Blockchain-Assisted Verifiable and Multi-User Fuzzy Search Encryption Scheme

被引:0
|
作者
Yan, Xixi [1 ]
Cheng, Pengyu [1 ]
Tang, Yongli [1 ]
Zhang, Jing [1 ]
机构
[1] School of Software, Henan Polytechnic University, Jiaozuo,454000, China
来源
Applied Sciences (Switzerland) | 2024年 / 14卷 / 24期
基金
中国国家自然科学基金;
关键词
Blockchain;
D O I
10.3390/app142411740
中图分类号
学科分类号
摘要
Searchable encryption (SE) allows users to efficiently retrieve data from encrypted cloud data, but most of the existing SE solutions only support precise keyword search. Fuzzy searchable encryption agrees with practical situations well in the cloud environment, as search keywords that are misspelled to some extent can still generate search trapdoors that are as effective as correct keywords. In scenarios where multiple users can search for ciphertext, most fuzzy searchable encryption schemes ignore the security issues associated with malicious cloud services and are inflexible in multi-user scenarios. For example, in medical application scenarios where malicious cloud servers may exist, diverse types of files need to correspond to doctors in the corresponding departments, and there is a lack of fine-grained access control for sharing decryption keys for different types of files. In the application of medical cloud storage, malicious cloud servers may return incorrect ciphertext files. Since diverse types of files need to be guaranteed to be accessible by doctors in the corresponding departments, sharing decryption keys with the corresponding doctors for different types of files is an issue. To solve these problems, a verifiable fuzzy searchable encryption with blockchain-assisted multi-user scenarios is proposed. Locality-sensitive hashing and bloom filters are used to realize multi-keyword fuzzy search, and the bigram segmentation algorithm is optimized for keyword conversion to improve search accuracy. To realize fine-grained access control in multi-user scenarios, ciphertext-policy attribute-based encryption (CP-ABE) is used to distribute the shared keys. In response to the possibility of malicious servers tampering with or falsifying users’ search results, the scheme leverages the blockchain’s technical features of decentralization, non-tamperability, and traceability, and uses smart contracts as a trusted third party to carry out the search work, which not only prevents keyword-guessing attacks within the cloud server, but also solves the verification work of search results. The security analysis leads to the conclusion that the scheme is secure under the adaptively chosen-keyword attack. © 2024 by the authors.
引用
收藏
相关论文
共 50 条
  • [1] Secure semantic search using deep learning in a blockchain-assisted multi-user setting
    Shahzad Khan
    Haider Abbas
    Muhammad Binsawad
    [J]. Journal of Cloud Computing, 13
  • [2] Secure semantic search using deep learning in a blockchain-assisted multi-user setting
    Khan, Shahzad
    Abbas, Haider
    Binsawad, Muhammad
    [J]. JOURNAL OF CLOUD COMPUTING-ADVANCES SYSTEMS AND APPLICATIONS, 2024, 13 (01):
  • [3] Blockchain-assisted multi-keyword fuzzy search encryption for secure data sharing
    Zou, Yipeng
    Peng, Tao
    Wang, Guojun
    Luo, Entao
    Xiong, Jinbo
    [J]. JOURNAL OF SYSTEMS ARCHITECTURE, 2023, 144
  • [4] Blockchain searchable encryption scheme for multi-user environment
    Zhai, Sheping
    Zhang, Ruiting
    Yang, Rui
    Cao, Yongqiang
    [J]. Xi'an Dianzi Keji Daxue Xuebao/Journal of Xidian University, 2024, 51 (04): : 151 - 169
  • [5] Fair Verifiable Search Encryption Scheme Based on Blockchain
    Li, Yang
    Wang, Jingyu
    Liu, Lixin
    [J]. Computer Engineering and Applications, 2024, 60 (06) : 301 - 311
  • [6] Verifiable Public Key Encryption With Keyword Search Based on Homomorphic Encryption in Multi-User Setting
    Wu, D. N.
    Gan, Q. Q.
    Wang, X. M.
    [J]. IEEE ACCESS, 2018, 6 : 42445 - 42453
  • [7] Blockchain searchable encryption scheme for multi-user power data sharing
    Yang, Rui
    Zhang, Ruiting
    Zhai, Sheping
    [J]. Dianli Xitong Baohu yu Kongzhi/Power System Protection and Control, 2024, 52 (22): : 116 - 128
  • [8] A Verifiable Dynamic Multi-user Searchable Encryption Scheme without Trusted Third Parties
    Ye, Fanghan
    Dong, Xiaolei
    Shen, Jiachen
    Cao, Zhenfu
    Zhao, Wenhua
    [J]. 2019 IEEE 25TH INTERNATIONAL CONFERENCE ON PARALLEL AND DISTRIBUTED SYSTEMS (ICPADS), 2019, : 896 - 900
  • [9] Encryption Scheme of Verifiable Search Based on Blockchain in Cloud Environment
    He, Buzhen
    Feng, Tao
    [J]. CRYPTOGRAPHY, 2023, 7 (02)
  • [10] Blockchain-assisted Verifiable Secure Multi-Party Data Computing
    Pei, Hongmei
    Yang, Peng
    Du, Miao
    Liang, Zengyu
    Hu, Zhongjian
    [J]. COMPUTER NETWORKS, 2024, 253