About | Contact Us | Register | Login
ProceedingsSeriesJournalsSearchEAI
Security and Privacy in New Computing Environments. Second EAI International Conference, SPNCE 2019, Tianjin, China, April 13–14, 2019, Proceedings

Research Article

Secure Multi-keyword Fuzzy Search Supporting Logic Query over Encrypted Cloud Data

Download(Requires a free EAI acccount)
185 downloads
Cite
BibTeX Plain Text
  • @INPROCEEDINGS{10.1007/978-3-030-21373-2_17,
        author={Qi Zhang and Shaojing Fu and Nan Jia and Jianchao Tang and Ming Xu},
        title={Secure Multi-keyword Fuzzy Search Supporting Logic Query over Encrypted Cloud Data},
        proceedings={Security and Privacy in New Computing Environments. Second EAI International Conference, SPNCE 2019, Tianjin, China, April 13--14, 2019, Proceedings},
        proceedings_a={SPNCE},
        year={2019},
        month={6},
        keywords={Searchable encryption Fuzzy search Logic query Bloom filter},
        doi={10.1007/978-3-030-21373-2_17}
    }
    
  • Qi Zhang
    Shaojing Fu
    Nan Jia
    Jianchao Tang
    Ming Xu
    Year: 2019
    Secure Multi-keyword Fuzzy Search Supporting Logic Query over Encrypted Cloud Data
    SPNCE
    Springer
    DOI: 10.1007/978-3-030-21373-2_17
Qi Zhang1, Shaojing Fu,*, Nan Jia1, Jianchao Tang1, Ming Xu1
  • 1: National University of Defense Technology
*Contact email: shaojing1984@163.com

Abstract

Compared with exact search, fuzzy search will meet more practical requirements in searchable encryption since it can handle spelling errors or search the keywords with similar spelling. However, most of the existing fuzzy search schemes adopt bloom filter and locality sensitive hashing which cannot resist Sparse Non-negative Matrix Factorization based attack (SNMF attack). In this paper, we propose a new secure multi-keyword fuzzy search scheme for encrypted cloud data, our scheme leverages random redundancy method to handle the deterministic of bloom filter to resist SNMF attack. The scheme allows users to conduct complicated fuzzy search with logic operations (“AND”, “OR” and “NOT”), which can meet more flexible and fine-grained query demands. The theoretical analysis and experiments on real-world data show the security and high performance of our scheme.

Keywords
Searchable encryption Fuzzy search Logic query Bloom filter
Published
2019-06-10
Appears in
SpringerLink
http://dx.doi.org/10.1007/978-3-030-21373-2_17
Copyright © 2019–2025 ICST
EBSCOProQuestDBLPDOAJPortico
EAI Logo

About EAI

  • Who We Are
  • Leadership
  • Research Areas
  • Partners
  • Media Center

Community

  • Membership
  • Conference
  • Recognition
  • Sponsor Us

Publish with EAI

  • Publishing
  • Journals
  • Proceedings
  • Books
  • EUDL