Advanced Search
Volume 45 Issue 4
Apr.  2023
Turn off MathJax
Article Contents
Qinghua ZHANG, Guohong PANG, Xintai LI, Xueqiu ZHANG. Optimal Granularity Selection Method Based on Cost-sensitive Sequential Three-way Decisions[J]. Journal of Electronics & Information Technology, 2021, 43(10): 3001-3009. doi: 10.11999/JEIT200821
Citation: YAN Xixi, FENG Suwei, TANG Yongli, YIN Pei. Multi-keyword Fuzzy Search Encryption Scheme Based on Blockchain[J]. Journal of Electronics & Information Technology, 2023, 45(4): 1346-1355. doi: 10.11999/JEIT220207

Multi-keyword Fuzzy Search Encryption Scheme Based on Blockchain

doi: 10.11999/JEIT220207
Funds:  The Fundamental Research Funds for the Universities of Henan Province (NSFRF210312), The Youth Talent Support Program of Henan Association for Science and Technology (2021HYTP008)
  • Received Date: 2022-03-01
  • Rev Recd Date: 2022-05-24
  • Available Online: 2022-06-01
  • Publish Date: 2023-04-10
  • Considering the problem of multi-keyword fuzzy matching and user fairness in one-to-many data ciphertext sharing, a multi-keyword fuzzy search encryption scheme based on blockchain is proposed. An R-HashMap index structure is proposed. The secure index is constructed by using pairs coding function and position sensitive hash function, and the K-nearest neighbor algorithm is used to encrypt the index. The similarity between the query keyword vector and the index node is calculated by Euclidian distance measure, and the multi-keyword fuzzy ciphertext search is realized. In addition to eliminating the pre-defined dictionary and reducing the storage overhead, this scheme also realizes the update of the security index without increasing the search complexity. In addition, the combination of Ethereum blockchain technology and searchable encryption scheme avoids data tampering by malicious servers, and the use of smart contracts as trusted third parties for retrieval work can not only prevent keyword guessing attacks within cloud servers, but also solve the problem of incorrect retrieval results. Through security proof analysis, the proposed scheme not only satisfies the semantic security of adaptive keyword selection, but also can protect user privacy and data security. The experimental comparison between this program and other schemes proves that the program has better efficiency in terms of time and cost while ensuring accuracy.
  • [1]
    SONG D X, WAGNER D, and PERRIG A. Practical techniques for searches on encrypted data[C]. 2000 IEEE Symposium on Security and Privacy, Berkeley, USA, 2000: 44–55.
    [2]
    LI Jin, WANG Qian, WANG Cong, et al. Fuzzy keyword search over encrypted data in cloud computing[C]. 2010 Proceedings IEEE INFOCOM, San Diego, USA, 2010: 1–5.
    [3]
    WANG Cong, REN Kui, YU Shucheng, et al. Achieving usable and privacy-assured similarity search over outsourced cloud data[C]. 2012 Proceedings IEEE INFOCOM, Orlando, USA, 2012: 441–445.
    [4]
    KUZU M, ISLAM M S, and KANTARCIOGLU M. Efficient similarity search over encrypted data[C]. The IEEE 28th International Conference on Data Engineering, Washington, USA, 2012: 1156–1167.
    [5]
    WANG Bing, YU Shucheng, LOU Wenjing, et al. Privacy-preserving multi-keyword fuzzy search over encrypted data in the cloud[C]. 2014 IEEE Conference on Computer Communications, Hong Kong, China, 2014: 2112–2120.
    [6]
    FU Zhangjie, WU Xinle, GUAN Chaowen, et al. Toward efficient multi-keyword fuzzy search over encrypted outsourced data with accuracy improvement[J]. IEEE Transactions on Information Forensics and Security, 2016, 11(12): 2706–2716. doi: 10.1109/TIFS.2016.2596138
    [7]
    MIAO Yinbin, LIU Ximeng, CHOO K K R, et al. Fair and dynamic data sharing framework in cloud-assisted internet of everything[J]. IEEE Internet of Things Journal, 2019, 6(4): 7201–7212. doi: 10.1109/JIOT.2019.2915123
    [8]
    LI Huige, ZHANG Fangguo, HE Jiejie, et al. A searchable symmetric encryption scheme using blockchain[EB/OL]. https://doi.org/10.48550/arxiv.1711.01030, 2017.
    [9]
    YANG Xiaodong, CHEN Guilan, WANG Meiding, et al. Multi-keyword certificateless searchable public key authenticated encryption scheme based on blockchain[J]. IEEE Access, 2020, 8: 158765–158777. doi: 10.1109/ACCESS.2020.3020841
    [10]
    周由胜, 陈律君. 基于区块链的细粒度云数据安全存储与删除方案[J]. 电子与信息学报, 2021, 43(7): 1856–1863. doi: 10.11999/JEIT200399

