Proceedings ArticleDOI
Generalized pattern matching string search on encrypted data in cloud systems
Dongsheng Wang,Xiaohua Jia,Cong Wang,Kan Yang,Shaojing Fu,Ming Xu +5 more
- pp 2101-2109
Reads0
Chats0
TLDR
This paper proposes a scheme for Generalized Pattern-matching String-search on Encrypted data (GPSE) in cloud systems and implements two most commonly used pattern matching search functions on encrypted data, the substring matching and the longest-prefix-first matching.Abstract:
Searchable encryption is an important and challenging issue. It allows people to search on encrypted data. This is a very useful function when more and more people choose to host their data in the cloud and the cloud server is not fully trustable. Existing solutions for searchable encryption are only limited to some simple functions of search, such as boolean search or similarity search. In this paper, we propose a scheme for Generalized Pattern-matching String-search on Encrypted data (GPSE) in cloud systems. GPSE allows users to specify their search queries by using generalized wildcard-based string patterns (such as SQL-like patterns). It gives users great expressive power in specifying highly targeted search queries. In the framework of GPSE, we particularly implemented two most commonly used pattern matching search functions on encrypted data, the substring matching and the longest-prefix-first matching. We also prove that GPSE is secure under the known-plaintext model. Experiments over real data sets show that GPSE achieves high search accuracy.read more
Citations
More filters
Efficient Private Matching for Private Databases
TL;DR: This proposal summarizes the research so far, which has made significant contributions to the PM literature, and discusses the future work and identifies new directions considering both theoretical and practical aspects in relevant settings.
Posted Content
T-DB: Toward Fully Functional Transparent Encrypted Databases in DBaaS Framework.
TL;DR: This work addresses the conflict between secrecy and utilization of the relational database to be outsourced with a Transparent DataBase (T-DB) system strictly following the unmodified DBaaS framework.
Proceedings ArticleDOI
DLSH: a distribution-aware LSH scheme for approximate nearest neighbor query in cloud computing
TL;DR: The idea of DLSH is to leverage the principal components of the data distribution as the projection vectors of hash functions in LSH, further quantify the weight of each hash function and adjust the interval value in each hash table, to significantly decrease the time overhead of distance computation.
Book ChapterDOI
Detecting Local Machine Data Leakage in Real Time
TL;DR: Data privacy leaks are becoming a serious problem, and due to the third-party delivery of data in the cloud, it is not possible to guarantee real-time leak detection.
Book ChapterDOI
Secure Search and Storage Services in Cloud and Fog/Edge Computing
TL;DR: Wang et al. as mentioned in this paper proposed a hierarchical-attribute-based encryption (HABE) scheme to efficiently achieve fine-grained access control in clouds, and then they combined HABE and Proxy Re-Encryption (PRE) by incorporating time concept into PRE to achieve user revocation automatically.
References
More filters
Proceedings ArticleDOI
How to generate and exchange secrets
TL;DR: A new tool for controlling the knowledge transfer process in cryptographic protocol design is introduced and it is applied to solve a general class of problems which include most of the two-party cryptographic problems in the literature.
Journal ArticleDOI
Fast Pattern Matching in Strings
TL;DR: An algorithm is presented which finds all occurrences of one given string within another, in running time proportional to the sum of the lengths of the strings, showing that the set of concatenations of even palindromes, i.e., the language $\{\alpha \alpha ^R\}^*$, can be recognized in linear time.
Proceedings ArticleDOI
Searchable symmetric encryption: improved definitions and efficient constructions
TL;DR: In this paper, the authors proposed a searchable symmetric encryption (SSE) scheme for the multi-user setting, where queries to the server can be chosen adaptively during the execution of the search.
Proceedings ArticleDOI
Fuzzy Keyword Search over Encrypted Data in Cloud Computing
TL;DR: This paper formalizes and solves the problem of effective fuzzy keyword search over encrypted cloud data while maintaining keyword privacy, and exploits edit distance to quantify keywords similarity and develops an advanced technique on constructing fuzzy keyword sets, which greatly reduces the storage and representation overheads.
Proceedings ArticleDOI
Secure kNN computation on encrypted databases
TL;DR: A new asymmetric scalar-product-preserving encryption (ASPE) that preserves a special type of scalar product and is shown to resist practical attacks of a different background knowledge level, at a different overhead cost.