Computer Science and Information Systems 2013 Volume 10, Issue 2, Pages: 667-684
https://doi.org/10.2298/CSIS121104028W
Full text ( 314 KB)
Cited by


Efficient verifiable fuzzy keyword search over encrypted data in cloud computing

Wang Jianfeng (Department of Mathematics, Xidian University, China)
Ma Hua (Department of Mathematics, Xidian University, China)
Tang Qiang (APSIA group, SnT, University of Luxembourg, Coudenhove-Kalergi, Luxembourg)
Li Jin (School of Computer Science, Guangzhou University, China)
Zhu Hui (State Key Laboratory of Integrated Service Networks, Xidian University, China + Network and Data Security Key Laboratory of Sichuan Province, China)
Ma Siqi (School of Computer Science and Technology, Xidian University, China)
Chen Xiaofeng (State Key Laboratory of Integrated Service Networks, Xidian University, China)

As cloud computing becomes prevalent, more and more sensitive data is being centralized into the cloud by users. To maintain the confidentiality of sensitive user data against untrusted servers, the data should be encrypted before they are uploaded. However, this raises a new challenge for performing search over the encrypted data efficiently. Although the existing searchable encryption schemes allow a user to search the encrypted data with confidentiality, these solutions cannot support the verifiability of searching result. We argue that a cloud server may be selfish in order to save its computation ability or bandwidth. For example, it may execute only a fraction of the search and returns part of the searching result. In this paper, we propose a new verifiable fuzzy keyword search scheme based on the symbol-tree which not only supports the fuzzy keyword search, but also enjoys the verifiability of the searching result. Through rigorous security and efficiency analysis, we show that our proposed scheme is secure under the proposed model, while correctly and efficiently realizing the verifiable fuzzy keyword search. The extensive experimental results demonstrate the efficiency of the proposed scheme.

Keywords: searchable encryption, verifiable fuzzy search, cloud computing