Verifiable Fuzzy Multi-Keyword Search Over Encrypted Data With Adaptive Security

被引:28
|
作者
Tong, Qiuyun [1 ,2 ]
Miao, Yinbin [1 ,2 ]
Weng, Jian [3 ]
Liu, Ximeng [4 ]
Choo, Kim-Kwang Raymond [5 ]
Deng, Robert H. H. [6 ]
机构
[1] Xidian Univ, Sch Cyber Engn, Xian 710071, Shaanxi, Peoples R China
[2] Key Lab Blockchain & Cyberspace Governance Zhejian, Hangzhou 310007, Zhejiang, Peoples R China
[3] Jinan Univ, Coll Cyber Secur, Guangzhou 510632, Guangdong, Peoples R China
[4] Fuzhou Univ, Sch Math & Comp Sci, Key Lab Informat Secur Network Syst, Fuzhou 350108, Fujian, Peoples R China
[5] Univ Texas San Antonio, Dept Informat Syst & Cyber Secur, San Antonio, TX 78249 USA
[6] Singapore Management Univ, Sch Informat Syst, Singapore 178902, Singapore
基金
中国国家自然科学基金;
关键词
Adaptive security; fuzzy multi-keyword search; result verification; symmetric searchable encryption; PRIVACY;
D O I
10.1109/TKDE.2022.3152033
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
To ensure the security of outsourced data without affecting data availability, one can use Symmetric Searchable Encryption (SSE) to achieve search over encrypted data. Considering that query users may search with misspelled words, the fuzzy search should be supported. However, conventional privacy-preserving fuzzy multi-keyword search schemes are incapable of achieving the result verification and adaptive security. To solve the above challenging issues, in this paper we propose a Verifiable Fuzzy multi-keyword Search scheme with Adaptive security (VFSA). VFSA first employs the locality sensitive hashing to hash the misspelled and correct keywords to the same positions, then designs a twin Bloom filter for each document to store and mask all keywords contained in the document, next constructs an index tree based on the graph-based keyword partition algorithm to achieve adaptive sublinear retrieval, finally combines the Merkle hash tree structure with the adapted multiset accumulator to check the correctness and completeness of search results. Our formal security analysis shows that VFSA is secure under the IND-CKA2 model and achieves query authentication. Our empirical experiments using the real-world dataset demonstrate the practicality of VFSA.
引用
收藏
页码:5386 / 5399
页数:14
相关论文
共 50 条
  • [41] Secure Multi-keyword Fuzzy Searches With Enhanced Service Quality in Cloud Computing
    Liu, Qin
    Peng, Yu
    Wu, Jie
    Wang, Tian
    Wang, Guojun
    IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT, 2021, 18 (02): : 2046 - 2062
  • [42] Keyword Binning-Based Efficient Search on Encrypted Cloud Data
    Handa, Rohit
    Krishna, C. Rama
    Aggarwal, Naveen
    ARABIAN JOURNAL FOR SCIENCE AND ENGINEERING, 2019, 44 (04) : 3559 - 3584
  • [43] Privacy-Preserving Bloom Filter-Based Keyword Search Over Large Encrypted Cloud Data
    Liang, Yanrong
    Ma, Jianfeng
    Miao, Yinbin
    Kuang, Da
    Meng, Xiangdong
    Deng, Robert H.
    IEEE TRANSACTIONS ON COMPUTERS, 2023, 72 (11) : 3086 - 3098
  • [44] VKSE-MO: verifiable keyword search over encrypted data in multi-owner settings多数据拥有者场景中的可验证的关键字检索
    Yinbin Miao
    Jianfeng Ma
    Ximeng Liu
    Junwei Zhang
    Zhiquan Liu
    Science China Information Sciences, 2017, 60
  • [45] Efficient Multi-user Similarity Search Over Encrypted Data in Cloud Storage
    Changhee Hahn
    Hyung June Shin
    Hyunsoo Kwon
    Junbeom Hur
    Wireless Personal Communications, 2019, 107 : 1337 - 1353
  • [46] Efficient Multi-user Similarity Search Over Encrypted Data in Cloud Storage
    Hahn, Changhee
    Shin, Hyung June
    Kwon, Hyunsoo
    Hur, Junbeom
    WIRELESS PERSONAL COMMUNICATIONS, 2019, 107 (03) : 1337 - 1353
  • [47] VCKSM: Verifiable conjunctive keyword search over mobile e-health cloud in shared multi-owner settings
    Miao, Yinbin
    Ma, Jianfeng
    Liu, Ximeng
    Jiang, Qi
    Zhang, Junwei
    Shen, Limin
    Liu, Zhiquan
    PERVASIVE AND MOBILE COMPUTING, 2017, 40 : 205 - 219
  • [48] Trust Enhancement over Range Search for Encrypted Data
    Yang, Xu
    Lee, Ting-Ting
    Liu, Joseph K.
    Huang, Xinyi
    2016 IEEE TRUSTCOM/BIGDATASE/ISPA, 2016, : 66 - 73
  • [49] Survey on secure search over encrypted data on the cloud
    Hoang Pham
    Woodworth, Jason
    Salehi, Mohsen Amini
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2019, 31 (17)
  • [50] An extended chaotic maps-based keyword search scheme over encrypted data resist outside and inside keyword guessing attacks in cloud storage services
    Li, Chun-Ta
    Lee, Chin-Wen
    Shen, Jau-Ji
    NONLINEAR DYNAMICS, 2015, 80 (03) : 1601 - 1611