Abstract
Searchable encryption supports retrieval over encrypted data while protecting data privacy. How to prevent non-trusted cloud service providers from performing partial retrieval operations or tampering with or deleting some encrypted data in order to save computing resources and bandwidth, thereby returning partial or erroneous search results. Therefore, we proposed a verifiable encryption scheme supporting fuzzy Search (VESFS). Through principle of matrix operations, VESFS realizes the fuzzy retrieval over encrypted data, and enables the user to verify the correctness of the retrieval results efficiently by applying the RSA accumulator and the proposed challenge response-based search verification method. The security analysis proves that VESFS provides privacy security and verifiable security; the performance analysis and experimental results show that VESFS is effective and feasible.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsReferences
Song, D.X., Wagner, D., Perrig, A.: Practical techniques for searches on encrypted data. In: Proceedings of the 2000 IEEE Symposium on Security & Privacy (S&P), Piscataway, pp. 44–55 (2000)
Mei, Z.L., Wu, B., Tian, S.L., et al.: Fuzzy keyword search method over ciphertexts supporting access control. KSII Trans. Internet Inf. Syst. 11(11), 5671–5693 (2017)
Cao, N., Wang, C., Li, M., et al.: Privacy-preserving multi-keyword ranked search over encrypted cloud data. IEEE Trans. Parallel Distrib. Syst. 25(1), 222–233 (2014)
Zhang, W., Lin, Y., Xiao, S., et al.: Privacy preserving ranked multi-keyword search for multiple data owners in cloud computing. IEEE Trans. Comput. 65(5), 1566–1577 (2016)
Chai, Q, Gong, G.: Verifiable symmetric searchable encryption for semi-honest-but-curious cloud servers. In: Proceedings of IEEE International Conference on Communications, Ottawa, pp. 917–922 (2012)
Wang, J., Ma, H., Tang, Q., et al.: A new efficient verifiable fuzzy keyword search scheme. J. Wirel. Mob. Netw. Ubiquitous Comput. Dependable Appl. 3(4), 61–71 (2012)
Wang, K.X., Li, Y.X., Zhou, F.C., et al.: Multi-keyword fuzzy search over encrypted data. J. Comput. Res. Dev. 54(2), 348–360 (2017)
Yang, Y., Zhang, Y.C., Liu, J.: Chinese multi-keyword fuzzy rank search over encrypted cloud data based on locality-sensitive hashing. J. Inf. Sci. Eng. 35(1), 137–158 (2019)
Goodrich, M.T., Tamassia, R., Hasić, J.: An efficient dynamic and distributed cryptographic accumulator. In: Chan, A.H., Gligor, V. (eds.) ISC 2002. LNCS, vol. 2433, pp. 372–388. Springer, Heidelberg (2002). https://doi.org/10.1007/3-540-45811-5_29
Sion, R.: Query execution assurance for outsourced databases. In: Proceedings of the 31st International Conference on Very Large Data Bases, Trondheim, pp. 601–612 (2005)
Curtmola, R., Garay, J., Kamara, S., et al.: Searchable symmetric encryption: improved definitions and efficient constructions. J. Comput. Secur. 19(5), 895–934 (2011)
Huang, R.W., Gui, X.L., Yu, S., et al.: A computable encryption method for privacy protection in cloud environments. J. Comput. 34(12), 2391–2402 (2011)
Kurosawa, K., Ohtaki, Y.: How to update documents verifiably in searchable symmetric encryption. In: Abdalla, M., Nita-Rotaru, C., Dahab, R. (eds.) CANS 2013. LNCS, vol. 8257, pp. 309–328. Springer, Cham (2013). https://doi.org/10.1007/978-3-319-02937-5_17
Acknowledgments
This work was supported in part by the Guangxi Natural Fund Project under Grant No. 2016GXNSFAA380115, Guangxi Innovation-Driven Development Project under Grant No. AA17204058-17.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2019 Springer Nature Switzerland AG
About this paper
Cite this paper
Huang, R., Li, Z., Wu, G. (2019). A Verifiable Encryption Scheme Supporting Fuzzy Search. In: Wang, G., Feng, J., Bhuiyan, M., Lu, R. (eds) Security, Privacy, and Anonymity in Computation, Communication, and Storage. SpaCCS 2019. Lecture Notes in Computer Science(), vol 11611. Springer, Cham. https://doi.org/10.1007/978-3-030-24907-6_30
Download citation
DOI: https://doi.org/10.1007/978-3-030-24907-6_30
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-24906-9
Online ISBN: 978-3-030-24907-6
eBook Packages: Computer ScienceComputer Science (R0)