Verifiable Fuzzy Multi-Keyword Search Over Encrypted Data With Adaptive Security

被引:19
|
作者
Tong, Qiuyun [1 ,2 ]
Miao, Yinbin [1 ,2 ]
Weng, Jian [3 ]
Liu, Ximeng [4 ]
Choo, Kim-Kwang Raymond [5 ]
Deng, Robert H. H. [6 ]
机构
[1] Xidian Univ, Sch Cyber Engn, Xian 710071, Shaanxi, Peoples R China
[2] Key Lab Blockchain & Cyberspace Governance Zhejian, Hangzhou 310007, Zhejiang, Peoples R China
[3] Jinan Univ, Coll Cyber Secur, Guangzhou 510632, Guangdong, Peoples R China
[4] Fuzhou Univ, Sch Math & Comp Sci, Key Lab Informat Secur Network Syst, Fuzhou 350108, Fujian, Peoples R China
[5] Univ Texas San Antonio, Dept Informat Syst & Cyber Secur, San Antonio, TX 78249 USA
[6] Singapore Management Univ, Sch Informat Syst, Singapore 178902, Singapore
基金
中国国家自然科学基金;
关键词
Adaptive security; fuzzy multi-keyword search; result verification; symmetric searchable encryption; PRIVACY;
D O I
10.1109/TKDE.2022.3152033
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
To ensure the security of outsourced data without affecting data availability, one can use Symmetric Searchable Encryption (SSE) to achieve search over encrypted data. Considering that query users may search with misspelled words, the fuzzy search should be supported. However, conventional privacy-preserving fuzzy multi-keyword search schemes are incapable of achieving the result verification and adaptive security. To solve the above challenging issues, in this paper we propose a Verifiable Fuzzy multi-keyword Search scheme with Adaptive security (VFSA). VFSA first employs the locality sensitive hashing to hash the misspelled and correct keywords to the same positions, then designs a twin Bloom filter for each document to store and mask all keywords contained in the document, next constructs an index tree based on the graph-based keyword partition algorithm to achieve adaptive sublinear retrieval, finally combines the Merkle hash tree structure with the adapted multiset accumulator to check the correctness and completeness of search results. Our formal security analysis shows that VFSA is secure under the IND-CKA2 model and achieves query authentication. Our empirical experiments using the real-world dataset demonstrate the practicality of VFSA.
引用
下载
收藏
页码:5386 / 5399
页数:14
相关论文
共 50 条
  • [1] Verifiable Multi-Keyword Fuzzy Search over Encrypted Data in the Cloud
    Wei, Xue
    Zhang, Hua
    PROCEEDINGS OF THE 2016 4TH INTERNATIONAL CONFERENCE ON ADVANCED MATERIALS AND INFORMATION TECHNOLOGY PROCESSING (AMITP 2016), 2016, 60 : 271 - 277
  • [2] VRFMS: Verifiable Ranked Fuzzy Multi-Keyword Search Over Encrypted Data
    Li, Xinghua
    Tong, Qiuyun
    Zhao, Jinwei
    Miao, Yinbin
    Ma, Siqi
    Weng, Jian
    Ma, Jianfeng
    Choo, Kim-Kwang Raymond
    IEEE TRANSACTIONS ON SERVICES COMPUTING, 2023, 16 (01) : 698 - 710
  • [3] Efficient verifiable multi-keyword search over encrypted data
    Miao, Yinbin
    Ma, Jianfeng
    Zhang, Junwei
    Liu, Zhiquan
    Xi'an Dianzi Keji Daxue Xuebao/Journal of Xidian University, 2017, 44 (04): : 18 - 23
  • [4] Multi-keyword Fuzzy Search over Encrypted Cloud Storage Data
    Li, Mengmeng
    Wang, Guijuan
    Liu, Suhui
    Yu, Jiguo
    2020 INTERNATIONAL CONFERENCE ON IDENTIFICATION, INFORMATION AND KNOWLEDGE IN THE INTERNET OF THINGS (IIKI2020), 2021, 187 : 365 - 370
  • [5] Verifiable and Dynamic Multi-Keyword Search Over Encrypted Cloud Data Using Bitmap
    Li, Feng
    Ma, Jianfeng
    Miao, Yinbin
    Jiang, Qi
    Liu, Ximeng
    Choo, Kim-Kwang Raymond
    IEEE TRANSACTIONS ON CLOUD COMPUTING, 2023, 11 (01) : 336 - 348
  • [6] Enabling efficient and verifiable multi-keyword ranked search over encrypted cloud data
    Jiang, Xiuxiu
    Yu, Jia
    Yan, Jingbo
    Hao, Rong
    INFORMATION SCIENCES, 2017, 403 : 22 - 41
  • [7] Towards efficient verifiable multi-keyword search over encrypted data based on blockchain
    Xu, Wanshan
    Zhang, Jianbiao
    Yuan, Yilin
    Wang, Xiao
    Liu, Yanhui
    Khalid, Muhammad Irfan
    PEERJ COMPUTER SCIENCE, 2022, 8
  • [8] Adaptive Multi-keyword Ranked Search Over Encrypted Cloud Data
    Mashauri, Daudi
    Li, Ruixuan
    Han, Hongmu
    Gu, Xiwu
    Xu, Zhiyong
    Xu, Cheng-zhong
    COLLABORATIVE COMPUTING: NETWORKING, APPLICATIONS, AND WORKSHARING, COLLABORATECOM 2015, 2016, 163 : 3 - 13
  • [9] Efficient dynamic multi-keyword fuzzy search over encrypted cloud data
    Zhong, Hong
    Li, Zhanfei
    Cui, Jie
    Sun, Yue
    Liu, Lu
    JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2020, 149
  • [10] VMKDO: Verifiable multi-keyword search over encrypted cloud data for dynamic data-owner
    Miao, Yinbin
    Ma, Jianfeng
    Liu, Ximeng
    Liu, Zhiquan
    Shen, Limin
    Wei, Fushan
    PEER-TO-PEER NETWORKING AND APPLICATIONS, 2018, 11 (02) : 287 - 297