Efficient wildcard search over encrypted data

被引:20
作者
Hu, Changhui [1 ]
Han, Lidong [2 ]
机构
[1] Dalian Univ Technol, Sch Math Sci, Dalian 116024, Peoples R China
[2] Hangzhou Normal Univ, Sch Informat Sci & Engn, Hangzhou 310036, Zhejiang, Peoples R China
基金
中国博士后科学基金;
关键词
Searchable symmetric encryption; Cloud computing; Wildcard search;
D O I
10.1007/s10207-015-0302-0
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Searchable encryption is an important technique that allows the data owners to store their encrypted data in the cloud. It also maintains the ability to search a keyword over encrypted data. In practice, searchable encryption scheme supporting wildcard search is very important and widely used. In this paper, we propose a new wildcard search technique to use one wildcard to represent any number of characters. Based on Bloom filter with a novel specified characters position technique, we construct a new searchable symmetric scheme to support wildcard search over encrypted data. This scheme is more efficient than prior schemes, and it can be strengthened to be secure against an adaptive attacker (CKA-2 security). Moreover, this scheme can be dynamic to support file addition and deletion. Our wildcard search technique is of independent interest.
引用
收藏
页码:539 / 547
页数:9
相关论文
共 17 条
[1]   A View of Cloud Computing [J].
Armbrust, Michael ;
Fox, Armando ;
Griffith, Rean ;
Joseph, Anthony D. ;
Katz, Randy ;
Konwinski, Andy ;
Lee, Gunho ;
Patterson, David ;
Rabkin, Ariel ;
Stoica, Ion ;
Zaharia, Matei .
COMMUNICATIONS OF THE ACM, 2010, 53 (04) :50-58
[2]  
Bosch Christoph, 2011, Secure Data Management. Proceedings 8th VLDB Workshop (SDM2011), P114, DOI 10.1007/978-3-642-23556-6_8
[3]   Dynamic Searchable Encryption in Very-Large Databases: Data Structures and Implementation [J].
Cash, David ;
Jaeger, Joseph ;
Jarecki, Stanislaw ;
Jutla, Charanjit ;
Krawczyk, Hugo ;
Rosu, Marcel-Catalin ;
Steine, Michael .
21ST ANNUAL NETWORK AND DISTRIBUTED SYSTEM SECURITY SYMPOSIUM (NDSS 2014), 2014,
[4]  
Chang YC, 2005, LECT NOTES COMPUT SC, V3531, P442
[5]   Searchable symmetric encryption: Improved definitions and efficient constructions [J].
Curtmola, Reza ;
Garay, Juan ;
Kamara, Seny ;
Ostrovsky, Rafail .
JOURNAL OF COMPUTER SECURITY, 2011, 19 (05) :895-934
[6]  
Goh E.-J., 2003, Tech. Rep. 2003/216, P1
[7]   Software protection and simulation on oblivious RAMs [J].
Goldreich, O ;
Ostrovsky, R .
JOURNAL OF THE ACM, 1996, 43 (03) :431-473
[8]  
Kamara S., 2013, FINANCIAL CRYPTOGRAP, P258, DOI DOI 10.1007/978-3-642-39884-1
[9]   Dynamic Searchable Encryption via Blind Storage [J].
Naveed, Muhammad ;
Prabhakaran, Manoj ;
Gunter, Carl A. .
2014 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP 2014), 2014, :639-654
[10]  
Sedghi S, 2010, LECT NOTES COMPUT SC, V6280, P138, DOI 10.1007/978-3-642-15317-4_10