We use cookies to improve your experience with our site.

Indexed in:

SCIE, EI, Scopus, INSPEC, DBLP, CSCD, etc.

Submission System
(Author / Reviewer / Editor)
Bo Yang, Xiao-Qiong Pang, Jun-Qiang Du, Dan Xie. Effective Error-Tolerant Keyword Search for Secure Cloud Computing[J]. Journal of Computer Science and Technology, 2014, 29(1): 81-89. DOI: 10.1007/s11390-013-1413-6
Citation: Bo Yang, Xiao-Qiong Pang, Jun-Qiang Du, Dan Xie. Effective Error-Tolerant Keyword Search for Secure Cloud Computing[J]. Journal of Computer Science and Technology, 2014, 29(1): 81-89. DOI: 10.1007/s11390-013-1413-6

Effective Error-Tolerant Keyword Search for Secure Cloud Computing

Funds: This work is supported by the National Natural Science Foundation of China under Grant Nos. 61272436, 61003232 and 61272404, and the Natural Science Foundation of Guangdong Province of China under Grant No. 10351806001000000.
More Information
  • Received Date: January 14, 2013
  • Revised Date: April 27, 2013
  • Published Date: January 04, 2014
  • The existing solutions to keyword search in the cloud can be divided into two categories: searching on exact keywords and searching on error-tolerant keywords. An error-tolerant keyword search scheme permits to make searches on encrypted data with only an approximation of some keyword. The scheme is suitable to the case where users' searching input might not exactly match those pre-set keywords. In this paper, we first present a general framework for searching on error-tolerant keywords. Then we propose a concrete scheme, based on a fuzzy extractor, which is proved secure against an adaptive adversary under well-defined security definition. The scheme is suitable for all similarity metrics including Hamming distance, edit distance, and set difference. It does not require the user to construct or store anything in advance, other than the key used to calculate the trapdoor of keywords and the key to encrypt data documents. Thus, our scheme tremendously eases the users' burden. What is more, our scheme is able to transform the servers' searching for error-tolerant keywords on ciphertexts to the searching for exact keywords on plaintexts. The server can use any existing approaches of exact keywords search to search plaintexts on an index table.
  • [1]
    Mell P, Grance T. The NIST definition of cloud computing. National Institute of Standards and Technology Special Publication, SP 800-145, September 2011. http://csrc. nist.gov/publications/nistpubs/800-145/SP800-145.pdf
    [2]
    Harauz J, Kaufman L M, Potter B. Data security in the world of cloud computing. IEEE Security & Privacy, 2009, 7(4): 61-64.
    [3]
    Gentry C. Computing arbitrary functions of encrypted data. Communications of the ACM, 2010, 53(3): 97-105.
    [4]
    Boneh D, Crescenzo G D, Ostrovsky R, Persiano G. Public key encryption with keyword search. In Proc. EUROCRYPT 2004, May 2004, pp.506-522.
    [5]
    Boneh D, Kushilevitz E, Ostrovsky R, Skeith W. Publickey encryption that allows PIR queries. In Proc. the 27th CRYPTO, Aug. 2007, pp.50-67.
    [6]
    Boneh D, Waters B. Conjunctive, subset, and range queries on encrypted data. In Proc. the 4th Theory of Cryptography Conference, Feb. 2007, pp.535-554.
    [7]
    Bringer J, Chabanne H, Kindarji B. Error-tolerant searchable encryption. In Proc. the IEEE International Conference on Communications, June 2009.
    [8]
    Chang Y, Mitzenmacher M. Privacy preserving keyword searches on remote encrypted data. In Proc. the 3rd Int. Conf. Applied Cryptography and Network Security, June 2005, pp.442-455.
    [9]
    Curtmola R, Garay J, Kamara S, Ostrovsky R. Searchable symmetric encryption: Improved definitions and efficient constructions. J. Computer Security, 2011, 19(5): 895-934.
    [10]
    Goh E. Secure indexes. IACR ePrint Cryptography Archive, 2003. http://eprint.iacr.org/2003/216, Dec. 2013.
    [11]
    Li J,Wang Q,Wang C, Cao N, Ren K, Lou W. Fuzzy keyword search over encrypted data in cloud computing. In Proc. the 29th IEEE INFOCOM, March 2010, pp.441-445.
    [12]
    Ma S, Yang B, Li K, Xia F. A privacy-preserving join on outsourced database. In Proc. the 14th Information Security Conference, Oct. 2011, pp.278-292.
    [13]
    Park D, Kim K, Lee P. Public key encryption with conjunctive field keyword search. In Proc. the 5th Int. Workshop on Information Security Applications, Aug. 2004, pp.73-86.
    [14]
    Pinkas B, Reinman T. Oblivious RAM revisited. In Proc. the 30th CRYPT, Aug. 2010, pp.502-519.
    [15]
    Shi E, Bethencourt J, Chan T et al. Multi-dimensional range query over encrypted data. In Proc. the 2007 IEEE Symp. Security and Privacy, May 2007, pp.350-364.
    [16]
    Song D,Wagner D, Perrig A. Practical techniques for searches on encrypted data. In Proc. the 2000 IEEE Symposium on Security and Privacy, May 2000, pp.44-55.
    [17]
    van Liesdonk P, Sedghi S, Doumen J et al. Computationally efficient searchable symmetric encryption. In Proc. the 7th VLDB Workshop. Secure Data Management, Sept. 2010, pp. 87-100.
    [18]
    Pang X, Yang B, Huang Q. Privacy-preserving noisy keyword search in cloud computing. In Proc. the 14th Int. Conf. Information and Communications Security, October 2012, pp.154-166.
    [19]
    Goldreich O, Ostrovsky R. Software protection and simulation on oblivious RAMS. Journal of the ACM, 1996, 43(3): 431-473.
    [20]
    Dodis Y, Ostrovsky R, Reyzin L, Smith A. Fuzzy extractors: How to generate strong keys from biometrics and other noisy data. SIAM Journal of Computing, 2008, 38(1): 97-139.
  • Related Articles

