A Novel Dynamic Ranked Fuzzy Keyword Search over Cloud Encrypted Data

It is a hot topic for researchers to boost users retrieval efficiency and satisfactory degree according to a retrievers query results in the existing searchable encryption schemes in cloud computing. Considering that traditional work on searchable encryption rarely refers to the interaction between the user and the cloud, this paper proposes a method to improve the systems usability and users satisfactory degree in the fuzzy keyword search field. In this paper, based on [1] and [2], for the first time we solve the problem of full-scale fuzzy keyword set construction according to the input keyword, and construct the feedback scheme to produce pointer vector including fuzzy keyword, edit distance and keywords dynamic score, which is feasible in hybrid cloud model. Thus, different vectors form the character vector database within its data structure. It can go to the trapdoor construction procedure after access to the database with its edit distances to construct fuzzy keyword set, which makes the fullest use of the retrieval history and statistical misspelled keywords, precisely and quickly realizing the aim of ranked fuzzy keyword search over cloud encrypted data. Thorough rigorous security analyses realize privacy preservation, as well as improvement of the solution which can meet satisfaction needs of users. And experiments show that efficiency and precision are clearly achieved in the proposed solution, the retrieval time overhead is improved after many times as well.

[1]  Brent Waters,et al.  Conjunctive, Subset, and Range Queries on Encrypted Data , 2007, TCC.

[2]  Bill Cheswick,et al.  Privacy-Enhanced Searches Using Encrypted Bloom Filters , 2004, IACR Cryptol. ePrint Arch..

[3]  Pil Joong Lee,et al.  Public Key Encryption with Conjunctive Keyword Search and Its Extension to a Multi-user System , 2007, Pairing.

[4]  Cong Wang,et al.  Privacy-Preserving Multi-Keyword Ranked Search over Encrypted Cloud Data , 2014 .

[5]  Peter N. Yianilos,et al.  Learning String-Edit Distance , 1996, IEEE Trans. Pattern Anal. Mach. Intell..

[6]  Liehuang Zhu,et al.  Fuzzy keyword search on encrypted cloud storage data with small index , 2011, 2011 IEEE International Conference on Cloud Computing and Intelligence Systems.

[7]  Dawn Xiaodong Song,et al.  Practical techniques for searches on encrypted data , 2000, Proceeding 2000 IEEE Symposium on Security and Privacy. S&P 2000.

[8]  Brent Waters,et al.  Secure Conjunctive Keyword Search over Encrypted Data , 2004, ACNS.

[9]  Cong Wang,et al.  Efficient verifiable fuzzy keyword search over encrypted data in cloud computing , 2013, Comput. Sci. Inf. Syst..

[10]  Rafail Ostrovsky,et al.  Public Key Encryption with Keyword Search , 2004, EUROCRYPT.

[11]  M. Chuah,et al.  Privacy-Aware BedTree Based Solution for Fuzzy Multi-keyword Search over Encrypted Data , 2011, 2011 31st International Conference on Distributed Computing Systems Workshops.

[12]  Cong Wang,et al.  Achieving Secure, Scalable, and Fine-grained Data Access Control in Cloud Computing , 2010, 2010 Proceedings IEEE INFOCOM.

[13]  Ming Li,et al.  Verifiable Privacy-Preserving Multi-Keyword Text Search in the Cloud Supporting Similarity-Based Ranking , 2013, IEEE Transactions on Parallel and Distributed Systems.

[14]  Eu-Jin Goh,et al.  Secure Indexes , 2003, IACR Cryptol. ePrint Arch..

[15]  Cong Wang,et al.  Privacy-preserving multi-keyword ranked search over encrypted cloud data , 2011, 2011 Proceedings IEEE INFOCOM.

[16]  Cong Wang,et al.  Secure Ranked Keyword Search over Encrypted Cloud Data , 2010, 2010 IEEE 30th International Conference on Distributed Computing Systems.