scispace - formally typeset
Open AccessJournal ArticleDOI

Enabling Efficient Verifiable Fuzzy Keyword Search Over Encrypted Data in Cloud Computing

TLDR
A novel verifiable fuzzy keyword search scheme over encrypted cloud data is proposed and an authentication label is generated for each fuzzy keyword to verify the authenticity of the returned ciphertexts.
Abstract
Searchable encryption can support data user to selectively retrieve the cipher documents over encrypted cloud data by keyword-based search. Most of the existing searchable encryption schemes only focus on the exact keyword search. When data user makes spelling errors, these schemes fail to return the result of interest. In searchable encryption, the cloud server might return the invalid result to data user for saving the computation cost or other reasons. Therefore, these exact keyword search schemes find little practical significance in real-world applications. In order to address these issues, we propose a novel verifiable fuzzy keyword search scheme over encrypted cloud data. For the purpose of introducing this scheme, we first propose a verifiable exact keyword search scheme and then extend this scheme to the fuzzy keyword search scheme. In the fuzzy keyword search scheme, we employ the linked list as our secure index to achieve the efficient storage. We construct a linked list with three nodes for each exact keyword and generate a fuzzy keyword set for it. To reduce the computation cost and the storage space, we generate one index vector for each fuzzy keyword set, rather than each fuzzy keyword. To resist malicious behaviors of the cloud server, we generate an authentication label for each fuzzy keyword to verify the authenticity of the returned ciphertexts. Through security analysis and experiment evaluation, we show that our proposed schemes are secure and efficient.

read more

Citations
More filters
Journal ArticleDOI

Security and privacy protection in cloud computing: Discussions and challenges

TL;DR: This work introduces some privacy security risks of cloud computing and proposes a comprehensive privacy security protection framework, and shows and discusses the research progress of several technologies, such as access control; ciphertext policy attribute-based encryption (CP-ABE); key policy attributes based encryption (KP-ABe); and multi-tenant, trust, and a combination of multiple technologies.
Journal ArticleDOI

Towards Achieving Keyword Search over Dynamic Encrypted Cloud Data with Symmetric-Key Based Verification

TL;DR: A novel Accumulative Authentication Tag (AAT) based on the symmetric-key cryptography to generate an authentication tag for each keyword is designed and the security analysis and the performance evaluation results show that the proposed scheme is secure and efficient.
Journal ArticleDOI

Efficient dynamic multi-keyword fuzzy search over encrypted cloud data

TL;DR: This paper proposes an efficient dynamic multi-keyword fuzzy search scheme for encrypted cloud data to support dynamic file updates and demonstrates that this scheme is more efficient than existing similar schemes.
Journal ArticleDOI

Checking Only When It Is Necessary: Enabling Integrity Auditing Based on the Keyword With Sensitive Information Privacy for Encrypted Cloud Data

TL;DR: Wang et al. as discussed by the authors proposed a new paradigm called integrity auditing based on the keyword with sensitive information privacy for encrypted cloud data, which is designed for one of the most common scenario, that is, the user concerns the integrity of a portion of encrypted cloud files that contain his/her interested keywords.
References
More filters
Proceedings ArticleDOI

Practical techniques for searches on encrypted data

TL;DR: This work describes the cryptographic schemes for the problem of searching on encrypted data and provides proofs of security for the resulting crypto systems, and presents simple, fast, and practical algorithms that are practical to use today.
Proceedings ArticleDOI

Searchable symmetric encryption: improved definitions and efficient constructions

TL;DR: In this paper, the authors proposed a searchable symmetric encryption (SSE) scheme for the multi-user setting, where queries to the server can be chosen adaptively during the execution of the search.
Journal ArticleDOI

Searchable symmetric encryption: Improved definitions and efficient constructions

TL;DR: This paper begins by reviewing existing notions of security and proposes new and stronger security definitions, and presents two constructions that show secure under these new definitions and are more efficient than all previous constructions.
Journal ArticleDOI

A Secure and Dynamic Multi-Keyword Ranked Search Scheme over Encrypted Cloud Data

TL;DR: This paper constructs a special tree-based index structure and proposes a “Greedy Depth-first Search” algorithm to provide efficient multi-keyword ranked search over encrypted cloud data, which simultaneously supports dynamic update operations like deletion and insertion of documents.
Proceedings ArticleDOI

Fuzzy Keyword Search over Encrypted Data in Cloud Computing

TL;DR: This paper formalizes and solves the problem of effective fuzzy keyword search over encrypted cloud data while maintaining keyword privacy, and exploits edit distance to quantify keywords similarity and develops an advanced technique on constructing fuzzy keyword sets, which greatly reduces the storage and representation overheads.
Related Papers (5)