Computer Science ›› 2017, Vol. 44 ›› Issue (5): 146-152.doi: 10.11896/j.issn.1002-137X.2017.05.026

Previous Articles     Next Articles

Fuzzy Multi-keyword Retrieval Scheme over Encrypted Data in Cloud Computing

HE Heng, XIA Wei, ZHANG Ji, JIN Yu and LI Peng   

  • Online:2018-11-13 Published:2018-11-13

Abstract: Nowadays more and more enterprise and individual users store a large amount of data in the cloud.To protect data privacy,important data has to be encrypted before being stored in the cloud,which brings a severe challenge to the retrieval of data.Traditional retrieval schemes based on plaintext have not been applicable,and existing retrieval schemes based on ciphertext have many shortcomings,some of which do not support fuzzy search or multi-keyword search, poor efficiency or large space overhead,or do not return ranking results.Therefore,researching secure and efficient retrieval scheme on ciphertext is of great significance.A new fuzzy multi-keyword retrieval scheme over encrypted data in cloud computing was proposed,which can retrieve the ciphertext containing multiple keywords from cloud ser-ver,support fuzzy keyword search,and will not leak any plaintext information of data and retrieval to cloud server and other attackers.In the scheme,counting bloom filter and MinHash algorithm are used to construct index vectors and query vectors,which makes the process of building index and querying more efficient,and the ranking results more accurate.The security analysis and performance evaluation show that our scheme has high security,reliability,retrieval efficiency and accuracy.

Key words: Cloud computing,Fuzzy search,Multi-keyword search,Encrypted data,Secure index

[1] ARMBRUST M,FOX A,GRIFFITH R,et al.Above the C-louds:A Berkeley View of Cloud Computing[J].Communications of the ACM,2010,53(4):50-58.
[2] LI J,WANG Q,WANG C,et al.Fuzzy Keyword Search over Encrypted data in Cloud Computing [C]∥Proceedings of IEEE INFOCOM,Mini-Conference.San Diego:IEEE Press,2010:441-445.
[3] XIANG F,LIU C Y,FANG B X,et al.Research on Ciphertext Search for the Cloud Environment[J].Journal on Communications,2013,34(7):143-153.(in Chinese) 项菲,刘川意,方滨兴,等.云计算环境下密文搜索算法的研究 [J].通信学报,2013,34(7):143-153.
[4] SONG D,WAGNER D,PERRIG A.Practical Techniques forSearches on Encrypted data[C]∥Proceedings of IEEE Sympo-sium on Security and Privacy.Washington:IEEE Computer So-ciety Press,2000:44-55.
[5] CURTMOLA R,GARAY J,KAMARA S,et al.SearchableSymmetric Encryption:Improved Definitions and Efficient Constructions[J].Journal of Computer Security,2011,19(5):895-934.
[6] BONEH D,CRESCENZO GIOVANNI D,OSTROVSKY R,et al.Public Key Encryption with Keyword Search [C]∥Procee-dings of International Conference on Theory and Application of Cryptographic Techniques.Springer,Berlin,Heidelberg,2004:506-522.
[7] WANG C,CAO N,LI J,et al.Secure Ranked Keyword Search over Encrypted Cloud Data [C]∥Proceedings of the IEEE 30th International Conference on Distributed Computing Systems.Genova:IEEE Computer Society,2010:253-262.
[8] CAO N,WANG C,LI M,et al.Privacy-Preserving Multi-Keyword Ranked Search over Encrypted Cloud Data [C]∥IEEE Transactions on Parallel and Distributed Systems.Atlanta:IEEE Computer Society,2011:829-837.
[9] WONG W K,CHEUNG W L,KAO B,et al.Secure kNN Computation on Encrypted Databases [C]∥Proceedings of the ACM SIGMOD International Conference on Management of Data.New York:ACM,2009:139-152.
[10] LI R X,XU Z Y,KANG W S,et al.Efficient Multi-keyword Ranked Query over Encrypted data in Cloud Computing [J].Future Generation Computer Systems,2014,30(1):179-190.
[11] FENG G L,TAN L.Multi-attribute Ranked Keyword Searchover Encrypted Cloud data [J].Computer Science,2013,40(11):131-136.(in Chinese) 冯贵兰,谭良.云环境中基于多属性排序的密文检索方案[J].计算机科学,2013,40(11):131-136.
[12] LIU C,ZHU L H,LI L Y J,et al.Fuzzy Keyword Search on Encrypted Cloud Storage Data with Small Index [C]∥Proceedings of IEEE International Conference on Cloud Computing and Intelligence Systems.Beijing:Institute of Electrical and Electro-nics Engineers,2011:269-273.
[13] WANG B,YU S C,LOU W J,et al.Privacy-preserving Multi-keyword Fuzzy Search over Encrypted Data in the Cloud [C]∥Proceedings of IEEE INFOCOM.Toronto:Institute of Electrical and Electronics Engineers,2014:2112-2120.
[14] BLOOM BURTON H.Space/time Trade-offs in hash Codingwith Allowable Errors [J].Communications of the Acm,2010,13(7):422-426.
[15] CHARIKAR M.Similarity Estimation Techniques from Rounding Algorithms [C]∥Proceedings of the Thirty-fourth Annual ACM Symposium on Theory of Computing.New York:ACM,2002:380-388.
[16] FAN L,CAO P,ALMEIDA J,et al.Summary Cache:a Scalable Wide-area Web Cache Sharing Protocol [J].IEEE/ACM Tran-sactions on Networking,2000,8(3):281-293.
[17] INDYK P,MOTWANI R.Approximate Nearest Neighbors:towards Removing the Curse of Dimensionality [C]∥Proceedings of the Thirtieth Annual ACM Symposium on Theory of Computing.New York:ACM,1998:604-613.
[18] SUN W H,LOU W J,HOU T,et al.Privacy-Preserving Keyword Search over Encrypted Data in Cloud Computing [C]∥Secure Cloud Computing.Amsterdam:Springer,2014:189-212.
[19] Enron email dataset [EB/OL].(2015-03-12)

