Skip to main content

2019 | OriginalPaper | Buchkapitel

A Verifiable Encryption Scheme Supporting Fuzzy Search

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Searchable encryption supports retrieval over encrypted data while protecting data privacy. How to prevent non-trusted cloud service providers from performing partial retrieval operations or tampering with or deleting some encrypted data in order to save computing resources and bandwidth, thereby returning partial or erroneous search results. Therefore, we proposed a verifiable encryption scheme supporting fuzzy Search (VESFS). Through principle of matrix operations, VESFS realizes the fuzzy retrieval over encrypted data, and enables the user to verify the correctness of the retrieval results efficiently by applying the RSA accumulator and the proposed challenge response-based search verification method. The security analysis proves that VESFS provides privacy security and verifiable security; the performance analysis and experimental results show that VESFS is effective and feasible.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Song, D.X., Wagner, D., Perrig, A.: Practical techniques for searches on encrypted data. In: Proceedings of the 2000 IEEE Symposium on Security & Privacy (S&P), Piscataway, pp. 44–55 (2000) Song, D.X., Wagner, D., Perrig, A.: Practical techniques for searches on encrypted data. In: Proceedings of the 2000 IEEE Symposium on Security & Privacy (S&P), Piscataway, pp. 44–55 (2000)
2.
Zurück zum Zitat Mei, Z.L., Wu, B., Tian, S.L., et al.: Fuzzy keyword search method over ciphertexts supporting access control. KSII Trans. Internet Inf. Syst. 11(11), 5671–5693 (2017) Mei, Z.L., Wu, B., Tian, S.L., et al.: Fuzzy keyword search method over ciphertexts supporting access control. KSII Trans. Internet Inf. Syst. 11(11), 5671–5693 (2017)
3.
Zurück zum Zitat Cao, N., Wang, C., Li, M., et al.: Privacy-preserving multi-keyword ranked search over encrypted cloud data. IEEE Trans. Parallel Distrib. Syst. 25(1), 222–233 (2014)CrossRef Cao, N., Wang, C., Li, M., et al.: Privacy-preserving multi-keyword ranked search over encrypted cloud data. IEEE Trans. Parallel Distrib. Syst. 25(1), 222–233 (2014)CrossRef
4.
Zurück zum Zitat Zhang, W., Lin, Y., Xiao, S., et al.: Privacy preserving ranked multi-keyword search for multiple data owners in cloud computing. IEEE Trans. Comput. 65(5), 1566–1577 (2016)MathSciNetCrossRef Zhang, W., Lin, Y., Xiao, S., et al.: Privacy preserving ranked multi-keyword search for multiple data owners in cloud computing. IEEE Trans. Comput. 65(5), 1566–1577 (2016)MathSciNetCrossRef
5.
Zurück zum Zitat Chai, Q, Gong, G.: Verifiable symmetric searchable encryption for semi-honest-but-curious cloud servers. In: Proceedings of IEEE International Conference on Communications, Ottawa, pp. 917–922 (2012) Chai, Q, Gong, G.: Verifiable symmetric searchable encryption for semi-honest-but-curious cloud servers. In: Proceedings of IEEE International Conference on Communications, Ottawa, pp. 917–922 (2012)
6.
Zurück zum Zitat Wang, J., Ma, H., Tang, Q., et al.: A new efficient verifiable fuzzy keyword search scheme. J. Wirel. Mob. Netw. Ubiquitous Comput. Dependable Appl. 3(4), 61–71 (2012) Wang, J., Ma, H., Tang, Q., et al.: A new efficient verifiable fuzzy keyword search scheme. J. Wirel. Mob. Netw. Ubiquitous Comput. Dependable Appl. 3(4), 61–71 (2012)
7.
Zurück zum Zitat Wang, K.X., Li, Y.X., Zhou, F.C., et al.: Multi-keyword fuzzy search over encrypted data. J. Comput. Res. Dev. 54(2), 348–360 (2017) Wang, K.X., Li, Y.X., Zhou, F.C., et al.: Multi-keyword fuzzy search over encrypted data. J. Comput. Res. Dev. 54(2), 348–360 (2017)
8.
Zurück zum Zitat Yang, Y., Zhang, Y.C., Liu, J.: Chinese multi-keyword fuzzy rank search over encrypted cloud data based on locality-sensitive hashing. J. Inf. Sci. Eng. 35(1), 137–158 (2019) Yang, Y., Zhang, Y.C., Liu, J.: Chinese multi-keyword fuzzy rank search over encrypted cloud data based on locality-sensitive hashing. J. Inf. Sci. Eng. 35(1), 137–158 (2019)
10.
Zurück zum Zitat Sion, R.: Query execution assurance for outsourced databases. In: Proceedings of the 31st International Conference on Very Large Data Bases, Trondheim, pp. 601–612 (2005) Sion, R.: Query execution assurance for outsourced databases. In: Proceedings of the 31st International Conference on Very Large Data Bases, Trondheim, pp. 601–612 (2005)
11.
Zurück zum Zitat Curtmola, R., Garay, J., Kamara, S., et al.: Searchable symmetric encryption: improved definitions and efficient constructions. J. Comput. Secur. 19(5), 895–934 (2011)CrossRef Curtmola, R., Garay, J., Kamara, S., et al.: Searchable symmetric encryption: improved definitions and efficient constructions. J. Comput. Secur. 19(5), 895–934 (2011)CrossRef
12.
Zurück zum Zitat Huang, R.W., Gui, X.L., Yu, S., et al.: A computable encryption method for privacy protection in cloud environments. J. Comput. 34(12), 2391–2402 (2011) Huang, R.W., Gui, X.L., Yu, S., et al.: A computable encryption method for privacy protection in cloud environments. J. Comput. 34(12), 2391–2402 (2011)
Metadaten
Titel
A Verifiable Encryption Scheme Supporting Fuzzy Search
verfasst von
Ruwei Huang
Zhikun Li
Guang Wu
Copyright-Jahr
2019
DOI
https://doi.org/10.1007/978-3-030-24907-6_30