Security and Privacy in New Computing Environments. Second EAI International Conference, SPNCE 2019, Tianjin, China, April 13–14, 2019, Proceedings

Research Article

Secure Multi-keyword Fuzzy Search Supporting Logic Query over Encrypted Cloud Data

Download
105 downloads
  • @INPROCEEDINGS{10.1007/978-3-030-21373-2_17,
        author={Qi Zhang and Shaojing Fu and Nan Jia and Jianchao Tang and Ming Xu},
        title={Secure Multi-keyword Fuzzy Search Supporting Logic Query over Encrypted Cloud Data},
        proceedings={Security and Privacy in New Computing Environments. Second EAI International Conference, SPNCE 2019, Tianjin, China, April 13--14, 2019, Proceedings},
        proceedings_a={SPNCE},
        year={2019},
        month={6},
        keywords={Searchable encryption Fuzzy search Logic query Bloom filter},
        doi={10.1007/978-3-030-21373-2_17}
    }
    
  • Qi Zhang
    Shaojing Fu
    Nan Jia
    Jianchao Tang
    Ming Xu
    Year: 2019
    Secure Multi-keyword Fuzzy Search Supporting Logic Query over Encrypted Cloud Data
    SPNCE
    Springer
    DOI: 10.1007/978-3-030-21373-2_17
Qi Zhang1, Shaojing Fu,*, Nan Jia1, Jianchao Tang1, Ming Xu1
  • 1: National University of Defense Technology
*Contact email: shaojing1984@163.com

Abstract

Compared with exact search, fuzzy search will meet more practical requirements in searchable encryption since it can handle spelling errors or search the keywords with similar spelling. However, most of the existing fuzzy search schemes adopt bloom filter and locality sensitive hashing which cannot resist Sparse Non-negative Matrix Factorization based attack (SNMF attack). In this paper, we propose a new secure multi-keyword fuzzy search scheme for encrypted cloud data, our scheme leverages random redundancy method to handle the deterministic of bloom filter to resist SNMF attack. The scheme allows users to conduct complicated fuzzy search with logic operations (“AND”, “OR” and “NOT”), which can meet more flexible and fine-grained query demands. The theoretical analysis and experiments on real-world data show the security and high performance of our scheme.