Verifiable Fuzzy Multi-Keyword Search Over Encrypted Data With Adaptive Security

被引:19
|
作者
Tong, Qiuyun [1 ,2 ]
Miao, Yinbin [1 ,2 ]
Weng, Jian [3 ]
Liu, Ximeng [4 ]
Choo, Kim-Kwang Raymond [5 ]
Deng, Robert H. H. [6 ]
机构
[1] Xidian Univ, Sch Cyber Engn, Xian 710071, Shaanxi, Peoples R China
[2] Key Lab Blockchain & Cyberspace Governance Zhejian, Hangzhou 310007, Zhejiang, Peoples R China
[3] Jinan Univ, Coll Cyber Secur, Guangzhou 510632, Guangdong, Peoples R China
[4] Fuzhou Univ, Sch Math & Comp Sci, Key Lab Informat Secur Network Syst, Fuzhou 350108, Fujian, Peoples R China
[5] Univ Texas San Antonio, Dept Informat Syst & Cyber Secur, San Antonio, TX 78249 USA
[6] Singapore Management Univ, Sch Informat Syst, Singapore 178902, Singapore
基金
中国国家自然科学基金;
关键词
Adaptive security; fuzzy multi-keyword search; result verification; symmetric searchable encryption; PRIVACY;
D O I
10.1109/TKDE.2022.3152033
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
To ensure the security of outsourced data without affecting data availability, one can use Symmetric Searchable Encryption (SSE) to achieve search over encrypted data. Considering that query users may search with misspelled words, the fuzzy search should be supported. However, conventional privacy-preserving fuzzy multi-keyword search schemes are incapable of achieving the result verification and adaptive security. To solve the above challenging issues, in this paper we propose a Verifiable Fuzzy multi-keyword Search scheme with Adaptive security (VFSA). VFSA first employs the locality sensitive hashing to hash the misspelled and correct keywords to the same positions, then designs a twin Bloom filter for each document to store and mask all keywords contained in the document, next constructs an index tree based on the graph-based keyword partition algorithm to achieve adaptive sublinear retrieval, finally combines the Merkle hash tree structure with the adapted multiset accumulator to check the correctness and completeness of search results. Our formal security analysis shows that VFSA is secure under the IND-CKA2 model and achieves query authentication. Our empirical experiments using the real-world dataset demonstrate the practicality of VFSA.
引用
下载
收藏
页码:5386 / 5399
页数:14
相关论文
共 50 条
  • [31] Achieving Authorized and Ranked Multi-keyword Search over Encrypted Cloud Data
    Li, Hongwei
    Liu, Dongxiao
    Jia, Kun
    Lin, Xiaodong
    2015 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2015, : 7450 - 7455
  • [32] A Practical and Secure Multi-Keyword Search Method over Encrypted Cloud Data
    Orencik, Cengiz
    Kantarcioglu, Murat
    Savas, Erkay
    2013 IEEE SIXTH INTERNATIONAL CONFERENCE ON CLOUD COMPUTING (CLOUD 2013), 2013, : 390 - 397
  • [33] Privacy Preserving Synonym Based Fuzzy Multi-Keyword Ranked Search Over Encrypted Cloud Data
    Mittal, Sneha A.
    Krishna, C. Rama
    2016 IEEE INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATION AND AUTOMATION (ICCCA), 2016, : 1187 - +
  • [34] Semantic Multi-Keyword Search over Encrypted Cloud Data with Privacy Preservation
    Hsieh, Fei-Ju
    Chin, Tai-Lin
    Huang, Chin-Ya
    Shen, Shan-Hsiang
    Shen, Chung-An
    2019 IEEE 90TH VEHICULAR TECHNOLOGY CONFERENCE (VTC2019-FALL), 2019,
  • [35] Dynamic secure multi-keyword ranked search over encrypted cloud data
    Hozhabr, Maryam
    Asghari, Parvaneh
    Javadi, Hamid Haj Seyyed
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2021, 61
  • [36] A Survey on Multi-Keyword Ranked Search Manipulations over Encrypted Cloud Data
    Ponnusamy, P. Priya
    Vidhyapriya, R.
    Maheswari, S. Uma
    2017 INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATION AND INFORMATICS (ICCCI), 2017,
  • [37] Blockchain Based Multi-keyword Similarity Search Scheme over Encrypted Data
    Li, Mingyue
    Jia, Chunfu
    Shao, Wei
    SECURITY AND PRIVACY IN COMMUNICATION NETWORKS (SECURECOMM 2020), PT II, 2020, 336 : 350 - 371
  • [38] A Personalized Multi-keyword Ranked Search Method Over Encrypted Cloud Data
    Tian, Xue
    Shen, Peisong
    Yang, Tengfei
    Chen, Chi
    Hu, Jiankun
    MOBILE NETWORKS AND MANAGEMENT (MONAMI 2017), 2018, 235 : 66 - 78
  • [39] An improved multi-keyword fuzzy search scheme based on BloomFilter over encrypted text
    Wu X.
    Yu N.-H.
    Zhang W.-M.
    Kongzhi yu Juece/Control and Decision, 2019, 34 (01): : 97 - 104
  • [40] A Secure Multi-Keyword Fuzzy Search with Polynomial Function for Encrypted Data in Cloud Computing
    Liu, I-Hsien
    Lin, Yu-Hsin
    Li, Jung-Shian
    Kuo, Wen-Chung
    Liu, Chuan-Gang
    PROCEEDINGS OF 2018 3RD INTERNATIONAL CONFERENCE ON COMPUTER AND COMMUNICATION SYSTEMS (ICCCS), 2018, : 41 - 45