    ZHOU Yousheng and CHEN Lüjun. Secure storage and deletion based on blockchain for cloud data with fine-grained access control[J]. Journal of Electronics &Information Technology, 2021, 43(7): 1856–1863. doi: 10.11999/JEIT200399
    [11]
    QIN Xuanmei, HUANG Yongfeng, YANG Zhen, et al. A blockchain-based access control scheme with multiple attribute authorities for secure cloud data sharing[J]. Journal of Systems Architecture, 2021, 112: 101854. doi: 10.1016/j.sysarc.2020.101854
    [12]
    NAJAFI A, JAVADI H H S, and BAYAT M. Efficient and dynamic verifiable multi-keyword searchable symmetric encryption with full security[J]. Multimedia Tools and Applications, 2021, 80(17): 26049–26068. doi: 10.1007/s11042-021-10844-w
    [13]
    ZHU Liyan, XIAO Chuqiao, and GONG Xueqing. Keyword search in decentralized storage systems[J]. Electronics, 2020, 9(12): 2041. doi: 10.3390/electronics9122041
    [14]
    DATAR M, IMMORLICA N, INDYK P, et al. Locality-sensitive hashing scheme based on p-stable distributions[C]. The 20th annual Symposium on Computational Geometry, New York, USA, 2004: 253–262.
    [15]
    SZABO N. Formalizing and securing relationships on public networks[J]. First Monday, 1997, 2(9): 1–12.
    [16]
    CHAI Qi and GONG Gong. Verifiable symmetric searchable encryption for semi-honest-but-curious cloud servers[C]. 2012 IEEE International Conference on Communications, Ottawa, Canada, 2012: 917–922.
    [17]
    王恺璇, 李宇溪, 周福才, 等. 面向多关键字的模糊密文搜索方法[J]. 计算机研究与发展, 2017, 54(2): 348–360. doi: 10.7544/issn1000-1239.2017.20151125

    WANG Kaixuan, LI Yuxi, ZHOU Fucai, et al. Multi-keyword fuzzy search over encrypted data[J]. Journal of Computer Research and Development, 2017, 54(2): 348–360. doi: 10.7544/issn1000-1239.2017.20151125
    [18]
    CHEN Zhenwei, WU Axin, LI Yifei, et al. Blockchain-enabled public key encryption with multi-keyword search in cloud computing[J]. Security and Communication Networks, 2021, 2021: 66196891. doi: 10.1155/2021/6619689
    [19]
    FU Shaojing, ZHANG Qi, JIA Nan, et al. A privacy-preserving fuzzy search scheme supporting logic query over encrypted cloud data[J]. Mobile Networks and Applications, 2021, 26(4): 1574–1585. doi: 10.1007/s11036-019-01493-3
    [20]
    ZHU Xiangyang, DAI Hua, YI Xun, et al. MUSE: An efficient and accurate verifiable privacy-preserving multikeyword text search over encrypted cloud data[J]. Security and Communication Networks, 2017, 2017: 1923476. doi: 10.1155/2017/1923476
  • Cited by

    Periodical cited type(8)

    1. 陈保豪,田霖,杨建新,程飞. 基于卷积神经网络的空间导航信号自动抗干扰技术研究. 自动化技术与应用. 2023(11): 98-100+109 .
    2. 唐言,赵知劲,岳克强,郑仕链,王李军. 基于辅助分类器和变分自编码生成对抗网络的干扰识别. 计算机应用与软件. 2023(12): 141-146 .
    3. 黄天禹,李雨锴,杨萌. TETRA通信与干扰信号智能识别技术. 通信技术. 2022(01): 63-69 .
    4. 时艳玲,王磊,李君豪. 基于投影空间下奇异值分解的海面小目标CFAR检测. 系统工程与电子技术. 2022(02): 512-519 .
    5. 刘明骞,高晓腾,李明,朱守中. 空地协同场景下通信干扰智能识别方法. 电子与信息学报. 2022(03): 825-834 . 本站查看
    6. 高峰,熊刚,王思博. 一种对集群通信信号干扰的检测方法研究. 舰船电子对抗. 2022(06): 41-44 .
    7. 孙闽红,陈鑫伟,仇兆炀,滕旭阳. 融合注意力机制的雷达欺骗干扰域适应识别方法. 电子与信息学报. 2022(11): 3891-3899 . 本站查看
    8. 王桂胜,黄国策,王叶群,董淑福,任清华,魏帅. 基于认知驱动的变换域通信智能抗干扰方法. 系统工程与电子技术. 2021(01): 223-231 .

    Other cited types(8)

  • 加载中

Catalog

    通讯作者: 陈斌, bchen63@163.com
    • 1. 

      沈阳化工大学材料科学与工程学院 沈阳 110142

    1. 本站搜索
    2. 百度学术搜索
    3. 万方数据库搜索
    4. CNKI搜索

    Figures(3)  / Tables(4)

    Article Metrics

    Article views (1011) PDF downloads(248) Cited by()
    Proportional views
    Related

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return