Flexible Wildcard Searchable Encryption System

被引:15
作者
Yang, Yang [1 ,2 ,3 ,4 ]
Liu, Ximeng [1 ,2 ]
Deng, Robert H. [2 ]
Weng, Jian [5 ]
机构
[1] Fuzhou Univ, Coll Math & Comp Sci, Fuzhou 350116, Peoples R China
[2] Singapore Management Univ, Sch Informat Syst, Singapore 188065, Singapore
[3] Fuzhou Univ, Univ Key Lab Informat Secur Network Syst, Fuzhou 350116, Fujian, Peoples R China
[4] Minjiang Univ, Fujian Prov Key Lab Informat Proc & Intelligent C, Fuzhou 350121, Peoples R China
[5] Jinan Univ, Coll Informat Sci & Technol, Guangzhou 510623, Peoples R China
基金
新加坡国家研究基金会; 中国国家自然科学基金;
关键词
Encryption; Cloud computing; Keyword search; Metadata; Authorization; Public key; Searchable encryption; wildcard search; user revocation; multiple users; top-< named-content xmlns:xlink="http:; www; w3; org; 1999; xlink" xmlns:ali="http:; niso; schemas; ali; 1; 0; xmlns:mml="http:; 1998; Math; MathML" xmlns:xsi="http:; 2001; XMLSchema-instance" content-type="math" xlink:type="simple"> < inline-formula > < tex-math notation="LaTeX">$k$<; tex-math > < alternatives > < mml:math > < mml:mi > k <; mml:mi > <; mml:math > < inline-graphic xlink:href="yang-ieq1-2714669; gif" xlink:type="simple; alternatives > <; inline-formula > <; named-content >;
D O I
10.1109/TSC.2017.2714669
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Searchable encryption is an important technique for public cloud storage service to provide user data confidentiality protection and at the same time allow users performing keyword search over their encrypted data. Previous schemes only deal with exact or fuzzy keyword search to correct some spelling errors. In this paper, we propose a new wildcard searchable encryption system to support wildcard keyword queries which has several highly desirable features. First, our system allows multiple keywords search in which any queried keyword may contain zero, one or two wildcards, and a wildcard may appear in any position of a keyword and represent any number of symbols. Second, it supports simultaneous search on multiple data owners data using only one trapdoor. Third, it provides flexible user authorization and revocation to effectively manage search and decryption privileges. Fourth, it is constructed based on homomorphic encryption rather than Bloom filter and hence completely eliminates the false probability caused by Bloom filter. Finally, it achieves a high level of privacy protection since matching results are unknown to the cloud server in the test phase. The proposed system is thoroughly analyzed and is proved secure. Extensive experimental results indicate that our system is efficient compared with other existing wildcard searchable encryption schemes in the public key setting.
引用
收藏
页码:464 / 477
页数:14
相关论文
共 32 条
[1]  
[Anonymous], 2013, P ACM SIGSAC C COMP, DOI 10.1145/2508859.2516730
[2]  
Barker Elaine, NIST SPECIAL PUBLICA, V800, P1
[3]   SPACE/TIME TRADE/OFFS IN HASH CODING WITH ALLOWABLE ERRORS [J].
BLOOM, BH .
COMMUNICATIONS OF THE ACM, 1970, 13 (07) :422-&
[4]  
Boneh D, 2004, LECT NOTES COMPUT SC, V3027, P506
[5]  
Bosch Christoph, 2011, Secure Data Management. Proceedings 8th VLDB Workshop (SDM2011), P114, DOI 10.1007/978-3-642-23556-6_8
[6]  
Bresson E, 2003, LECT NOTES COMPUT SC, V2894, P37
[7]   A Forensically Sound Adversary Model for Mobile Devices [J].
Do, Quang ;
Martini, Ben ;
Choo, Kim-Kwang Raymond .
PLOS ONE, 2015, 10 (09)
[8]   Toward Efficient Multi-Keyword Fuzzy Search Over Encrypted Outsourced Data With Accuracy Improvement [J].
Fu, Zhangjie ;
Wu, Xinle ;
Guan, Chaowen ;
Sun, Xingming ;
Ren, Kui .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2016, 11 (12) :2706-2716
[9]   Efficient wildcard search over encrypted data [J].
Hu, Changhui ;
Han, Lidong .
INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2016, 15 (05) :539-547
[10]  
Kamara S, 2010, LECT NOTES COMPUT SC, V6054, P136, DOI 10.1007/978-3-642-14992-4_13