Chinese Multi-Keyword Fuzzy Rank Search over Encrypted Cloud Data Based on Locality-Sensitive Hashing

被引:11
作者
Yang, Yang [1 ,2 ,3 ]
Zhang, Yu-Chao [1 ,2 ]
Liu, Jia [1 ,2 ]
Liu, Xi-Meng [1 ,2 ]
Yuan, Feng [4 ]
Zhong, Shang-Ping [1 ,2 ]
机构
[1] Fuzhou Univ, Coll Math & Comp Sci, Fuzhou 350116, Fujian, Peoples R China
[2] Fuzhou Univ, Univ Key Lab Informat Secur Network Syst, Fuzhou 350116, Fujian, Peoples R China
[3] Minjiang Univ, Fujian Prov Key Lab Informat Proc & Intelligent C, Fuzhou 350108, Fujian, Peoples R China
[4] Beijing Elect Sci & Technol Inst, Informat Secur Inst, Beijing 100070, Peoples R China
基金
中国国家自然科学基金;
关键词
searchable encryption; cloud computing; fuzzy Chinese keyword; locality-sensitive hashing; security;
D O I
10.6688/JISE.201901_35(1).0008
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Most of the existing Chinese keyword fuzzy searchable encryption schemes realize fuzzy keyword search utilizing the wildcard and gram methods to construct the fuzzy set, which consumes a lot of storage and computation overheads. In this paper, we propose a novel Chinese multi-keyword fuzzy rank searchable encryption scheme, which achieves efficient fuzzy keyword search without constructing a large fuzzy set. First, the Chinese keyword is converted to the pinyin string, which is partitioned based on unigram, or the mandarin consonant, vowel and tone of pinyin. Then, we design two Chinese keyword vector generation algorithms to convert a pinyin string into a keyword vector. Moreover, the locality-sensitive hashing and Bloom filter are utilized to construct the fuzzy keyword search algorithm. We design two schemes to realize the Chinese fuzzy multi-keyword search, and all of them utilize a single Bloom filter as the encryption index of a document. The cloud storage server only needs to add (or delete) an encrypted file and its encrypted index to realize the dynamic update of the files. To improve the accuracy of the rank, a three-factor rank algorithm is proposed. The theoretical analysis and experimental results indicate that the proposed schemes realize Chinese multi-keyword fuzzy search, more accurate search result rank, guarantee the data security, and save a large amount of storage and computation costs.
引用
收藏
页码:137 / 158
页数:22
相关论文
共 29 条
[1]  
[Anonymous], 2008, Introduction to Information Retrieval
[2]  
[Anonymous], 2009, J. Tsinghua Univ. (Sci. Technol.)
[3]  
[Anonymous], 2014, P IEEE INFOCOM
[4]  
[Anonymous], IEEE T INFORM THEORY
[5]  
[Anonymous], COMPUTER SCI INFORM
[6]  
[Anonymous], 2006, CCS, DOI DOI 10.1145/1180405.1180417
[7]  
[Anonymous], 2004, P 2004 C EMP METH NA
[8]  
[Anonymous], 2014, Netinfo Secur
[9]   SPACE/TIME TRADE/OFFS IN HASH CODING WITH ALLOWABLE ERRORS [J].
BLOOM, BH .
COMMUNICATIONS OF THE ACM, 1970, 13 (07) :422-&
[10]  
Boldyreva A, 2009, LECT NOTES COMPUT SC, V5479, P224, DOI 10.1007/978-3-642-01001-9_13