Advanced Search
Volume 45 Issue 4
Apr.  2023
Turn off MathJax
Article Contents
YAN Xixi, FENG Suwei, TANG Yongli, YIN Pei. Multi-keyword Fuzzy Search Encryption Scheme Based on Blockchain[J]. Journal of Electronics & Information Technology, 2023, 45(4): 1346-1355. doi: 10.11999/JEIT220207
Citation: YAN Xixi, FENG Suwei, TANG Yongli, YIN Pei. Multi-keyword Fuzzy Search Encryption Scheme Based on Blockchain[J]. Journal of Electronics & Information Technology, 2023, 45(4): 1346-1355. doi: 10.11999/JEIT220207

Multi-keyword Fuzzy Search Encryption Scheme Based on Blockchain

doi: 10.11999/JEIT220207
Funds:  The Fundamental Research Funds for the Universities of Henan Province (NSFRF210312), The Youth Talent Support Program of Henan Association for Science and Technology (2021HYTP008)
  • Received Date: 2022-03-01
  • Rev Recd Date: 2022-05-24
  • Available Online: 2022-06-01
  • Publish Date: 2023-04-10
  • Considering the problem of multi-keyword fuzzy matching and user fairness in one-to-many data ciphertext sharing, a multi-keyword fuzzy search encryption scheme based on blockchain is proposed. An R-HashMap index structure is proposed. The secure index is constructed by using pairs coding function and position sensitive hash function, and the K-nearest neighbor algorithm is used to encrypt the index. The similarity between the query keyword vector and the index node is calculated by Euclidian distance measure, and the multi-keyword fuzzy ciphertext search is realized. In addition to eliminating the pre-defined dictionary and reducing the storage overhead, this scheme also realizes the update of the security index without increasing the search complexity. In addition, the combination of Ethereum blockchain technology and searchable encryption scheme avoids data tampering by malicious servers, and the use of smart contracts as trusted third parties for retrieval work can not only prevent keyword guessing attacks within cloud servers, but also solve the problem of incorrect retrieval results. Through security proof analysis, the proposed scheme not only satisfies the semantic security of adaptive keyword selection, but also can protect user privacy and data security. The experimental comparison between this program and other schemes proves that the program has better efficiency in terms of time and cost while ensuring accuracy.
  • loading
  • [1]
    SONG D X, WAGNER D, and PERRIG A. Practical techniques for searches on encrypted data[C]. 2000 IEEE Symposium on Security and Privacy, Berkeley, USA, 2000: 44–55.
    [2]
    LI Jin, WANG Qian, WANG Cong, et al. Fuzzy keyword search over encrypted data in cloud computing[C]. 2010 Proceedings IEEE INFOCOM, San Diego, USA, 2010: 1–5.
    [3]
    WANG Cong, REN Kui, YU Shucheng, et al. Achieving usable and privacy-assured similarity search over outsourced cloud data[C]. 2012 Proceedings IEEE INFOCOM, Orlando, USA, 2012: 441–445.
    [4]
    KUZU M, ISLAM M S, and KANTARCIOGLU M. Efficient similarity search over encrypted data[C]. The IEEE 28th International Conference on Data Engineering, Washington, USA, 2012: 1156–1167.
    [5]
    WANG Bing, YU Shucheng, LOU Wenjing, et al. Privacy-preserving multi-keyword fuzzy search over encrypted data in the cloud[C]. 2014 IEEE Conference on Computer Communications, Hong Kong, China, 2014: 2112–2120.
    [6]
    FU Zhangjie, WU Xinle, GUAN Chaowen, et al. Toward efficient multi-keyword fuzzy search over encrypted outsourced data with accuracy improvement[J]. IEEE Transactions on Information Forensics and Security, 2016, 11(12): 2706–2716. doi: 10.1109/TIFS.2016.2596138
    [7]
    MIAO Yinbin, LIU Ximeng, CHOO K K R, et al. Fair and dynamic data sharing framework in cloud-assisted internet of everything[J]. IEEE Internet of Things Journal, 2019, 6(4): 7201–7212. doi: 10.1109/JIOT.2019.2915123
    [8]
    LI Huige, ZHANG Fangguo, HE Jiejie, et al. A searchable symmetric encryption scheme using blockchain[EB/OL]. https://doi.org/10.48550/arxiv.1711.01030, 2017.
    [9]
    YANG Xiaodong, CHEN Guilan, WANG Meiding, et al. Multi-keyword certificateless searchable public key authenticated encryption scheme based on blockchain[J]. IEEE Access, 2020, 8: 158765–158777. doi: 10.1109/ACCESS.2020.3020841
    [10]
    周由胜, 陈律君. 基于区块链的细粒度云数据安全存储与删除方案[J]. 电子与信息学报, 2021, 43(7): 1856–1863. doi: 10.11999/JEIT200399

