Advanced Search
Volume 39 Issue 7
Jul.  2017
Turn off MathJax
Article Contents
ZHU Xiaoyu, LIU Qin, WANG Guojun. Fuzzy Searchable Encryption Scheme Supporting Verification in Cloud Storage[J]. Journal of Electronics & Information Technology, 2017, 39(7): 1741-1747. doi: 10.11999/JEIT160971
Citation: ZHU Xiaoyu, LIU Qin, WANG Guojun. Fuzzy Searchable Encryption Scheme Supporting Verification in Cloud Storage[J]. Journal of Electronics & Information Technology, 2017, 39(7): 1741-1747. doi: 10.11999/JEIT160971

Fuzzy Searchable Encryption Scheme Supporting Verification in Cloud Storage

doi: 10.11999/JEIT160971
Funds:

The National Natural Science Foundation of China (61632009, 61472451, 61272151, 61402161)

  • Received Date: 2016-09-26
  • Rev Recd Date: 2017-02-20
  • Publish Date: 2017-07-19
  • Most of the existing searchable encryption schemes can not support fuzzy keyword search, and can not resist threats from malicious server, that the cloud computing needs to provide an encryption scheme, which can support typos and verification of the search result. Considering the data is updated frequently in cloud computing, a verifiable fuzzy searchable encryption scheme in dynamic cloud storage is presented. The proposed scheme constructs the fuzzy keyword set based on edit distance technique, and builds secure index based on pseudorandom function and random permutation, so as to protect the users data privacy. The RSA accumulator and Hash function are used to verify the correctness of the search result, in order to detect the cheating behavior of the malicious attacker. The security analysis proves that the proposed scheme is privacy preserving and verifiable. The experiment results show that the proposed scheme is efficient.
  • loading
  • SONG D X, WAGNER D, and PERRIG A. Practical techniques for searches on encrypted data[C]. IEEE Symposium on Security Privacy, Berkeley, CA, USA, 2000: 44-55.
    林鹏, 江颉, 陈铁明. 云环境下关键词搜索加密算法研究[J]. 通信学报, 2015, 36(Z1): 1-7. doi: 10.11959/j.issn.1000-436x. 2015307.
    LIN Peng, JIANG Jie, and CHEN Tieming. Application of keyword searchable encryption in cloud[J]. Journal on Communications, 2015, 36(Z1): 1-7. doi: 10.11959/j.issn. 1000-436x.2015307.
    CAO Ning, WANG Cong, LI Ming, et al. Privacy-preserving multi-keyword ranked search over encrypted cloud data[J]. IEEE Transactions on Parallel and Distributed Systems, 2014, 25(1): 222-233. doi: 10.1109/TPDS.2013.45.
    XIA Zhihua, WANG Xinhui, SUN Xingming, et al. A secure and dynamic multi-keyword ranked search scheme over encrypted cloud data[J]. IEEE Transactions on Parallel and Distributed Systems, 2016, 27(2): 340-352. doi: 10. 1109/TPDS.2015.2401003.
    FU Zhangjie, SUN Xingming, LIU Qi, et al. Achieving efficient cloud search services: Multi-keyword ranked search over encrypted cloud data supporting parallel computing[J]. IEICE Transactions on Communications, 2015, 98(1): 190-200. doi: 10.1587/transcom.E98.B.190.
    李真, 蒋瀚, 赵明昊. 一个自主授权的多用户可搜索加密方案[J]. 计算机研究与发展, 2015, 52(10): 2313-2322. doi: 10.7544 /issn1000-1239.2015.20150504.
    LI Zhen, JIANG Han, and ZHAO Minghao. A discretionary searchable encryption scheme in multi-user settings[J]. Journal of Computer Research and Development, 2015, 52(10): 2313-2322. doi: 10.7544/issn1000-1239.2015.20150504.
    LI Jin, WANG Qian, WANG Cong, et al. Fuzzy keyword search over encrypted data in cloud computing[C]. IEEE International Conference on Computer Communications, San Diego, CA, USA, 2010: 1-5.
    CHAI Qi and GONG Guang. Verifiable symmetric searchable encryption for semi-honest-but-curious cloud servers[C]. IEEE International Conference on Communications, Ottawa, Canada, 2012: 917-922.
    WANG J, YU X, and ZHAO M. Fault-tolerant verifiable keyword symmetric searchable encryption in hybrid cloud[J]. International Journal of Network Security, 2015, 17(4): 471-483.
    SUN W, LIU X, LOU W, et al. Catch you if you lie to me: Efficient verifiable conjunctive keyword search over large dynamic encrypted cloud data[C]. IEEE Conference on Computer Communications, Hong Kong, China, 2015: 2110-2118.
    ZHANG W, LIN Y, and GU Q. Catch you if you misbehave: Ranked keyword search results verification in cloud computing[J]. IEEE Transactions on Cloud Computing, 2015, 6(1): 1-14. doi: 10.1109/TCC.2015.2481389.
    KUROSAWA K and OHTAKI Y. UC-secure searchable symmetric encryption[C]. International Conference on Financial Cryptography and Data Security, Kralendijk, Bonaire, 2012: 285-298.
    KAMARA S, PAPAMANTHOU C, and ROEDER T. Dynamic searchable symmetric encryption[C]. ACM Conference on Computer and Communications Security, Raleigh, NC, USA, 2012: 965-976.
    KAMARA S and PAPAMANTHOU C. Parallel and dynamic searchable symmetric encryption[C]. International Conference on Financial Cryptography and Data Security, Okinawa, Japan, 2013: 258-274.
    KUROSAWA K and OHTAKI Y. How to update documents verifiably in searchable symmetric encryption[C]. International Conference on Cryptology and Network Security, Paraty, Brazil, 2013: 309-328.
    GENNARO R, HALEVI S, and RABIN T. Secure hash- and-sign signatures without the random oracle[C]. International Conference on the Theory and Applications of Cryptographic Techniques, Prague, Czech Republic, 1999: 123-139.
  • 加载中

Catalog

    通讯作者: 陈斌, bchen63@163.com
    • 1. 

      沈阳化工大学材料科学与工程学院 沈阳 110142

    1. 本站搜索
    2. 百度学术搜索
    3. 万方数据库搜索
    4. CNKI搜索

    Article Metrics

    Article views (1482) PDF downloads(355) Cited by()
    Proportional views
    Related

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return