Fuzzy Keyword Search over Encrypted Data in Cloud Computing
Top Cited Papers
- 1 March 2010
- conference paper
- conference paper
- Published by Institute of Electrical and Electronics Engineers (IEEE)
Abstract
As Cloud Computing becomes prevalent, more and more sensitive information are being centralized into the cloud. For the protection of data privacy, sensitive data usually have to be encrypted before outsourcing, which makes effective data utilization a very challenging task. Although traditional searchable encryption schemes allow a user to securely search over encrypted data through keywords and selectively retrieve files of interest, these techniques support only exact keyword search. That is, there is no tolerance of minor typos and format inconsistencies which, on the other hand, are typical user searching behavior and happen very frequently. This significant drawback makes existing techniques unsuitable in Cloud Computing as it greatly affects system usability, rendering user searching experiences very frustrating and system efficacy very low. In this paper, for the first time we formalize and solve the problem of effective fuzzy keyword search over encrypted cloud data while maintaining keyword privacy. Fuzzy keyword search greatly enhances system usability by returning the matching files when users' searching inputs exactly match the predefined keywords or the closest possible matching files based on keyword similarity semantics, when exact match fails. In our solution, we exploit edit distance to quantify keywords similarity and develop an advanced technique on constructing fuzzy keyword sets, which greatly reduces the storage and representation overheads. Through rigorous security analysis, we show that our proposed solution is secure and privacy-preserving, while correctly realizing the goal of fuzzy keyword search.Keywords
This publication has 8 references indexed in Scilit:
- Efficient interactive fuzzy keyword searchPublished by Association for Computing Machinery (ACM) ,2009
- Space-Constrained Gram-Based Indexing for Efficient Approximate String SearchPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2009
- Efficient Merging and Filtering Algorithms for Approximate String SearchesPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2008
- Private Query on Encrypted Data in Multi-user SettingsPublished by Springer Science and Business Media LLC ,2008
- Deterministic and Efficiently Searchable EncryptionPublished by Springer Science and Business Media LLC ,2007
- Conjunctive, Subset, and Range Queries on Encrypted DataPublished by Springer Science and Business Media LLC ,2007
- Searchable symmetric encryptionPublished by Association for Computing Machinery (ACM) ,2006
- Secure Multiparty Computation of ApproximationsLecture Notes in Computer Science, 2001