Fuzzy Keyword Search and Access Control over Ciphertexts in Cloud Computing

被引:12
|
作者
Zhu, Hong [1 ]
Mei, Zhuolin [1 ]
Wu, Bing [1 ]
Li, Hongbo [1 ]
Cui, Zongmin [2 ]
机构
[1] Huazhong Univ Sci & Technol, Sch Comp Sci & Technol, Wuhan, Hubei, Peoples R China
[2] Jiujiang Univ, Sch Informat Sci & Technol, Jiujiang, Jiangxi, Peoples R China
关键词
Fuzzy keyword search; Access control; Encryption; ENCRYPTED DATA; PRIVACY;
D O I
10.1007/978-3-319-60055-0_13
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the rapid development of cloud computing, more and more data owners are motivated to outsource their data to cloud for various benefits. Due to serious privacy concerns, sensitive data should be encrypted before being outsourced to the cloud. However, this results that effective data utilization becomes a very challenging task, such as keyword search over ciphertexts. Although many searchable encryption methods have been proposed, they only support exact keyword search. In our paper, we propose a method which could support both the fuzzy keyword search and access control over ciphertexts. Our proposed method achieves fuzzy keyword search and access control through algorithm design and Ciphertext-Policy Attribute-based Encryption. We present word pattern which can be used to balance the search efficiency and privacy. The experimental results demonstrate the efficiency of our method.
引用
收藏
页码:248 / 265
页数:18
相关论文
共 50 条
  • [1] Fuzzy Keyword Search Method over Ciphertexts supporting Access Control
    Mei, Zhuolin
    Wu, Bin
    Tian, Shengli
    Ruan, Yonghui
    Cui, Zongmin
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2017, 11 (11): : 5671 - 5693
  • [2] Keyword Search with Access Control over Encrypted Data in Cloud Computing
    Shen, Zhirong
    Shu, Jiwu
    Xue, Wei
    2014 IEEE 22ND INTERNATIONAL SYMPOSIUM OF QUALITY OF SERVICE (IWQOS), 2014, : 87 - 92
  • [3] Fuzzy Keyword Search over Encrypted Data in Cloud Computing
    Li, Jin
    Wang, Qian
    Wang, Cong
    Cao, Ning
    Ren, Kui
    Lou, Wenjing
    2010 PROCEEDINGS IEEE INFOCOM, 2010,
  • [4] Implementation of Fuzzy Keyword Search Over Encrypted Data in Cloud Computing
    Shekokar, Narendra
    Sampat, Kunjita
    Chandawalla, Chandni
    Shah, Jahnavi
    INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING TECHNOLOGIES AND APPLICATIONS (ICACTA), 2015, 45 : 499 - 505
  • [5] Keyword Search With Access Control Over Encrypted Cloud Data
    Shen, Zhirong
    Shu, Jiwu
    Xue, Wei
    IEEE SENSORS JOURNAL, 2017, 17 (03) : 858 - 868
  • [6] Efficient Verifiable Fuzzy Keyword Search over Encrypted Data in Cloud Computing
    Wang, Jianfeng
    Ma, Hua
    Tang, Qiang
    Li, Jin
    Zhu, Hui
    Ma, Siqi
    Chen, Xiaofeng
    COMPUTER SCIENCE AND INFORMATION SYSTEMS, 2013, 10 (02) : 667 - 684
  • [7] Fuzzy Keyword Search Over Encrypted Data in Cloud Computing: An Extensive Analysis
    Smriti, Manya
    Daruka, Sameeksha
    Gupta, Khyati
    Krishnan, S. Siva Rama
    Lecture Notes on Data Engineering and Communications Technologies, 2022, 111 : 137 - 150
  • [8] Fuzzy Keyword Search over Encrypted Cloud Data with Dynamic Fine-grained Access Control
    Shan, Boshen
    Yao, Yuanzhi
    Li, Weihai
    Zuo, Xiaodong
    Yu, Nenghai
    2022 IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS, TRUSTCOM, 2022, : 1340 - 1347
  • [9] Enabling Efficient Verifiable Fuzzy Keyword Search Over Encrypted Data in Cloud Computing
    Ge, Xinrui
    Yu, Jia
    Hu, Chengyu
    Zhang, Hanlin
    Hao, Rong
    IEEE ACCESS, 2018, 6 : 45725 - 45739
  • [10] Encrypted Keyword Search in Cloud Computing using Fuzzy Logic
    Yadav, Manish Kumar
    Gugal, Drishti
    Matkar, Shivani
    Waghmare, Sanket
    PROCEEDINGS OF 2019 1ST INTERNATIONAL CONFERENCE ON INNOVATIONS IN INFORMATION AND COMMUNICATION TECHNOLOGY (ICIICT 2019), 2019,