scispace - formally typeset
Proceedings ArticleDOI

Generalized pattern matching string search on encrypted data in cloud systems

Reads0
Chats0
TLDR
This paper proposes a scheme for Generalized Pattern-matching String-search on Encrypted data (GPSE) in cloud systems and implements two most commonly used pattern matching search functions on encrypted data, the substring matching and the longest-prefix-first matching.
Abstract
Searchable encryption is an important and challenging issue. It allows people to search on encrypted data. This is a very useful function when more and more people choose to host their data in the cloud and the cloud server is not fully trustable. Existing solutions for searchable encryption are only limited to some simple functions of search, such as boolean search or similarity search. In this paper, we propose a scheme for Generalized Pattern-matching String-search on Encrypted data (GPSE) in cloud systems. GPSE allows users to specify their search queries by using generalized wildcard-based string patterns (such as SQL-like patterns). It gives users great expressive power in specifying highly targeted search queries. In the framework of GPSE, we particularly implemented two most commonly used pattern matching search functions on encrypted data, the substring matching and the longest-prefix-first matching. We also prove that GPSE is secure under the known-plaintext model. Experiments over real data sets show that GPSE achieves high search accuracy.

read more

Content maybe subject to copyright    Report

Citations
More filters

Efficient Private Matching for Private Databases

TL;DR: This proposal summarizes the research so far, which has made significant contributions to the PM literature, and discusses the future work and identifies new directions considering both theoretical and practical aspects in relevant settings.
Posted Content

T-DB: Toward Fully Functional Transparent Encrypted Databases in DBaaS Framework.

TL;DR: This work addresses the conflict between secrecy and utilization of the relational database to be outsourced with a Transparent DataBase (T-DB) system strictly following the unmodified DBaaS framework.
Proceedings ArticleDOI

DLSH: a distribution-aware LSH scheme for approximate nearest neighbor query in cloud computing

TL;DR: The idea of DLSH is to leverage the principal components of the data distribution as the projection vectors of hash functions in LSH, further quantify the weight of each hash function and adjust the interval value in each hash table, to significantly decrease the time overhead of distance computation.
Book ChapterDOI

Detecting Local Machine Data Leakage in Real Time

TL;DR: Data privacy leaks are becoming a serious problem, and due to the third-party delivery of data in the cloud, it is not possible to guarantee real-time leak detection.
Book ChapterDOI

Secure Search and Storage Services in Cloud and Fog/Edge Computing

TL;DR: Wang et al. as mentioned in this paper proposed a hierarchical-attribute-based encryption (HABE) scheme to efficiently achieve fine-grained access control in clouds, and then they combined HABE and Proxy Re-Encryption (PRE) by incorporating time concept into PRE to achieve user revocation automatically.
References
More filters
Proceedings ArticleDOI

How to generate and exchange secrets

TL;DR: A new tool for controlling the knowledge transfer process in cryptographic protocol design is introduced and it is applied to solve a general class of problems which include most of the two-party cryptographic problems in the literature.
Journal ArticleDOI

Fast Pattern Matching in Strings

TL;DR: An algorithm is presented which finds all occurrences of one given string within another, in running time proportional to the sum of the lengths of the strings, showing that the set of concatenations of even palindromes, i.e., the language $\{\alpha \alpha ^R\}^*$, can be recognized in linear time.
Proceedings ArticleDOI

Searchable symmetric encryption: improved definitions and efficient constructions

TL;DR: In this paper, the authors proposed a searchable symmetric encryption (SSE) scheme for the multi-user setting, where queries to the server can be chosen adaptively during the execution of the search.
Proceedings ArticleDOI

Fuzzy Keyword Search over Encrypted Data in Cloud Computing

TL;DR: This paper formalizes and solves the problem of effective fuzzy keyword search over encrypted cloud data while maintaining keyword privacy, and exploits edit distance to quantify keywords similarity and develops an advanced technique on constructing fuzzy keyword sets, which greatly reduces the storage and representation overheads.
Proceedings ArticleDOI

Secure kNN computation on encrypted databases

TL;DR: A new asymmetric scalar-product-preserving encryption (ASPE) that preserves a special type of scalar product and is shown to resist practical attacks of a different background knowledge level, at a different overhead cost.
Related Papers (5)