Fuzzy Multi-Keyword Query on Encrypted Data in the Cloud

被引:0
作者
Shi, Xiu-jin [1 ]
Hu, Sheng-ping [1 ]
机构
[1] Donghua Univ, Shanghai, Peoples R China
来源
2016 4TH INTL CONF ON APPLIED COMPUTING AND INFORMATION TECHNOLOGY/3RD INTL CONF ON COMPUTATIONAL SCIENCE/INTELLIGENCE AND APPLIED INFORMATICS/1ST INTL CONF ON BIG DATA, CLOUD COMPUTING, DATA SCIENCE & ENGINEERING (ACIT-CSII-BCD) | 2016年
关键词
Cloud computing; keyword; encrypted data; cloud; Searchable encryption;
D O I
10.1109/ACIT-CSII-BCD.2016.87
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
With the popularity of cloud computing, more and more data information is gradually shift to the cloud. The security of cloud data has become a difficult problem that needs to be solved urgently. Data encryption is an effective means to ensure the security of data in the cloud. However, the retrieval of encrypted data is very different from the retrieval of plaintext. The traditional plaintext retrieval method is no longer suitable for the retrieval of the cipher text. In the previous fuzzy search strategy, although fuzzy keyword sets that building on keyword dictionary can realize the fuzzy search. But when the keyword set is constantly increasing, the fuzzy set will be exponentially growing. So the retrieval efficiency will be very difficult to make people satisfied. On the basis of the existing encryption data fuzzy search scheme, abandoned the original fuzzy set of keywords, the search request of keywords and keyword Dictionary of keywords matching correction method to realize the fuzzy search, improving the efficiency of retrieval. At the same time, the Chinese and English data mixed more and more, and the existing fuzzy retrieval scheme supports only a single language retrieval, using English and Chinese comparison table convert Chinese keyword to English keyword to support Chinese and English keyword search, making the precision ratio improved, greatly improving the user's search experience.
引用
收藏
页码:419 / 425
页数:7
相关论文
共 24 条
[1]  
Abdalla M, 2005, LECT NOTES COMPUT SC, V3621, P205
[2]  
[Anonymous], PRIVACY SECURITY CLO
[3]  
[Anonymous], 2010, 2010 IEEE 2 INT C CL, DOI DOI 10.1109/CLOUDCOM.2010.66
[4]  
[Anonymous], 2010, INFORM SECURITY S AF, DOI DOI 10.1109/ISSA.2010.5588290
[5]  
Arnold S., 2009, KM WORLD AUG, P14
[6]  
Bellare M, 2007, LECT NOTES COMPUT SC, V4622, P535
[7]  
Boneh D, 2004, LECT NOTES COMPUT SC, V3027, P506
[8]  
Boneh D, 2007, LECT NOTES COMPUT SC, V4622, P50
[9]  
Cao N, 2011, IEEE INFOCOM SER, P829, DOI 10.1109/INFCOM.2011.5935306
[10]  
Curtmola Reza, 2006, P 13 ACM C COMP COMM, DOI DOI 10.1145/1180405.1180417