No related articles found!
Full text



[1] LEI Li-hui and WANG Jing. Parallelization of LTL Model Checking Based on Possibility Measure[J]. Computer Science, 2018, 45(4): 71 -75, 88 .
[2] XIA Qing-xun and ZHUANG Yi. Remote Attestation Mechanism Based on Locality Principle[J]. Computer Science, 2018, 45(4): 148 -151, 162 .
[3] LI Bai-shen, LI Ling-zhi, SUN Yong and ZHU Yan-qin. Intranet Defense Algorithm Based on Pseudo Boosting Decision Tree[J]. Computer Science, 2018, 45(4): 157 -162 .
[4] WANG Huan, ZHANG Yun-feng and ZHANG Yan. Rapid Decision Method for Repairing Sequence Based on CFDs[J]. Computer Science, 2018, 45(3): 311 -316 .
[5] SUN Qi, JIN Yan, HE Kun and XU Ling-xuan. Hybrid Evolutionary Algorithm for Solving Mixed Capacitated General Routing Problem[J]. Computer Science, 2018, 45(4): 76 -82 .
[6] ZHANG Jia-nan and XIAO Ming-yu. Approximation Algorithm for Weighted Mixed Domination Problem[J]. Computer Science, 2018, 45(4): 83 -88 .
[7] WU Jian-hui, HUANG Zhong-xiang, LI Wu, WU Jian-hui, PENG Xin and ZHANG Sheng. Robustness Optimization of Sequence Decision in Urban Road Construction[J]. Computer Science, 2018, 45(4): 89 -93 .
[8] LIU Qin. Study on Data Quality Based on Constraint in Computer Forensics[J]. Computer Science, 2018, 45(4): 169 -172 .
[9] ZHONG Fei and YANG Bin. License Plate Detection Based on Principal Component Analysis Network[J]. Computer Science, 2018, 45(3): 268 -273 .
[10] SHI Wen-jun, WU Ji-gang and LUO Yu-chun. Fast and Efficient Scheduling Algorithms for Mobile Cloud Offloading[J]. Computer Science, 2018, 45(4): 94 -99, 116 .