Verifiable Fuzzy Multi-Keyword Search Over Encrypted Data With Adaptive Security

被引:19
|
作者
Tong, Qiuyun [1 ,2 ]
Miao, Yinbin [1 ,2 ]
Weng, Jian [3 ]
Liu, Ximeng [4 ]
Choo, Kim-Kwang Raymond [5 ]
Deng, Robert H. H. [6 ]
机构
[1] Xidian Univ, Sch Cyber Engn, Xian 710071, Shaanxi, Peoples R China
[2] Key Lab Blockchain & Cyberspace Governance Zhejian, Hangzhou 310007, Zhejiang, Peoples R China
[3] Jinan Univ, Coll Cyber Secur, Guangzhou 510632, Guangdong, Peoples R China
[4] Fuzhou Univ, Sch Math & Comp Sci, Key Lab Informat Secur Network Syst, Fuzhou 350108, Fujian, Peoples R China
[5] Univ Texas San Antonio, Dept Informat Syst & Cyber Secur, San Antonio, TX 78249 USA
[6] Singapore Management Univ, Sch Informat Syst, Singapore 178902, Singapore
基金
中国国家自然科学基金;
关键词
Adaptive security; fuzzy multi-keyword search; result verification; symmetric searchable encryption; PRIVACY;
D O I
10.1109/TKDE.2022.3152033
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
To ensure the security of outsourced data without affecting data availability, one can use Symmetric Searchable Encryption (SSE) to achieve search over encrypted data. Considering that query users may search with misspelled words, the fuzzy search should be supported. However, conventional privacy-preserving fuzzy multi-keyword search schemes are incapable of achieving the result verification and adaptive security. To solve the above challenging issues, in this paper we propose a Verifiable Fuzzy multi-keyword Search scheme with Adaptive security (VFSA). VFSA first employs the locality sensitive hashing to hash the misspelled and correct keywords to the same positions, then designs a twin Bloom filter for each document to store and mask all keywords contained in the document, next constructs an index tree based on the graph-based keyword partition algorithm to achieve adaptive sublinear retrieval, finally combines the Merkle hash tree structure with the adapted multiset accumulator to check the correctness and completeness of search results. Our formal security analysis shows that VFSA is secure under the IND-CKA2 model and achieves query authentication. Our empirical experiments using the real-world dataset demonstrate the practicality of VFSA.
引用
下载
收藏
页码:5386 / 5399
页数:14
相关论文
共 50 条
  • [21] Multi-Keyword search over encrypted data with scoring and search pattern obfuscation
    Cengiz Orencik
    Ayse Selcuk
    Erkay Savas
    Murat Kantarcioglu
    International Journal of Information Security, 2016, 15 : 251 - 269
  • [22] Privacy-Preserving Multi-Keyword Fuzzy Search over Outsourced Encrypted Cloud Data
    Shi, Xiu-jin
    Yang, Ling-zhen
    COMPUTER SCIENCE AND TECHNOLOGY (CST2016), 2017, : 505 - 513
  • [23] Dynamic multi-keyword fuzzy ranked search with leakage resilience over encrypted cloud data
    Zhou Yousheng
    Huang Miao
    Liu Yuanni
    Chen Zigang
    The Journal of China Universities of Posts and Telecommunications, 2023, 30 (02) : 83 - 95
  • [24] Toward Efficient Multi-Keyword Fuzzy Search Over Encrypted Outsourced Data With Accuracy Improvement
    Fu, Zhangjie
    Wu, Xinle
    Guan, Chaowen
    Sun, Xingming
    Ren, Kui
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2016, 11 (12) : 2706 - 2716
  • [25] Dynamic multi-keyword fuzzy ranked search with leakage resilience over encrypted cloud data
    Zhou Y.
    Huang M.
    Liu Y.
    Chen Z.
    Journal of China Universities of Posts and Telecommunications, 2023, 30 (02): : 83 - 95
  • [26] An improved multi-keyword ranked search over encrypted cloud data
    Xia, Taijun
    2017 4TH INTERNATIONAL CONFERENCE ON INFORMATION SCIENCE AND CONTROL ENGINEERING (ICISCE), 2017, : 177 - 182
  • [27] Verifiable Attribute-Based Multi-Keyword Search over Encrypted Cloud Data in Multi-Owner Setting
    Fan, Yaqing
    Liu, Zhenhua
    2017 IEEE SECOND INTERNATIONAL CONFERENCE ON DATA SCIENCE IN CYBERSPACE (DSC), 2017, : 441 - 449
  • [28] Efficient Verifiable Fuzzy Keyword Search over Encrypted Data in Cloud Computing
    Wang, Jianfeng
    Ma, Hua
    Tang, Qiang
    Li, Jin
    Zhu, Hui
    Ma, Siqi
    Chen, Xiaofeng
    COMPUTER SCIENCE AND INFORMATION SYSTEMS, 2013, 10 (02) : 667 - 684
  • [29] Novel Multi-Keyword Search on Encrypted Data in the Cloud
    Wu, Yunyun
    Hou, Jingyu
    Liu, Jing
    Zhou, Wanlei
    Yao, Shaowen
    IEEE ACCESS, 2019, 7 : 31984 - 31996
  • [30] Fuzzy Multi-Keyword Query on Encrypted Data in the Cloud
    Shi, Xiu-jin
    Hu, Sheng-ping
    2016 4TH INTL CONF ON APPLIED COMPUTING AND INFORMATION TECHNOLOGY/3RD INTL CONF ON COMPUTATIONAL SCIENCE/INTELLIGENCE AND APPLIED INFORMATICS/1ST INTL CONF ON BIG DATA, CLOUD COMPUTING, DATA SCIENCE & ENGINEERING (ACIT-CSII-BCD), 2016, : 419 - 425