    ZHOU Yousheng and CHEN Lüjun. Secure storage and deletion based on blockchain for cloud data with fine-grained access control[J]. Journal of Electronics &Information Technology, 2021, 43(7): 1856–1863. doi: 10.11999/JEIT200399
    [11]
    QIN Xuanmei, HUANG Yongfeng, YANG Zhen, et al. A blockchain-based access control scheme with multiple attribute authorities for secure cloud data sharing[J]. Journal of Systems Architecture, 2021, 112: 101854. doi: 10.1016/j.sysarc.2020.101854
    [12]
    NAJAFI A, JAVADI H H S, and BAYAT M. Efficient and dynamic verifiable multi-keyword searchable symmetric encryption with full security[J]. Multimedia Tools and Applications, 2021, 80(17): 26049–26068. doi: 10.1007/s11042-021-10844-w
    [13]
    ZHU Liyan, XIAO Chuqiao, and GONG Xueqing. Keyword search in decentralized storage systems[J]. Electronics, 2020, 9(12): 2041. doi: 10.3390/electronics9122041
    [14]
    DATAR M, IMMORLICA N, INDYK P, et al. Locality-sensitive hashing scheme based on p-stable distributions[C]. The 20th annual Symposium on Computational Geometry, New York, USA, 2004: 253–262.
    [15]
    SZABO N. Formalizing and securing relationships on public networks[J]. First Monday, 1997, 2(9): 1–12.
    [16]
    CHAI Qi and GONG Gong. Verifiable symmetric searchable encryption for semi-honest-but-curious cloud servers[C]. 2012 IEEE International Conference on Communications, Ottawa, Canada, 2012: 917–922.
    [17]
    王恺璇, 李宇溪, 周福才, 等. 面向多关键字的模糊密文搜索方法[J]. 计算机研究与发展, 2017, 54(2): 348–360. doi: 10.7544/issn1000-1239.2017.20151125

    WANG Kaixuan, LI Yuxi, ZHOU Fucai, et al. Multi-keyword fuzzy search over encrypted data[J]. Journal of Computer Research and Development, 2017, 54(2): 348–360. doi: 10.7544/issn1000-1239.2017.20151125
    [18]
    CHEN Zhenwei, WU Axin, LI Yifei, et al. Blockchain-enabled public key encryption with multi-keyword search in cloud computing[J]. Security and Communication Networks, 2021, 2021: 66196891. doi: 10.1155/2021/6619689
    [19]
    FU Shaojing, ZHANG Qi, JIA Nan, et al. A privacy-preserving fuzzy search scheme supporting logic query over encrypted cloud data[J]. Mobile Networks and Applications, 2021, 26(4): 1574–1585. doi: 10.1007/s11036-019-01493-3
    [20]
    ZHU Xiangyang, DAI Hua, YI Xun, et al. MUSE: An efficient and accurate verifiable privacy-preserving multikeyword text search over encrypted cloud data[J]. Security and Communication Networks, 2017, 2017: 1923476. doi: 10.1155/2017/1923476
  • 加载中

Catalog

    通讯作者: 陈斌, bchen63@163.com
    • 1. 

      沈阳化工大学材料科学与工程学院 沈阳 110142

    1. 本站搜索
    2. 百度学术搜索
    3. 万方数据库搜索
    4. CNKI搜索

    Figures(3)  / Tables(4)

    Article Metrics

    Article views (906) PDF downloads(242) Cited by()
    Proportional views
    Related

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return