Efficient Verifiable Fuzzy Keyword Search over Encrypted Data in Cloud Computing

被引:85
作者
Wang, Jianfeng [1 ]
Ma, Hua [1 ]
Tang, Qiang [2 ]
Li, Jin [3 ]
Zhu, Hui [4 ,5 ]
Ma, Siqi [6 ]
Chen, Xiaofeng [4 ]
机构
[1] Xidian Univ, Dept Math, Xian, Peoples R China
[2] Univ Luxembourg, SnT, APSIA Grp, L-1359 Luxembourg, Luxembourg
[3] Guangzhou Univ, Sch Comp Sci, Guangzhou, Peoples R China
[4] Xidian Univ, State Key Lab Integrated Serv Networks, Xian, Peoples R China
[5] Network & Data Secur Key Lab Sichuan, Chengtu, Peoples R China
[6] Xidian Univ, Sch Comp Sci & Technol, Xian, Peoples R China
基金
中国国家自然科学基金;
关键词
searchable encryption; verifiable fuzzy search; cloud computing;
D O I
10.2298/CSIS121104028W
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
As cloud computing becomes prevalent, more and more sensitive data is being centralized into the cloud by users. To maintain the confidentiality of sensitive user data against untrusted servers, the data should be encrypted before they are uploaded. However, this raises a new challenge for performing search over the encrypted data efficiently. Although the existing searchable encryption schemes allow a user to search the encrypted data with confidentiality, these solutions cannot support the verifiability of searching result. We argue that a cloud server may be selfish in order to save its computation ability or bandwidth. For example, it may execute only a fraction of the search and returns part of the searching result. In this paper, we propose a new verifiable fuzzy keyword search scheme based on the symbol-tree which not only supports the fuzzy keyword search, but also enjoys the verifiability of the searching result. Through rigorous security and efficiency analysis, we show that our proposed scheme is secure under the proposed model, while correctly and efficiently realizing the verifiable fuzzy keyword search. The extensive experimental results demonstrate the efficiency of the proposed scheme.
引用
收藏
页码:667 / 684
页数:18
相关论文
共 20 条
[1]  
Abdalla M, 2005, LECT NOTES COMPUT SC, V3621, P205
[2]  
Agudo I, 2011, COMM COM INF SC, V187, P190
[3]  
[Anonymous], 2003, CRYPTOLOGY EPRINT AR
[4]  
[Anonymous], J INTERNET SERVICES
[5]  
[Anonymous], 2010, 2010 IEEE International Symposium on Parallel Distributed Processing (IPDPS), DOI DOI 10.1109/INFCOM.2010.5462196
[6]  
[Anonymous], 2005, APPL CRYPTOGRAPHY NE
[7]  
[Anonymous], 2011, P WORKSH CRYPT SEC C
[8]  
[Anonymous], P 13 ACM C COMP COMM
[9]  
Bao F, 2008, LECT NOTES COMPUT SC, V4991, P71
[10]   Space-Constrained Gram-Based Indexing for Efficient Approximate String Search [J].
Behm, Alexander ;
Ji, Shengyue ;
Li, Chen ;
Lu, Jiaheng .
ICDE: 2009 IEEE 25TH INTERNATIONAL CONFERENCE ON DATA ENGINEERING, VOLS 1-3, 2009, :604-+