Skip to main content

Fuzzy Keyword Search Based on Comparable Encryption

  • Conference paper
  • First Online:
International Conference on Applications and Techniques in Cyber Security and Intelligence (ATCI 2017)

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 580))

  • 1104 Accesses

Abstract

With the rapid growth of digital information, it brings a lot of storage burden for resource-constrained users. The powerful cloud server provides huge storage space for users, and it solves the storage issue of huge data. However, the cloud server is not fully trusted, the data has to be encrypted when upload to the cloud server. Keyword search techniques are widely used for the retrieval of encrypted data. Keywords accurate search can be easily achieved. However, fuzzy keywords search is difficulty. In this paper, a fuzzy keyword search scheme is proposed based on comparable encryption technique. In the proposed scheme is flexible, the users can set the similarity of the keywords so as to control the search range.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Agrawal, R., Kiernan, J., Srikant, R., Xu, Y.: Order-preserving encryption for numeric data. In: Proceedings of the ACM SIGMOD International Conference on Management of Data, Paris, France, 13–18 June 2004, pp. 563–574 (2004)

    Google Scholar 

  2. Boldyreva, A., Chenette, N., O’Neill, A.: Order-preserving encryption revisited: Improved security analysis and alternative solutions. In: Proceedings of the 31st Annual Cryptology Conference on Advances in Cryptology CRYPTO 2011, Santa Barbara, CA, USA, 14–18 Aug 2011, pp. 578–595 (2011)

    Google Scholar 

  3. Chang, Y., Mitzenmacher, M.: Privacy preserving keyword searches on remote encrypted data. In: Proceedings of the 3rd International Conference on Applied Cryptography and Network Security, ACNS 2005, New York, NY, USA, 7–10 June 2005, pp. 442–455 (2005)

    Google Scholar 

  4. Chen, P., Ye, J., Chen, X.: A new efficient request-based comparable encryption scheme. In: Proceedings of the 29th International Conference on Advanced Information Networking and Applications Workshops (WAINA), Gwangiu, South Korea, 24–27 Mar 2015, pp. 436–439 (2015)

    Google Scholar 

  5. Cheng, R., Yan, J., Guan, C., Zhang, F., Ren, K.: Verifiable searchable symmetric encryption from indistinguishability obfuscation. In: Proceedings of the 10th ACM Symposium on Information, Computer and Communications Security, pp. 621–626. ACM (2015)

    Google Scholar 

  6. Curtmola, R., Garay, J. A., Kamara, S., Ostrovsky, R.: Searchable symmetric encryption: improved definitions and efficient constructions. In: Proceedings of the 13th ACM Conference on Computer and Communications Security, CCS 2006, Alexandria, VA, USA, 30 Oct–3 Nov 2006, pp. 79–88 (2006)

    Google Scholar 

  7. Foster, I.T., Zhao, Y., Raicu, I., Lu, S.: Cloud computing and grid computing 360-degree compared. CoRR, abs/0901.0131 (2009)

    Google Scholar 

  8. Furukawa, J.: Request-based comparable encryption. In: Proceedings of the 18th European Symposium on Research in Computer Security ESORICS 2013, Egham, UK, 9–13 Sept 2013, vol. 8134, pp. 129–146 (2013)

    Google Scholar 

  9. Goh, E.: Secure indexes. IACR Cryptology ePrint Archive, 2003: 216 (2003)

    Google Scholar 

  10. Kurosawa, K.: Garbled searchable symmetric encryption. In: Financial Cryptography and Data Security, pp. 234–251. Springer (2014)

    Google Scholar 

  11. Popa, R.A., Li, F.H., Zeldovich, N.: An ideal-security protocol for order preserving encoding. In: Proceedings of 2013 IEEE Symposium on Security and Privacy, SP 2013, Berkeley, CA, USA, 19–22 May 2013, pp. 463–477 (2013)

