A Verifiable Fuzzy Keyword Search Scheme Over Encrypted Data
نویسندگان
چکیده
As the Cloud Computing technology becomes mature, the need increases rapidly to store sensitive data securely on the cloud server. Since the cloud is not trusted, the data should be stored in an encrypted form at the server. An inherent problem is how to query the encrypted data efficiently. Recently, some searchable encryption schemes have been proposed in the literatures. Although the existing searchable encryption schemes allow a user to search the encrypted data securely without decrypting it, these solutions cannot support the verifiability of the search results. We argue that a cloud server may be selfish in order to save its computation or download bandwidth. For example, it may execute and return only a fraction of search operations and the results honestly. In this paper, we propose a verifiable fuzzy keyword search scheme based on the symbol-tree which not only supports the fuzzy keyword search over encrypted data, but also enjoys the verifiability of the search outcome.
منابع مشابه
Efficient verifiable fuzzy keyword search over encrypted data in cloud computing
As cloud computing becomes prevalent, more and more sensitive data is being centralized into the cloud by users. To maintain the confidentiality of sensitive user data against untrusted servers, the data should be encrypted before they are uploaded. However, this raises a new challenge for performing search over the encrypted data efficiently. Although the existing searchable encryption schemes...
متن کاملA New Efficient Verifiable Fuzzy Keyword Search Scheme
Data outsourcing has attracted considerable attentions recently. It can not only bring high quality data service to users, it also reduces their burden of data storage and maintenance. As the confidentiality of sensitive data, it should be encrypted before outsourcing. To achieve search over the encrypted data becomes a challenging problem. Although the existing searchable encryption schemes al...
متن کاملFault-tolerant Verifiable Keyword Symmetric Searchable Encryption in Hybrid Cloud
As cloud computing is increasingly expanding its application scenario, it is vital for cloud storage customers not to sacrifice the confidentiality of sensitive data while making fullest use of operational functionality of cloud secure systems. Although traditional searchable encryption can well solve exact keyword search on encrypted data with retrieving files by search interest, it does not w...
متن کاملFuzzy retrieval of encrypted data by multi-purpose data-structures
The growing amount of information that has arisen from emerging technologies has caused organizations to face challenges in maintaining and managing their information. Expanding hardware, human resources, outsourcing data management, and maintenance an external organization in the form of cloud storage services, are two common approaches to overcome these challenges; The first approach costs of...
متن کاملFuzzy Keyword Search over Encrypted Data using Symbol-Based Trie-traverse Search Scheme in Cloud Computing
As Cloud Computing becomes prevalent, more and more sensitive information are being centralized into the cloud. Although traditional searchable encryption schemes allow a user to securely search over encrypted data through keywords and selectively retrieve files of interest, these techniques support only exact keyword search. In this paper, for the first time we formalize and solve the problem ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- J. Internet Serv. Inf. Secur.
دوره 2 شماره
صفحات -
تاریخ انتشار 2012