Efficient Fuzzy Search on Encrypted Data

被引:27
|
作者
Boldyreva, Alexandra [1 ]
Chenette, Nathan [2 ]
机构
[1] Georgia Inst Technol, Atlanta, GA 30332 USA
[2] Clemson Univ, Clemson, SC USA
来源
关键词
IDENTIFICATION; CONSTRUCTION;
D O I
10.1007/978-3-662-46706-0_31
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
We study the problem of efficient (sub-linear) fuzzy search on encrypted outsourced data, in the symmetric-key setting. In particular, a user who stores encrypted data on a remote untrusted server forms queries that enable the server to efficiently locate the records containing the requested keywords, even though the user may misspell keywords or provide noisy data in the query. We define an appropriate primitive, for a general closeness function on the message space, that we call efficiently fuzzy-searchable encryption (EFSE). Next we identify an optimal security notion for EFSE. We demonstrate that existing schemes do not meet our security definition and propose a new scheme that we prove secure under basic assumptions. Unfortunately, the scheme requires large ciphertext length, but we show that, in a sense, this space-inefficiency is unavoidable for a general, optimally-secure scheme. Seeking the right balance between efficiency and security, we then show how to construct schemes that are more efficient and satisfy a weaker security notion that we propose. To illustrate, we present and analyze a more space-efficient scheme for supporting fuzzy search on biometric data that achieves the weaker notion.
引用
收藏
页码:613 / 633
页数:21
相关论文
共 50 条
  • [1] Efficient search on encrypted data
    Joseph, LTA
    Samsudin, A
    Belaton, B
    [J]. 2005 13th IEEE International Conference on Networks Jointly held with the 2005 7th IEEE Malaysia International Conference on Communications, Proceedings 1 and 2, 2005, : 352 - 357
  • [2] An Efficient Attack on A Fuzzy Keyword Search Scheme over Encrypted Data
    Zheng, Minghui
    Zhou, Huihua
    [J]. 2013 IEEE 15TH INTERNATIONAL CONFERENCE ON HIGH PERFORMANCE COMPUTING AND COMMUNICATIONS & 2013 IEEE INTERNATIONAL CONFERENCE ON EMBEDDED AND UBIQUITOUS COMPUTING (HPCC_EUC), 2013, : 1647 - 1650
  • [3] Efficient Verifiable Fuzzy Keyword Search over Encrypted Data in Cloud Computing
    Wang, Jianfeng
    Ma, Hua
    Tang, Qiang
    Li, Jin
    Zhu, Hui
    Ma, Siqi
    Chen, Xiaofeng
    [J]. COMPUTER SCIENCE AND INFORMATION SYSTEMS, 2013, 10 (02) : 667 - 684
  • [4] Efficient Multi-Keyword Fuzzy Search on Encrypted Data in Cloud Storage
    Li, Xiehua
    Cui, Yaping
    Zhou, Maoren
    Zhang, Cao
    Wang, Yanlong
    [J]. 2017 4TH INTERNATIONAL CONFERENCE ON INFORMATION SCIENCE AND CONTROL ENGINEERING (ICISCE), 2017, : 288 - 294
  • [5] Research on Fuzzy Search on Encrypted Data in Cloud
    Sun Hexu
    Sun Zexian
    Lin Tao
    [J]. AGRO FOOD INDUSTRY HI-TECH, 2017, 28 (03): : 3100 - 3106
  • [6] Efficient Fuzzy Keyword Search Over Encrypted Medical and Health Data in Hybrid Cloud
    Huang, Meidong
    Xie, Weixin
    Zhang, Peng
    [J]. JOURNAL OF MEDICAL IMAGING AND HEALTH INFORMATICS, 2017, 7 (04) : 867 - 874
  • [7] Efficient dynamic multi-keyword fuzzy search over encrypted cloud data
    Zhong, Hong
    Li, Zhanfei
    Cui, Jie
    Sun, Yue
    Liu, Lu
    [J]. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2020, 149
  • [8] Enabling Efficient Verifiable Fuzzy Keyword Search Over Encrypted Data in Cloud Computing
    Ge, Xinrui
    Yu, Jia
    Hu, Chengyu
    Zhang, Hanlin
    Hao, Rong
    [J]. IEEE ACCESS, 2018, 6 : 45725 - 45739
  • [9] Efficient wildcard search over encrypted data
    Changhui Hu
    Lidong Han
    [J]. International Journal of Information Security, 2016, 15 : 539 - 547
  • [10] Efficient Similarity Search over Encrypted Data
    Kuzu, Mehmet
    Islam, Mohammad Saiful
    Kantarcioglu, Murat
    [J]. 2012 IEEE 28TH INTERNATIONAL CONFERENCE ON DATA ENGINEERING (ICDE), 2012, : 1156 - 1167