Verifiable Fuzzy Multi-Keyword Search Over Encrypted Data With Adaptive Security

被引:28
|
作者
Tong, Qiuyun [1 ,2 ]
Miao, Yinbin [1 ,2 ]
Weng, Jian [3 ]
Liu, Ximeng [4 ]
Choo, Kim-Kwang Raymond [5 ]
Deng, Robert H. H. [6 ]
机构
[1] Xidian Univ, Sch Cyber Engn, Xian 710071, Shaanxi, Peoples R China
[2] Key Lab Blockchain & Cyberspace Governance Zhejian, Hangzhou 310007, Zhejiang, Peoples R China
[3] Jinan Univ, Coll Cyber Secur, Guangzhou 510632, Guangdong, Peoples R China
[4] Fuzhou Univ, Sch Math & Comp Sci, Key Lab Informat Secur Network Syst, Fuzhou 350108, Fujian, Peoples R China
[5] Univ Texas San Antonio, Dept Informat Syst & Cyber Secur, San Antonio, TX 78249 USA
[6] Singapore Management Univ, Sch Informat Syst, Singapore 178902, Singapore
基金
中国国家自然科学基金;
关键词
Adaptive security; fuzzy multi-keyword search; result verification; symmetric searchable encryption; PRIVACY;
D O I
10.1109/TKDE.2022.3152033
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
To ensure the security of outsourced data without affecting data availability, one can use Symmetric Searchable Encryption (SSE) to achieve search over encrypted data. Considering that query users may search with misspelled words, the fuzzy search should be supported. However, conventional privacy-preserving fuzzy multi-keyword search schemes are incapable of achieving the result verification and adaptive security. To solve the above challenging issues, in this paper we propose a Verifiable Fuzzy multi-keyword Search scheme with Adaptive security (VFSA). VFSA first employs the locality sensitive hashing to hash the misspelled and correct keywords to the same positions, then designs a twin Bloom filter for each document to store and mask all keywords contained in the document, next constructs an index tree based on the graph-based keyword partition algorithm to achieve adaptive sublinear retrieval, finally combines the Merkle hash tree structure with the adapted multiset accumulator to check the correctness and completeness of search results. Our formal security analysis shows that VFSA is secure under the IND-CKA2 model and achieves query authentication. Our empirical experiments using the real-world dataset demonstrate the practicality of VFSA.
引用
收藏
页码:5386 / 5399
页数:14
相关论文
共 50 条
  • [41] Enabling Efficient Verifiable Fuzzy Keyword Search Over Encrypted Data in Cloud Computing
    Ge, Xinrui
    Yu, Jia
    Hu, Chengyu
    Zhang, Hanlin
    Hao, Rong
    IEEE ACCESS, 2018, 6 : 45725 - 45739
  • [42] IMPROVEMENT IN SEARCH TIME USING MULTI-KEYWORD SEARCH OVER ENCRYPTED DATA IN CLOUD COMPUTING
    Kadve, Anagha Ramnath
    Vanjale, S. B.
    IIOAB JOURNAL, 2018, 9 (02) : 13 - 19
  • [43] An Efficient Multi-keyword Synonym-Based Fuzzy Ranked Search Over Outsourced Encrypted Cloud Data
    Saini, Vandana
    Challa, Rama Krishna
    Khan, Neelam S.
    ADVANCED COMPUTING AND COMMUNICATION TECHNOLOGIES, 2016, 452 : 433 - 441
  • [44] Generic Multi-keyword Ranked Search on Encrypted Cloud Data
    Kermanshahi, Shabnam Kasra
    Liu, Joseph K.
    Steinfeld, Ron
    Nepal, Surya
    COMPUTER SECURITY - ESORICS 2019, PT II, 2019, 11736 : 322 - 343
  • [45] Approximate Multi-keyword Rank Search on Encrypted Cloud Data
    Shih, Wan-Ni
    Chin, Tai-Lin
    GLOBECOM 2017 - 2017 IEEE GLOBAL COMMUNICATIONS CONFERENCE, 2017,
  • [46] Secure multi-keyword ranked search over encrypted cloud data for multiple data owners
    Guo, Ziqing
    Zhang, Hua
    Sun, Caijun
    Wen, Qiaoyan
    Li, Wenmin
    JOURNAL OF SYSTEMS AND SOFTWARE, 2018, 137 : 380 - 395
  • [47] Efficient Multi-Keyword Ranked Search Over Encrypted Data for Multi-Data-Owner Settings
    Nabil, Mahmoud
    Alsharif, Ahmad
    Sherif, Ahmed
    Mahmoud, Mohamed
    Younis, Mohamed
    2018 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2018,
  • [48] Privacy-Preserving Multi-keyword Ranked Search over Encrypted Cloud Data
    Cao, Ning
    Wang, Cong
    Li, Ming
    Ren, Kui
    Lou, Wenjing
    2011 PROCEEDINGS IEEE INFOCOM, 2011, : 829 - 837
  • [49] Privacy-Preserving Multi-Keyword Ranked Search over Encrypted Cloud Data
    Cao, Ning
    Wang, Cong
    Li, Ming
    Ren, Kui
    Lou, Wenjing
    IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2014, 25 (01) : 222 - 233
  • [50] Multi-Client Verifiable Encrypted Keyword Search Scheme With Authorization Over Outsourced Encrypted Data
    Yang, Xu
    Wang, Qiuhao
    Qi, Saiyu
    Li, Ke
    Wang, Jianfeng
    Zhao, Wenjia
    Qi, Yong
    IEEE TRANSACTIONS ON NETWORK SCIENCE AND ENGINEERING, 2024, 11 (06): : 6356 - 6371