Multi-keywords fuzzy search encryption supporting dynamic update in an intelligent edge network

被引:10
作者
Yan, Xixi [1 ]
Yin, Pei [1 ]
Tang, Yongli [1 ]
Feng, Suwei [1 ]
机构
[1] Henan Polytech Univ, Sch Comp Sci & Technol, Network Informat Secur & Cryptog Lab, Jiaozuo 454000, Henan, Peoples R China
关键词
Privacy protection; multi-keyword fuzzy search; edge server; dynamic;
D O I
10.1080/09540091.2021.2023097
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
In an intelligent edge network, data owners encrypt data and outsource it to the edge servers to prevent the leakage of data and user information. It is a research issue to achieve efficient search and data update of the ciphertext stored in the edge servers. For the above problems, we construct a fuzzy multi-keyword search scheme based on a two-level tree index, where the first-level tree index stores keyword tags and the second-level stores encrypted file identifiers and counting bloom filters (CBFs). By constructing a two-level tree index, efficient multi-keyword search is realised, and it also has obvious time advantages when performing the single-keyword search. In addition, the proposed scheme supports index updating by introducing the CBF, and it can realise fuzzy search by calculating the inner product between the CBF in index and search trapdoor. At last, the proposed scheme is proved to be semantically secure under the known ciphertext attack model. Theoretical analysis and simulation test indicate that the proposed scheme spends lower computation overhead than other related schemes, especially in the search phase; as the number of matching files or query keywords grows, it costs less time, at around 2-10 ms.
引用
收藏
页码:511 / 528
页数:18
相关论文
共 25 条
[1]   EliMFS: Achieving Efficient, Leakage-Resilient, and Multi-Keyword Fuzzy Search on Encrypted Cloud Data [J].
Chen, Jing ;
He, Kun ;
Deng, Lan ;
Yuan, Quan ;
Du, Ruiying ;
Xiang, Yang ;
Wu, Jie .
IEEE TRANSACTIONS ON SERVICES COMPUTING, 2020, 13 (06) :1072-1085
[2]   Privacy-preserving searchable encryption in the intelligent edge computing [J].
Chen, Qi ;
Fan, Kai ;
Zhang, Kuan ;
Wang, Haoyang ;
Li, Hui ;
Yang, Yingtang .
COMPUTER COMMUNICATIONS, 2020, 164 :31-41
[3]  
Dawn X., 2002, IEEE S SECURITY PRIV
[4]   Toward Efficient Multi-Keyword Fuzzy Search Over Encrypted Outsourced Data With Accuracy Improvement [J].
Fu, Zhangjie ;
Wu, Xinle ;
Guan, Chaowen ;
Sun, Xingming ;
Ren, Kui .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2016, 11 (12) :2706-2716
[5]   Enabling Efficient Verifiable Fuzzy Keyword Search Over Encrypted Data in Cloud Computing [J].
Ge, Xinrui ;
Yu, Jia ;
Hu, Chengyu ;
Zhang, Hanlin ;
Hao, Rong .
IEEE ACCESS, 2018, 6 :45725-45739
[6]   Constrained creation of poetic forms during theme-driven exploration of a domain defined by an N-gram model [J].
Gervas, Pablo .
CONNECTION SCIENCE, 2016, 28 (02) :111-130
[7]   AEnet: Automatic Picking of P-Wave First Arrivals Using Deep Learning [J].
Guo, Chao ;
Zhu, Tieyuan ;
Gao, Yongtao ;
Wu, Shunchuan ;
Sun, Jian .
IEEE TRANSACTIONS ON GEOSCIENCE AND REMOTE SENSING, 2021, 59 (06) :5293-5303
[8]   5GSS: a framework for 5G-secure-smart healthcare monitoring [J].
Hu, Jianqiang ;
Liang, Wei ;
Hosam, Osama ;
Hsieh, Meng-Yen ;
Su, Xin .
CONNECTION SCIENCE, 2022, 34 (01) :139-161
[9]   An efficient attribute-based encryption scheme based on SM9 encryption algorithm for dispatching and control cloud [J].
Ji, Honghan ;
Zhang, Hongjie ;
Shao, Lisong ;
He, Debiao ;
Luo, Min .
CONNECTION SCIENCE, 2021, 33 (04) :1094-1115
[10]  
Lavanya V., 2020, EMBEDDED SYSTEMS ART