Computer Science ›› 2015, Vol. 42 ›› Issue (3): 136-139.doi: 10.11896/j.issn.1002-137X.2015.03.028

Previous Articles     Next Articles

Research on Fuzzy Search over Encrypted Cloud Data Based on Keywords

FANG Zhong-jin, ZHOU Shu and XIA Zhi-hua   

  • Online:2018-11-14 Published:2018-11-14

Abstract: With the increasing amount of data generated by individuals and business users,the advantages of cloud sto-rage such as lower price and flexible use of storage space are obvious.As a large amount of data are outsourced to the cloud server,encryption methods are used to achieve protection and limitations of sensitive data generally.It makes traditional search scheme based on plaintext no longer applicable.How to achieve efficient file search on the basis of privacy protection is the primary consideration.On the basis of the existing encrypted data search schemes,Chinese characteristics of homophone and polysemy were analyzed,and synonyms of keyword were constructed using Chinese and English,and the sets were constructed respectively.Fuzzy search scheme over encrypted cloud data based on keywords was proposed.Search of Chinese fuzzy pinyin and synonyms is achieved,and the private key is protected by pseudo-random function.High security,good practicability and high searching success rate of the system were verified by security analysis and system experiment.

Key words: Cloud storage,Fuzzy search,Keywords,Synonyms,Searchable encryption

[1] Song D,Wagner D,Perrig A.Practical Techniques for Searches on Encrypted Data[C]∥Proceedings of IEEE Symposium on Security and Privacy.2000:44-55
[2] Goh E J.Secure Indexes.Cryptology ePrint Archive,Report2003/216.http://eprint.iacr.org/,2003
[3] Chow R,Golle P,Jakobsson M,et al.Controlling Data in theCloud:Outsourcing Computation without Outsourcing Control[C]∥Proceedings of ACM Workshop on Cloud Computing Security (CCSW’09).New York,2009:85-90
[4] Boneh D,Crescenzo G D,Ostrovsky R,et al.Public Key Encryption with Keyword Search[C]∥Proceedings of International Conference on Theory and Applications of Cryptographic Techniques (Eurocrypt’04).Interlaken,Switzerland,Vol.3027,2004:506-522
[5] 李春艳,张学杰.基于基准测试的高性能计算云研究[J].计算机科学,2013,40(12):23-30
[6] Li J,Wang Q,Wang C,et al.Fuzzy keyword search over en-crypted data in cloud computing[C]∥Proc.of IEEE INFOCOM,Mini-Conference.2010:441-445
[7] Hwang Y H,Lee P J.Public Key Encryption with Conjunctive Keyword Search and Its Extension to a Multi-user System[C]∥Proceedings of International Conference on Pairing-Based Cryptography (Pairing’07).2007:2-22
[8] Ballard L,Kamara S,Monrose F.Achieving Efficient Conjunctive Keyword Searches over Encrypted Data[C]∥Proceedings of International Conference on Information and Communications Security (ICICS’05).Vol.3783,2005:414-426
[9] Boneh D,Waters B.Conjunctive,Subset,and Range Queries on Encrypted Data[C]∥Proceedings of TCC’07.2007:535-554
[10] 林闯,苏文博,孟坤,等.云计算安全:架构、机制与模型评价[J].计算机学报,2013,36(9):1765-1784
[11] Li J,Wang Q,Wang C,et al.Fuzzy Keyword Search over Encrypted Data in Cloud Computing[C]∥IEEE INFOCOM 2010 Mini-Conference.San Diego,CA,March 2010
[12] Cao N,Wang C,Li M,et al.Privacy-Preserving Multi-keyword Ranked Search over Encrypted Cloud Data[C]∥Proceedings of IEEE INFOCOM 2011.2011:829-837
[13] Hore B,Mehrotra S,Canim M,et al.Secure multidimensionalrange queries over outsourced data[J].The VLDB Journal, 2012(21):333-358
[14] 冯登国,张敏,张妍,等.云计算安全研究[J].软件学报,2011,22(1):71-83
[15] Wang Peng,Ravishankar C V.Secure and Efficient Range Queries on Outsourced Databases Using R-trees[C]∥ICDE Conference.2013:314-325
[16] Curtmola R,Garay J A,Kamara S,et al.Searchable symmetric encryption:improved definitions and efficient constructions [C]∥Proc.of ACM CCS.2006:79-88
[17] Golle P,Staddon J,Waters B.Secure Conjunctive Keyword Search over Encrypted Data[C]∥Proceedings of Applied Cryptography and Network Security Conference (ACNS’04).2004:31-45

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!