    [1]Peng Jiang, Yi Mu, Fuchun Guo, Qiao-Yan Wen. Private Keyword-Search for Database Systems Against Insider Attacks[J]. Journal of Computer Science and Technology, 2017, 32(3): 599-617. DOI: 10.1007/s11390-017-1745-8
    [2]Yu-Rong Cheng, Ye Yuan, Jia-Yu Li, Lei Chen, Guo-Ren Wang. Keyword Query over Error-Tolerant Knowledge Bases[J]. Journal of Computer Science and Technology, 2016, 31(4): 702-719. DOI: 10.1007/s11390-016-1658-y
    [3]Dan Yang, De-Rong Shen, Ge Yu, Yue Kou, Tie-Zheng Nie. Query Intent Disambiguation of Keyword-Based Semantic Entity Search in Dataspaces[J]. Journal of Computer Science and Technology, 2013, 28(2): 382-393. DOI: 10.1007/s11390-013-1338-0
    [4]Zu-Jie Ren, Ke Chen, Li-Dan Shou, Gang Chen, Yi-Jun Bei, Xiao-Yan Li. HAPS: Supporting Effective and Efficient Full-Text P2P Search with Peer Dynamics[J]. Journal of Computer Science and Technology, 2010, 25(3): 482-498.
    [5]Narjes Hachani, Mohamed Ali Ben Hassine, Han&egravene Chettaoui, Habib Ounelli. Cooperative Answering of Fuzzy Queries[J]. Journal of Computer Science and Technology, 2009, 24(4): 675-686.
    [6]Jun Zhang, Zhao-Hui Peng, Shan Wang, Hui-Jing Nie. CLASCN: Candidate Network Selection for Efficient Top-k Keyword Queries over Databases[J]. Journal of Computer Science and Technology, 2007, 22(2): 197-207.
    [7]Shan Wang, Kun-Long Zhang. Searching Databases with Keywords[J]. Journal of Computer Science and Technology, 2005, 20(1).
    [8]Shen Li. Fuzzy Logic Control ASIC Chip[J]. Journal of Computer Science and Technology, 1997, 12(3): 263-270.
    [9]Wang Shijun, Wang Shulin. Research and Design of a Fuzzy Neural Expert System[J]. Journal of Computer Science and Technology, 1995, 10(2): 112-123.
    [10]Liu Dongbo, Li Deyi. A Fuzzy Proof Theory[J]. Journal of Computer Science and Technology, 1990, 5(1): 92-96.

Catalog

    Article views (22) PDF downloads (1680) Cited by()
    Related

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return