scispace - formally typeset
Proceedings ArticleDOI

Generalized pattern matching string search on encrypted data in cloud systems

Reads0
Chats0
TLDR
This paper proposes a scheme for Generalized Pattern-matching String-search on Encrypted data (GPSE) in cloud systems and implements two most commonly used pattern matching search functions on encrypted data, the substring matching and the longest-prefix-first matching.
Abstract: 
Searchable encryption is an important and challenging issue. It allows people to search on encrypted data. This is a very useful function when more and more people choose to host their data in the cloud and the cloud server is not fully trustable. Existing solutions for searchable encryption are only limited to some simple functions of search, such as boolean search or similarity search. In this paper, we propose a scheme for Generalized Pattern-matching String-search on Encrypted data (GPSE) in cloud systems. GPSE allows users to specify their search queries by using generalized wildcard-based string patterns (such as SQL-like patterns). It gives users great expressive power in specifying highly targeted search queries. In the framework of GPSE, we particularly implemented two most commonly used pattern matching search functions on encrypted data, the substring matching and the longest-prefix-first matching. We also prove that GPSE is secure under the known-plaintext model. Experiments over real data sets show that GPSE achieves high search accuracy.

read more

Content maybe subject to copyright    Report

Citations
More filters
Journal ArticleDOI

Anonymous Privacy-Preserving Task Matching in Crowdsourcing

TL;DR: This paper systematically analyzes the privacy leaks and potential threats in the task matching and proposes a single-keyword task matching scheme for the multirequester/multiworker crowdsourcing with efficient worker revocation that is secure and feasible.
Journal ArticleDOI

Secure Multi-keyword Fuzzy Searches With Enhanced Service Quality in Cloud Computing

TL;DR: Wang et al. as mentioned in this paper proposed matrix-based multi-keyword fuzzy search (M2FS) schemes, which support approximate keyword matching by exploiting the indecomposable property of primes.
Journal ArticleDOI

Prime Inner Product Encoding for Effective Wildcard-based Multi-Keyword Fuzzy Search

TL;DR: A prime inner product encoding (PIPE) scheme, which makes use of the indecomposable property of prime numbers to provide efficient, highly accurate, and flexible multi-keyword fuzzy search.
Proceedings ArticleDOI

A Novel Verifiable and Dynamic Fuzzy Keyword Search Scheme over Encrypted Data in Cloud Computing

TL;DR: A verifiable and dynamic fuzzy keywords search (VDFS) scheme to offer secure fuzzy keyword search, update the outsourced document collection and verify the authenticity of the search result is proposed and proved universally composable (UC) security by rigorous security analysis.
Journal ArticleDOI

EliMFS: Achieving Efficient, Leakage-Resilient, and Multi-Keyword Fuzzy Search on Encrypted Cloud Data

TL;DR: An Efficient Leakage-resilient Multi-keyword Fuzzy Search (EliMFS) framework over encrypted cloud data is proposed and two specific schemes to resist these potential attacks in different threat models are proposed.
References
More filters
Journal ArticleDOI

Computationally Secure Pattern Matching in the Presence of Malicious Adversaries

TL;DR: The construction guarantees full simulation in the presence of malicious, polynomial-time adversaries (assuming the hardness of DDH assumption) and exhibits computation and communication costs of O(n+m) group elements in a constant round complexity.
Journal ArticleDOI

5PM: Secure pattern matching

TL;DR: The problem of secure pattern matching that allows single-character wildcards and substring matching in the malicious stand-alone setting is considered and the first secure expressive pattern matching protocol designed to optimize round complexity by carefully specifying the entire protocol round by round is considered.
Book ChapterDOI

Efficient and secure generalized pattern matching via fast fourier transform

TL;DR: This work proposes constant-round protocols that exhibit linear communication and quasilinear computational costs with simulation-based security and relies on a well-known technique for pattern matching proposed by Fischer and Paterson in 1974 and based on the Fast Fourier Transform.
Journal ArticleDOI

Known‐plaintext attack on secure kNN computation on encrypted databases

TL;DR: It is shown that contrary to claims, the enhanced asymmetric scalar-product-preserving encryption cannot resist known-plaintext attack by directly solving a secret key from a set of known plaintext–ciphertext pairs.
Related Papers (5)