Fuzzy Keyword Search and Access Control over Ciphertexts in Cloud Computing

被引:12
作者
Zhu, Hong [1 ]
Mei, Zhuolin [1 ]
Wu, Bing [1 ]
Li, Hongbo [1 ]
Cui, Zongmin [2 ]
机构
[1] Huazhong Univ Sci & Technol, Sch Comp Sci & Technol, Wuhan, Hubei, Peoples R China
[2] Jiujiang Univ, Sch Informat Sci & Technol, Jiujiang, Jiangxi, Peoples R China
来源
INFORMATION SECURITY AND PRIVACY, ACISP 2017, PT I | 2017年 / 10342卷
关键词
Fuzzy keyword search; Access control; Encryption; ENCRYPTED DATA; PRIVACY;
D O I
10.1007/978-3-319-60055-0_13
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the rapid development of cloud computing, more and more data owners are motivated to outsource their data to cloud for various benefits. Due to serious privacy concerns, sensitive data should be encrypted before being outsourced to the cloud. However, this results that effective data utilization becomes a very challenging task, such as keyword search over ciphertexts. Although many searchable encryption methods have been proposed, they only support exact keyword search. In our paper, we propose a method which could support both the fuzzy keyword search and access control over ciphertexts. Our proposed method achieves fuzzy keyword search and access control through algorithm design and Ciphertext-Policy Attribute-based Encryption. We present word pattern which can be used to balance the search efficiency and privacy. The experimental results demonstrate the efficiency of our method.
引用
收藏
页码:248 / 265
页数:18
相关论文
共 50 条
  • [41] An efficient PHR service system supporting fuzzy keyword search and fine-grained access control
    Xhafa, Fatos
    Wang, Jianfeng
    Chen, Xiaofeng
    Liu, Joseph K.
    Li, Jin
    Krause, Paul
    SOFT COMPUTING, 2014, 18 (09) : 1795 - 1802
  • [42] AKSER: Attribute-based keyword search with efficient revocation in cloud computing
    Cui, Jie
    Zhou, Han
    Zhong, Hong
    Xu, Yan
    INFORMATION SCIENCES, 2018, 423 : 343 - 352
  • [43] A privacy-preserving multi-keyword search approach in cloud computing
    Manasrah, Ahmed M.
    Abu Nasir, Mahmoud
    Salem, Maher
    SOFT COMPUTING, 2020, 24 (08) : 5609 - 5631
  • [44] ABKS-CSC: attribute-based keyword search with constant-size ciphertexts
    Yang, Ye
    Han, Jinguang
    Susilo, Willy
    Yuen, Tsz Hon
    Li, Jiguo
    SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (18) : 5003 - 5015
  • [45] Blockchain-Aided Keyword Search over Encrypted Data in Cloud
    Varri, Uma Sankararao
    ADVANCED NETWORK TECHNOLOGIES AND INTELLIGENT COMPUTING, ANTIC 2022, PT I, 2023, 1797 : 331 - 348
  • [46] IGSK: Index Generation on Split Keyword for Search over Cloud Data
    Raghavendra, S.
    Girish, S.
    Geeta, C. M.
    Buyya, Rajkurnar
    Venugopal, K. R.
    Iyengar, S. S.
    Patnaik, L. M.
    2015 INTERNATIONAL CONFERENCE ON COMPUTING AND NETWORK COMMUNICATIONS (COCONET), 2015, : 374 - 380
  • [47] Smart Cloud Search Services: Verifiable Keyword-based Semantic Search over Encrypted Cloud Data
    Fu, Zhangjie
    Shu, Jiangang
    Sun, Xingming
    Linge, Nigel
    IEEE TRANSACTIONS ON CONSUMER ELECTRONICS, 2014, 60 (04) : 762 - 770
  • [48] A survey of privacy-preserving access control in cloud computing
    Li, Hongjiao, 1600, Binary Information Press (10): : 5829 - 5846
  • [49] Robust access control framework for mobile cloud computing network
    Li, Fei
    Rahulamathavan, Yogachandran
    Conti, Mauro
    Rajarajan, Muttukrishnan
    COMPUTER COMMUNICATIONS, 2015, 68 : 61 - 72
  • [50] Proposed Scheme for Data Confidentiality and Access Control in Cloud Computing
    Ghimes, Ana-Maria
    Patriciu, Victor Valeriu
    INNOVATIVE SECURITY SOLUTIONS FOR INFORMATION TECHNOLOGY AND COMMUNICATIONS, (SECITC 2016), 2016, 10006 : 274 - 285