Fuzzy Searchable Encryption Scheme Supporting Verification in Cloud Storage
ZHU Xiaoyu① LIU Qin② WANG Guojun③
①(School of Information Science and Engineering, Central South University, Changsha 410083, China) ②(College of Computer Science and Electronic Engineering, Hunan University, Changsha 410082, China) ③(School of Computer Science and Educational Software, Guangzhou University, Guangzhou 510006, China)
Most of the existing searchable encryption schemes can not support fuzzy keyword search, and can not resist threats from malicious server, that the cloud computing needs to provide an encryption scheme, which can support typos and verification of the search result. Considering the data is updated frequently in cloud computing, a verifiable fuzzy searchable encryption scheme in dynamic cloud storage is presented. The proposed scheme constructs the fuzzy keyword set based on edit distance technique, and builds secure index based on pseudorandom function and random permutation, so as to protect the users’ data privacy. The RSA accumulator and Hash function are used to verify the correctness of the search result, in order to detect the cheating behavior of the malicious attacker. The security analysis proves that the proposed scheme is privacy preserving and verifiable. The experiment results show that the proposed scheme is efficient.
SONG D X, WAGNER D, and PERRIG A. Practical techniques for searches on encrypted data[C]. IEEE Symposium on Security & Privacy, Berkeley, CA, USA, 2000: 44-55.
LIN Peng, JIANG Jie, and CHEN Tieming. Application of keyword searchable encryption in cloud[J]. Journal on Communications, 2015, 36(Z1): 1-7. doi: 10.11959/j.issn. 1000-436x.2015307.
[3]
CAO Ning, WANG Cong, LI Ming, et al. Privacy-preserving multi-keyword ranked search over encrypted cloud data[J]. IEEE Transactions on Parallel and Distributed Systems, 2014, 25(1): 222-233. doi: 10.1109/TPDS.2013.45.
[4]
XIA Zhihua, WANG Xinhui, SUN Xingming, et al. A secure and dynamic multi-keyword ranked search scheme over encrypted cloud data[J]. IEEE Transactions on Parallel and Distributed Systems, 2016, 27(2): 340-352. doi: 10. 1109/TPDS.2015.2401003.
[5]
FU Zhangjie, SUN Xingming, LIU Qi, et al. Achieving efficient cloud search services: Multi-keyword ranked search over encrypted cloud data supporting parallel computing[J]. IEICE Transactions on Communications, 2015, 98(1): 190-200. doi: 10.1587/transcom.E98.B.190.
LI Zhen, JIANG Han, and ZHAO Minghao. A discretionary searchable encryption scheme in multi-user settings[J]. Journal of Computer Research and Development, 2015, 52(10): 2313-2322. doi: 10.7544/issn1000-1239.2015.20150504.
[7]
LI Jin, WANG Qian, WANG Cong, et al. Fuzzy keyword search over encrypted data in cloud computing[C]. IEEE International Conference on Computer Communications, San Diego, CA, USA, 2010: 1-5.
[8]
CHAI Qi and GONG Guang. Verifiable symmetric searchable encryption for semi-honest-but-curious cloud servers[C]. IEEE International Conference on Communications, Ottawa, Canada, 2012: 917-922.
[9]
WANG J, YU X, and ZHAO M. Fault-tolerant verifiable keyword symmetric searchable encryption in hybrid cloud[J]. International Journal of Network Security, 2015, 17(4): 471-483.
[10]
SUN W, LIU X, LOU W, et al. Catch you if you lie to me: Efficient verifiable conjunctive keyword search over large dynamic encrypted cloud data[C]. IEEE Conference on Computer Communications, Hong Kong, China, 2015: 2110-2118.
[11]
ZHANG W, LIN Y, and GU Q. Catch you if you misbehave: Ranked keyword search results verification in cloud computing[J]. IEEE Transactions on Cloud Computing, 2015, 6(1): 1-14. doi: 10.1109/TCC.2015.2481389.
[12]
KUROSAWA K and OHTAKI Y. UC-secure searchable symmetric encryption[C]. International Conference on Financial Cryptography and Data Security, Kralendijk, Bonaire, 2012: 285-298.
[13]
KAMARA S, PAPAMANTHOU C, and ROEDER T. Dynamic searchable symmetric encryption[C]. ACM Conference on Computer and Communications Security, Raleigh, NC, USA, 2012: 965-976.
[14]
KAMARA S and PAPAMANTHOU C. Parallel and dynamic searchable symmetric encryption[C]. International Conference on Financial Cryptography and Data Security, Okinawa, Japan, 2013: 258-274.
[15]
KUROSAWA K and OHTAKI Y. How to update documents verifiably in searchable symmetric encryption[C]. International Conference on Cryptology and Network Security, Paraty, Brazil, 2013: 309-328.
[16]
GENNARO R, HALEVI S, and RABIN T. Secure hash- and-sign signatures without the random oracle[C]. International Conference on the Theory and Applications of Cryptographic Techniques, Prague, Czech Republic, 1999: 123-139.