Fuzzy Dynamical Searchable Encryption Scheme Based on Balanced Binary Tree

被引:0
作者
Hu, Xiang [1 ]
Qin, Baodong [1 ]
机构
[1] Xian Univ Posts & Telecommun, Natl Engn Res Ctr Secured Wireless, Xian 710121, Peoples R China
来源
2024 6TH INTERNATIONAL CONFERENCE ON NATURAL LANGUAGE PROCESSING, ICNLP 2024 | 2024年
基金
中国国家自然科学基金;
关键词
Searchable encryption; fuzzy search; dynamic update; balanced binary tree;
D O I
10.1109/ICNLP60986.2024.10692818
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
In recent years, the issues of data security and privacy in the field of cloud computing have garnered increasing attention. To prevent data leakage, data owners choose to encrypt their data documents before uploading them. However, effectively retrieving such data has become a new challenge. In this paper, we propose an innovative dynamic searchable encryption scheme that supports fuzzy search. Our scheme employs a balanced binary tree as the index, storing document identifiers with the same keywords in leaf nodes and generating Bloom filters for them. Additionally, we introduce random values during the index generation process, thereby enhancing the security of the index. Leveraging the unique structure of this tree-based index, we have successfully reduced the time complexity of search operations, lowering time costs, and enabling dynamic updates. Finally, through theoretical analysis and experimental validation, we demonstrate the outstanding efficiency of our scheme in achieving retrieval and a lower time complexity compared to other schemes.
引用
收藏
页码:277 / 282
页数:6
相关论文
共 21 条
  • [1] SPACE/TIME TRADE/OFFS IN HASH CODING WITH ALLOWABLE ERRORS
    BLOOM, BH
    [J]. COMMUNICATIONS OF THE ACM, 1970, 13 (07) : 422 - &
  • [2] EliMFS: Achieving Efficient, Leakage-Resilient, and Multi-Keyword Fuzzy Search on Encrypted Cloud Data
    Chen, Jing
    He, Kun
    Deng, Lan
    Yuan, Quan
    Du, Ruiying
    Xiang, Yang
    Wu, Jie
    [J]. IEEE TRANSACTIONS ON SERVICES COMPUTING, 2020, 13 (06) : 1072 - 1085
  • [3] Delfs H., 2007, Introduction to cryptography: principles and applications
  • [4] Toward Efficient Multi-Keyword Fuzzy Search Over Encrypted Outsourced Data With Accuracy Improvement
    Fu, Zhangjie
    Wu, Xinle
    Guan, Chaowen
    Sun, Xingming
    Ren, Kui
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2016, 11 (12) : 2706 - 2716
  • [5] Feasibility and Finite Convergence Analysis for Accurate On-Line ν-Support Vector Machine
    Gu, Bin
    Sheng, Victor S.
    [J]. IEEE TRANSACTIONS ON NEURAL NETWORKS AND LEARNING SYSTEMS, 2013, 24 (08) : 1304 - 1315
  • [6] Kamara S., 2013, FC 2013, V7859, P258, DOI [10.1007/978-3-642-39884-122, DOI 10.1007/978-3-642-39884-1_22]
  • [7] Efficient Similarity Search over Encrypted Data
    Kuzu, Mehmet
    Islam, Mohammad Saiful
    Kantarcioglu, Murat
    [J]. 2012 IEEE 28TH INTERNATIONAL CONFERENCE ON DATA ENGINEERING (ICDE), 2012, : 1156 - 1167
  • [8] Li J., 2009, IACR CRYPTOL EPRINT, V2009
  • [9] Li J, 2009, computer science & information systems, DOI [10.1109/INFCOM.2010.5462196, DOI 10.1109/INFCOM.2010.5462196]
  • [10] Dynamic Searchable Encryption via Blind Storage
    Naveed, Muhammad
    Prabhakaran, Manoj
    Gunter, Carl A.
    [J]. 2014 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP 2014), 2014, : 639 - 654