Verifiable Fuzzy Multi-Keyword Search Over Encrypted Data With Adaptive Security

被引:28
|
作者
Tong, Qiuyun [1 ,2 ]
Miao, Yinbin [1 ,2 ]
Weng, Jian [3 ]
Liu, Ximeng [4 ]
Choo, Kim-Kwang Raymond [5 ]
Deng, Robert H. H. [6 ]
机构
[1] Xidian Univ, Sch Cyber Engn, Xian 710071, Shaanxi, Peoples R China
[2] Key Lab Blockchain & Cyberspace Governance Zhejian, Hangzhou 310007, Zhejiang, Peoples R China
[3] Jinan Univ, Coll Cyber Secur, Guangzhou 510632, Guangdong, Peoples R China
[4] Fuzhou Univ, Sch Math & Comp Sci, Key Lab Informat Secur Network Syst, Fuzhou 350108, Fujian, Peoples R China
[5] Univ Texas San Antonio, Dept Informat Syst & Cyber Secur, San Antonio, TX 78249 USA
[6] Singapore Management Univ, Sch Informat Syst, Singapore 178902, Singapore
基金
中国国家自然科学基金;
关键词
Adaptive security; fuzzy multi-keyword search; result verification; symmetric searchable encryption; PRIVACY;
D O I
10.1109/TKDE.2022.3152033
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
To ensure the security of outsourced data without affecting data availability, one can use Symmetric Searchable Encryption (SSE) to achieve search over encrypted data. Considering that query users may search with misspelled words, the fuzzy search should be supported. However, conventional privacy-preserving fuzzy multi-keyword search schemes are incapable of achieving the result verification and adaptive security. To solve the above challenging issues, in this paper we propose a Verifiable Fuzzy multi-keyword Search scheme with Adaptive security (VFSA). VFSA first employs the locality sensitive hashing to hash the misspelled and correct keywords to the same positions, then designs a twin Bloom filter for each document to store and mask all keywords contained in the document, next constructs an index tree based on the graph-based keyword partition algorithm to achieve adaptive sublinear retrieval, finally combines the Merkle hash tree structure with the adapted multiset accumulator to check the correctness and completeness of search results. Our formal security analysis shows that VFSA is secure under the IND-CKA2 model and achieves query authentication. Our empirical experiments using the real-world dataset demonstrate the practicality of VFSA.
引用
收藏
页码:5386 / 5399
页数:14
相关论文
共 50 条
  • [31] Threshold Multi-Keyword Search for Cloud-Based Group Data Sharing
    Miao, Yinbin
    Deng, Robert H.
    Choo, Kim-Kwang Raymond
    Liu, Ximeng
    Li, Hongwei
    IEEE TRANSACTIONS ON CLOUD COMPUTING, 2022, 10 (03) : 2146 - 2162
  • [32] Multi-keyword ranked search with access control for multiple data owners in the cloud
    Guo, Jiaqi
    Tian, Cong
    Lu, Xu
    Zhao, Liang
    Duan, Zhenhua
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2024, 82
  • [33] Secure and privacy-preserving multi-keyword ranked information retrieval from encrypted big data
    Mohan L.
    Sudheep Elayidom M.
    International Journal of Information and Computer Security, 2020, 13 (02): : 141 - 165
  • [34] OTKI-F: An efficient memory-secure multi-keyword fuzzy search protocol
    Han, Ziyang
    Ye, Qingqing
    Hu, Haibo
    JOURNAL OF COMPUTER SECURITY, 2023, 31 (02) : 129 - 152
  • [35] Fine-Grained Ranked Multi-Keyword Search Over Hierarchical Data for IoT-Oriented Health System
    Sun, Jianfei
    Hu, Shengnan
    Nie, Xuyun
    IEEE ACCESS, 2019, 7 : 101969 - 101980
  • [36] Verifiable and Multi-Keyword Searchable Attribute-Based Encryption Scheme for Cloud Storage
    Wang, Shangping
    Jia, Shasha
    Zhang, Yaling
    IEEE ACCESS, 2019, 7 : 50136 - 50147
  • [37] Privacy-Preserving Multi-Keyword Search in Information Networks
    Tang, Yuzhe
    Liu, Ling
    IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, 2015, 27 (09) : 2424 - 2437
  • [38] Keyword search over encrypted cloud data based on blockchain in smart medical applications
    Niu, Shufen
    Song, Mi
    Fang, Lizhi
    Yu, Fei
    Han, Song
    Wang, Caifen
    COMPUTER COMMUNICATIONS, 2022, 192 : 33 - 47
  • [39] Attribute-Based Hybrid Boolean Keyword Search over Outsourced Encrypted Data
    He, Kai
    Guo, Jun
    Weng, Jian
    Weng, Jiasi
    Liu, Joseph K.
    Yi, Xun
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2020, 17 (06) : 1207 - 1217
  • [40] Efficient Strong Privacy-Preserving Conjunctive Keyword Search Over Encrypted Cloud Data
    Xu, Chang
    Wang, Ruijuan
    Zhu, Liehuang
    Zhang, Chuan
    Lu, Rongxing
    Sharif, Kashif
    IEEE TRANSACTIONS ON BIG DATA, 2023, 9 (03) : 805 - 817