Approximate Keyword-based Search over Encrypted Cloud Data

被引:4
|
作者
Ibrahim, Ayad [1 ]
Jin, Hai [1 ]
Yassin, Ali A. [1 ]
Zou, Deqing [1 ]
机构
[1] Huazhong Univ Sci & Technol, Serv Comp Technol & Syst Lab, Cluster & Grid Comp Lab, Wuhan 430074, Peoples R China
关键词
D O I
10.1109/ICEBE.2012.46
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
To protect the privacy, users have to encrypt their sensitive data before outsourcing it to the cloud. However, the traditional encryption schemes are inadequate since they make the application of indexing and searching operations more challenging tasks. Accordingly, searchable encryption systems are developed to conduct search operations over a set of encrypted data. Unfortunately, these systems only allow their clients to perform an exact search but not approximate search; an important need for all the current information retrieval systems. Recently, an increased attention has been paid to the approximate searchable encryption systems to find keywords that match the submitted queries approximately. Our work focuses on constructing a flexible secure index that allows the cloud server to perform the approximate search operations without revealing the content of the query trapdoor or the index content. Specifically, the most recently cryptographic primitive, order preserving symmetric encryption (OPSE), has been employed to protect our keywords. Our proposed scheme divides the search operation into two steps. The first step finds the candidate list in terms of secure pruning codes. In particular, we have developed two methods to construct these pruning codes. The second step uses a semi honest third party to determine the best matching keyword depending on secure similarity function. We intend to reveal as little information as possible to that third party. We hope that developing such a system will enhance the utilization of retrieval information systems and make these systems more user-friendly.
引用
收藏
页码:238 / 245
页数:8
相关论文
共 50 条
  • [1] Smart Cloud Search Services: Verifiable Keyword-based Semantic Search over Encrypted Cloud Data
    Fu, Zhangjie
    Shu, Jiangang
    Sun, Xingming
    Linge, Nigel
    IEEE TRANSACTIONS ON CONSUMER ELECTRONICS, 2014, 60 (04) : 762 - 770
  • [2] Privacy-Preserving Keyword-based Semantic Search over Encrypted Cloud Data
    Sun, Xingming
    Zhu, Yanling
    Xia, Zhihua
    Chen, Lihong
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2014, 8 (03): : 9 - 20
  • [3] Enabling Central Keyword-Based Semantic Extension Search Over Encrypted Outsourced Data
    Fu, Zhangjie
    Wu, Xinle
    Wang, Qian
    Ren, Kui
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2017, 12 (12) : 2986 - 2997
  • [4] Efficient Keyword Search over Encrypted Cloud Data
    Meharwade, Anuradha
    Patil, G. A.
    1ST INTERNATIONAL CONFERENCE ON INFORMATION SECURITY & PRIVACY 2015, 2016, 78 : 139 - 145
  • [5] Approach to keyword search over encrypted data in cloud
    Zhang, Peng
    Li, Yan
    Lin, Hai-Lun
    Yang, Rong
    Liu, Qing-Yun
    Tongxin Xuebao/Journal on Communications, 2014, 35 : 147 - 153
  • [6] Semantic Keyword Search based on Trie over Encrypted Cloud Data
    Fu, Zhangjie
    Shu, Jiangang
    Sun, Xingming
    Zhang, Daxing
    SCC'14: PROCEEDINGS OF THE 2ND INTERNATIONAL WORKSHOP ON SECURITY IN CLOUD COMPUTING, 2014, : 59 - 62
  • [7] Approximate Multi-keyword Rank Search on Encrypted Cloud Data
    Shih, Wan-Ni
    Chin, Tai-Lin
    GLOBECOM 2017 - 2017 IEEE GLOBAL COMMUNICATIONS CONFERENCE, 2017,
  • [8] A shareable keyword search over encrypted data in cloud computing
    Xu, Li
    Weng, Chi-Yao
    Yuan, Lun-Pin
    Wu, Mu-En
    Tso, Raylin
    Sun, Hung-Min
    JOURNAL OF SUPERCOMPUTING, 2018, 74 (03): : 1001 - 1023
  • [9] Fuzzy Keyword Search over Encrypted Data in Cloud Computing
    Li, Jin
    Wang, Qian
    Wang, Cong
    Cao, Ning
    Ren, Kui
    Lou, Wenjing
    2010 PROCEEDINGS IEEE INFOCOM, 2010,
  • [10] Efficient and Expressive Keyword Search Over Encrypted Data in Cloud
    Cui, Hui
    Wan, Zhiguo
    Deng, Robert H.
    Wang, Guilin
    Li, Yingjiu
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2018, 15 (03) : 409 - 422