    Google Scholar 

  12. Song, D., Wagner, D., Perrig, A.: Practical techniques for searches on encrypted data. In: Proceedings of 2000 IEEE Symposium on Security and Privacy, Berkeley, California, USA, 14–17 May 2000, pp. 44–55 (2000)

    Google Scholar 

  13. Wang, C., Chow, S.S.M., Wang, Q.N., Ren, K., Lou, W.: Privacy-preserving public auditing for secure cloud storage. IEEE Trans. Comput. 62(2), 362–375 (2013)

    Article  MATH  MathSciNet  Google Scholar 

  14. Ye, J., Xu, Z., Ding, Y.: Secure outsourcing of modular exponentiations in cloud and cluster computing. Clust. Comput. 19(2), 811–820 (2016)

    Article  Google Scholar 

  15. Yu, Y., Mu, Y., Ni, J., Deng, J., Huang, K.: Identity privacy-preserving public auditing with dynamic group for secure mobile cloud storage. In: Proceedings of the 8th International Conference on Network and System Security NSS 2014, Xi’an, China, 15–17 Oct 2014, pp. 28–40 (2014)

    Google Scholar 

  16. Zissis, D., Lekkas, D.: Addressing cloud computing security issues. Future Gener. Comput. Syst. 28(3), 583–592 (2012)

    Article  Google Scholar 

  17. Roopaei, M., Rad, P., Choo, K.-K.R.: Cloud of things in smart agriculture: intelligent irrigation monitoring by thermal imaging. IEEE Cloud Comput. 4(1), 10–15 (2017)

    Article  Google Scholar 

  18. Kumari, S., Li, X., Wu, F., Das, A., Choo, K.-K.R., Shen, J.: Design of a provably secure biometrics-based multi-cloud-server authentication scheme. Future Gener. Comput. Syst. 68, 320–330 (2017)

    Article  Google Scholar 

  19. Cahyani, N.D.W., Ab Rahman, N.H., Glisson, W.B., Choo, K.-K.R.: The role of mobile forensics in terrorism investigations involving the use of cloud storage service and communication apps. Mob. Netw. Appl. 22(2), 240–254 (2017)

    Article  Google Scholar 

  20. Quick, D., Martini, B., Choo, K-KR.: Cloud Storage Forensics. Syngress, an Imprint of Elsevier (2013)

    Google Scholar 

  21. Quick, D., Choo, K.-K.R.: Google drive: forensic analysis of data remnants. J. Netw. Comput. Appl. 40, 179–193 (2014)

    Article  Google Scholar 

  22. Martini, B., Choo, K.-K.R.: Cloud storage forensics: ownCloud as a case study. Digit. Investig. 10(4), 287–299 (2013)

    Article  Google Scholar 

  23. Quick, D., Choo, K.-K.R.: Forensic collection of cloud storage data: Does the act of collection result in changes to the data or its metadata? Digit. Investig. 10(3), 266–277 (2013)

    Article  Google Scholar 

Download references

Acknowledgement

This work was supported by the Fund of Lab of Security Insurance of Cyberspace, Sichuan Province (szjj2016-091); Guangxi Key Laboratory of Cryptography and Information Security (No. GCIS201607); the Talent Project of Sichuan University of Science and Engineering (2017RCL23).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Zheng Xu .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer International Publishing AG

About this paper

Cite this paper

Ye, J., Xu, Z., Ding, Y. (2018). Fuzzy Keyword Search Based on Comparable Encryption. In: Abawajy, J., Choo, KK., Islam, R. (eds) International Conference on Applications and Techniques in Cyber Security and Intelligence. ATCI 2017. Advances in Intelligent Systems and Computing, vol 580. Edizioni della Normale, Cham. https://doi.org/10.1007/978-3-319-67071-3_10

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-67071-3_10

  • Published:

  • Publisher Name: Edizioni della Normale, Cham

  • Print ISBN: 978-3-319-67070-6

  • Online ISBN: 978-3-319-67071-3

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics