving the retrieval request of Cloud Server transmission;According to the trap door information and index
Table is concentrated from cryptograph files and searches the target cryptograph files comprising the keyword;In the concordance list include different keywords with
Corresponding relationship between different cryptograph files;The target cryptograph files are sent to the data consumer, so that the number
It is decrypted according to user by target cryptograph files described in the key pair.
Wherein, the proxy server is also used to:
Receive data owner send the cryptograph files collection encrypted by the key, and with the cryptograph files collection
Corresponding concordance list;The cryptograph files collection and the concordance list are stored, and will be on the cryptograph files collection and the concordance list
Reach the cloud server.
Wherein, the proxy server is specifically used for carrying out the cryptograph files collection secondary encryption, and by secondary encryption
Cryptograph files collection and the concordance list afterwards is uploaded to Cloud Server.
The embodiment of the invention also discloses one kind can search for symmetric cryptography equipment, comprising:
Memory, for storing computer program;
Processor, realize when for executing the computer program can search for symmetrically described in above-mentioned any means embodiment
The step of encryption method.
The embodiment of the invention also discloses a kind of computer readable storage medium, deposited on the computer readable storage medium
Computer program is contained, the computer program is realized when being executed by processor can search for described in above-mentioned any means embodiment
The step of symmetric encryption method.
Wherein, the storage medium may include: USB flash disk, mobile hard disk, read-only memory (Read-Only Memory,
ROM), random access memory (Random Access Memory, RAM), magnetic or disk etc. are various can store program
The medium of code.
To sum up, this of this programme proposition can search for symmetric cryptography mode, key of the data owner to source file
Word extracts generation concordance list, and encrypting plaintext file generated cryptograph files collection, then uploads proxy server.Agency service
Device is uploaded to Cloud Server after carrying out secondary encryption to concordance list, cryptograph files collection.Data consumer's retrieval file, passes through first
Exit passageway obtains the key from data owner and generates trap door information.Cloud Server receives trap door information and takes to agency
Device of being engaged in issues query and search request and carries out relevant search, and proxy server is simultaneously sent to number for the search result after the operation is executed
According to user.After data consumer gets the search result of proxy server, file destination is obtained with key decryption to it.
Namely: this programme will can search for being put into data to the process that ciphertext is retrieved according to keyword in symmetric cryptography
On proxy server between user and cloud server end, realizing will be calculated and the work of search is from the unloading on Cloud Server
With migration, cloud service provider is made not know keyword and the corresponding relationship of ciphertext, to ensure that the safety of data.Into
And proxy server is by the encryption to encryption file secondary, make that attacker obtains or encryption file.It better assures that
The safety of data and privacy.
Each embodiment in this specification is described in a progressive manner, the highlights of each of the examples are with other
The difference of embodiment, the same or similar parts in each embodiment may refer to each other.
The foregoing description of the disclosed embodiments enables those skilled in the art to implement or use the present invention.
Various modifications to these embodiments will be readily apparent to those skilled in the art, as defined herein
General Principle can be realized in other embodiments without departing from the spirit or scope of the present invention.Therefore, of the invention
It is not intended to be limited to the embodiments shown herein, and is to fit to and the principles and novel features disclosed herein phase one
The widest scope of cause.