Abstract
With the rapid growth of digital information, it brings a lot of storage burden for resource-constrained users. The powerful cloud server provides huge storage space for users, and it solves the storage issue of huge data. However, the cloud server is not fully trusted, the data has to be encrypted when upload to the cloud server. Keyword search techniques are widely used for the retrieval of encrypted data. Keywords accurate search can be easily achieved. However, fuzzy keywords search is difficulty. In this paper, a fuzzy keyword search scheme is proposed based on comparable encryption technique. In the proposed scheme is flexible, the users can set the similarity of the keywords so as to control the search range.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Agrawal, R., Kiernan, J., Srikant, R., Xu, Y.: Order-preserving encryption for numeric data. In: Proceedings of the ACM SIGMOD International Conference on Management of Data, Paris, France, 13–18 June 2004, pp. 563–574 (2004)
Boldyreva, A., Chenette, N., O’Neill, A.: Order-preserving encryption revisited: Improved security analysis and alternative solutions. In: Proceedings of the 31st Annual Cryptology Conference on Advances in Cryptology CRYPTO 2011, Santa Barbara, CA, USA, 14–18 Aug 2011, pp. 578–595 (2011)
Chang, Y., Mitzenmacher, M.: Privacy preserving keyword searches on remote encrypted data. In: Proceedings of the 3rd International Conference on Applied Cryptography and Network Security, ACNS 2005, New York, NY, USA, 7–10 June 2005, pp. 442–455 (2005)
Chen, P., Ye, J., Chen, X.: A new efficient request-based comparable encryption scheme. In: Proceedings of the 29th International Conference on Advanced Information Networking and Applications Workshops (WAINA), Gwangiu, South Korea, 24–27 Mar 2015, pp. 436–439 (2015)
Cheng, R., Yan, J., Guan, C., Zhang, F., Ren, K.: Verifiable searchable symmetric encryption from indistinguishability obfuscation. In: Proceedings of the 10th ACM Symposium on Information, Computer and Communications Security, pp. 621–626. ACM (2015)
Curtmola, R., Garay, J. A., Kamara, S., Ostrovsky, R.: Searchable symmetric encryption: improved definitions and efficient constructions. In: Proceedings of the 13th ACM Conference on Computer and Communications Security, CCS 2006, Alexandria, VA, USA, 30 Oct–3 Nov 2006, pp. 79–88 (2006)
Foster, I.T., Zhao, Y., Raicu, I., Lu, S.: Cloud computing and grid computing 360-degree compared. CoRR, abs/0901.0131 (2009)
Furukawa, J.: Request-based comparable encryption. In: Proceedings of the 18th European Symposium on Research in Computer Security ESORICS 2013, Egham, UK, 9–13 Sept 2013, vol. 8134, pp. 129–146 (2013)
Goh, E.: Secure indexes. IACR Cryptology ePrint Archive, 2003: 216 (2003)
Kurosawa, K.: Garbled searchable symmetric encryption. In: Financial Cryptography and Data Security, pp. 234–251. Springer (2014)
Popa, R.A., Li, F.H., Zeldovich, N.: An ideal-security protocol for order preserving encoding. In: Proceedings of 2013 IEEE Symposium on Security and Privacy, SP 2013, Berkeley, CA, USA, 19–22 May 2013, pp. 463–477 (2013)
Song, D., Wagner, D., Perrig, A.: Practical techniques for searches on encrypted data. In: Proceedings of 2000 IEEE Symposium on Security and Privacy, Berkeley, California, USA, 14–17 May 2000, pp. 44–55 (2000)
Wang, C., Chow, S.S.M., Wang, Q.N., Ren, K., Lou, W.: Privacy-preserving public auditing for secure cloud storage. IEEE Trans. Comput. 62(2), 362–375 (2013)
Ye, J., Xu, Z., Ding, Y.: Secure outsourcing of modular exponentiations in cloud and cluster computing. Clust. Comput. 19(2), 811–820 (2016)
Yu, Y., Mu, Y., Ni, J., Deng, J., Huang, K.: Identity privacy-preserving public auditing with dynamic group for secure mobile cloud storage. In: Proceedings of the 8th International Conference on Network and System Security NSS 2014, Xi’an, China, 15–17 Oct 2014, pp. 28–40 (2014)
Zissis, D., Lekkas, D.: Addressing cloud computing security issues. Future Gener. Comput. Syst. 28(3), 583–592 (2012)
Roopaei, M., Rad, P., Choo, K.-K.R.: Cloud of things in smart agriculture: intelligent irrigation monitoring by thermal imaging. IEEE Cloud Comput. 4(1), 10–15 (2017)
Kumari, S., Li, X., Wu, F., Das, A., Choo, K.-K.R., Shen, J.: Design of a provably secure biometrics-based multi-cloud-server authentication scheme. Future Gener. Comput. Syst. 68, 320–330 (2017)
Cahyani, N.D.W., Ab Rahman, N.H., Glisson, W.B., Choo, K.-K.R.: The role of mobile forensics in terrorism investigations involving the use of cloud storage service and communication apps. Mob. Netw. Appl. 22(2), 240–254 (2017)
Quick, D., Martini, B., Choo, K-KR.: Cloud Storage Forensics. Syngress, an Imprint of Elsevier (2013)
Quick, D., Choo, K.-K.R.: Google drive: forensic analysis of data remnants. J. Netw. Comput. Appl. 40, 179–193 (2014)
Martini, B., Choo, K.-K.R.: Cloud storage forensics: ownCloud as a case study. Digit. Investig. 10(4), 287–299 (2013)
Quick, D., Choo, K.-K.R.: Forensic collection of cloud storage data: Does the act of collection result in changes to the data or its metadata? Digit. Investig. 10(3), 266–277 (2013)
Acknowledgement
This work was supported by the Fund of Lab of Security Insurance of Cyberspace, Sichuan Province (szjj2016-091); Guangxi Key Laboratory of Cryptography and Information Security (No. GCIS201607); the Talent Project of Sichuan University of Science and Engineering (2017RCL23).
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2018 Springer International Publishing AG
About this paper
Cite this paper
Ye, J., Xu, Z., Ding, Y. (2018). Fuzzy Keyword Search Based on Comparable Encryption. In: Abawajy, J., Choo, KK., Islam, R. (eds) International Conference on Applications and Techniques in Cyber Security and Intelligence. ATCI 2017. Advances in Intelligent Systems and Computing, vol 580. Edizioni della Normale, Cham. https://doi.org/10.1007/978-3-319-67071-3_10
Download citation
DOI: https://doi.org/10.1007/978-3-319-67071-3_10
Published:
Publisher Name: Edizioni della Normale, Cham
Print ISBN: 978-3-319-67070-6
Online ISBN: 978-3-319-67071-3
eBook Packages: EngineeringEngineering (R0)