Secure Multi-keyword Fuzzy Searches With Enhanced Service Quality in Cloud Computing

With the ever-increasing amount of data resided in a cloud, how to provide users with secure and practical query services has become the key to improve the quality of cloud services. Fuzzy searchable encryption (FSE) is identified as one of the most promising approaches for enabling secure query services, since it allows searching encrypted data by using keywords with spelling errors. However, existing FSE schemes are far from the practical use for the following reasons: (1) Inflexibility. It is hard for them to simultaneously support AND and OR semantics in a multi-keyword query. (2) Inefficiency. They require sequentially scanning a whole dataset to find matched files, and thus are difficult to apply to a large-scale dataset. (3) Limited robustness. It is difficult for them to resist the linear analysis attack in the known-background model. To fix the above problems, this article proposes matrix-based multi-keyword fuzzy search (M2FS) schemes, which support approximate keyword matching by exploiting the indecomposable property of primes. Specifically, we first present a basic scheme, called M2FS-B, where multiple keywords in a query or a file are constructed as prime-related matrices such that the result of matrix multiplication can be employed to determine the level of matching for different query semantics. Then, we construct an advanced scheme, named M2FS-E, which builds a searchable index as a keyword balanced binary (KBB) tree for dynamic and parallel searches, while adding random noises into a query matrix for enhanced robustness. Extensive analyses and experiments demonstrate the validity of our M2FS schemes.

[1]  Rong Hao,et al.  Towards Achieving Keyword Search over Dynamic Encrypted Cloud Data with Symmetric-Key Based Verification , 2019, IEEE Transactions on Dependable and Secure Computing.

[2]  Jie Wu,et al.  Preserving Privacy with Probabilistic Indistinguishability in Weighted Social Networks , 2017, IEEE Transactions on Parallel and Distributed Systems.

[3]  Murat Kantarcioglu,et al.  Efficient Similarity Search over Encrypted Data , 2012, 2012 IEEE 28th International Conference on Data Engineering.

[4]  Guojun Wang,et al.  Prime Inner Product Encoding for Effective Wildcard-Based Multi-Keyword Fuzzy Search , 2020, IEEE Transactions on Services Computing.

[5]  Dawn Xiaodong Song,et al.  Practical techniques for searches on encrypted data , 2000, Proceeding 2000 IEEE Symposium on Security and Privacy. S&P 2000.

[6]  Jie Wu,et al.  The Dynamic Bloom Filters , 2010, IEEE Transactions on Knowledge and Data Engineering.

[7]  Florian Kerschbaum,et al.  Practical and Secure Substring Search , 2018, SIGMOD Conference.

[8]  Nathan Chenette,et al.  Efficient Fuzzy Search on Encrypted Data , 2014, FSE.

[9]  Tao Peng,et al.  Achieving Secure and Effective Search Services in Cloud Computing , 2018, 2018 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications/ 12th IEEE International Conference On Big Data Science And Engineering (TrustCom/BigDataSE).

[10]  Nora Cuppens-Boulahia,et al.  Substring search over encrypted data , 2017, J. Comput. Secur..

[11]  Ruiying Du,et al.  EliMFS: Achieving Efficient, Leakage-Resilient, and Multi-Keyword Fuzzy Search on Encrypted Cloud Data , 2020, IEEE Transactions on Services Computing.

[12]  Nicole Immorlica,et al.  Locality-sensitive hashing scheme based on p-stable distributions , 2004, SCG '04.

[13]  G. Mohankumar,et al.  PRIVACY-PRESERVING MULTI-KEYWORD TOP-K SIMILARITY SEARCH OVER ENCRYPTED DATA , 2018 .

[14]  Yiwei Thomas Hou,et al.  Privacy-preserving multi-keyword fuzzy search over encrypted data in the cloud , 2014, IEEE INFOCOM 2014 - IEEE Conference on Computer Communications.

[15]  Tao Peng,et al.  Intelligent route planning on large road networks with efficiency and privacy , 2019, J. Parallel Distributed Comput..

[16]  Rongxing Lu,et al.  Achieve Efficient and Verifiable Conjunctive and Fuzzy Queries over Encrypted Data in Cloud , 2022, IEEE Transactions on Services Computing.

[17]  Cong Wang,et al.  Generalized pattern matching string search on encrypted data in cloud systems , 2015, 2015 IEEE Conference on Computer Communications (INFOCOM).

[18]  Xingming Sun,et al.  Toward Efficient Multi-Keyword Fuzzy Search Over Encrypted Outsourced Data With Accuracy Improvement , 2016, IEEE Transactions on Information Forensics and Security.

[19]  Vivek Kale A SECURE AND DYNAMIC MULTI-KEYWORD RANKED SEARCH SCHEME OVER ENCRYPTED CLOUD DATA , 2020 .

[20]  Charalampos Papamanthou,et al.  Parallel and Dynamic Searchable Symmetric Encryption , 2013, Financial Cryptography.

[21]  Liehuang Zhu,et al.  Fuzzy keyword search on encrypted cloud storage data with small index , 2011, 2011 IEEE International Conference on Cloud Computing and Intelligence Systems.

[22]  Qian Wang,et al.  A Secure and Dynamic Multi-Keyword Ranked Search Scheme over Encrypted Cloud Data , 2016, IEEE Transactions on Parallel and Distributed Systems.

[23]  Guojun Wang,et al.  Enabling Verifiable and Dynamic Ranked Search over Outsourced Data , 2019, IEEE Transactions on Services Computing.

[24]  M. Chuah,et al.  Privacy-Aware BedTree Based Solution for Fuzzy Multi-keyword Search over Encrypted Data , 2011, 2011 31st International Conference on Distributed Computing Systems Workshops.

[25]  Cong Wang,et al.  Enabling Privacy-Assured Similarity Retrieval over Millions of Encrypted Records , 2015, ESORICS.

[26]  S. Karthik,et al.  FSS-SDD: fuzzy-based semantic search for secure data discovery from outsourced cloud data , 2020, Soft Comput..

[27]  Gonzalo Navarro,et al.  A guided tour to approximate string matching , 2001, CSUR.

[28]  Yue Sun,et al.  Efficient dynamic multi-keyword fuzzy search over encrypted cloud data , 2020, J. Netw. Comput. Appl..

[29]  Robert H. Deng,et al.  Flexible Wildcard Searchable Encryption System , 2020, IEEE Transactions on Services Computing.

[30]  Xingming Sun,et al.  Semantic-Aware Searching Over Encrypted Data for Cloud Computing , 2018, IEEE Transactions on Information Forensics and Security.

[31]  Qi Zhang,et al.  A Privacy-preserving Fuzzy Search Scheme Supporting Logic Query over Encrypted Cloud Data , 2020, Mobile Networks and Applications.

[32]  Feifei Li,et al.  Secure nearest neighbor revisited , 2013, 2013 IEEE 29th International Conference on Data Engineering (ICDE).

[33]  Nikos Mamoulis,et al.  Secure kNN computation on encrypted databases , 2009, SIGMOD Conference.

[34]  Rafail Ostrovsky,et al.  Searchable symmetric encryption: improved definitions and efficient constructions , 2006, CCS '06.

[35]  Cong Wang,et al.  EncSIM: An encrypted similarity search service for distributed high-dimensional datasets , 2017, 2017 IEEE/ACM 25th International Symposium on Quality of Service (IWQoS).

[36]  Cong Wang,et al.  Efficient verifiable fuzzy keyword search over encrypted data in cloud computing , 2013, Comput. Sci. Inf. Syst..

[37]  Ke Gu,et al.  Secure Data Query Framework for Cloud and Fog Computing , 2020, IEEE Transactions on Network and Service Management.

[38]  Wenjing Lou,et al.  Searchable Symmetric Encryption with Forward Search Privacy , 2019, IEEE Transactions on Dependable and Secure Computing.