[1]郭文杰,张应辉,郑东.云存储中支持词频和用户喜好的密文模糊检索[J].深圳大学学报理工版,2015,32(5):532-537.[doi:10.3724/SP.J.1249.2015.05532]
 Guo Wenjie,Zhang Yinghui,et al.Fuzzy search over encrypted data supporting word frequencies and user preferences in cloud storage[J].Journal of Shenzhen University Science and Engineering,2015,32(5):532-537.[doi:10.3724/SP.J.1249.2015.05532]
点击复制

云存储中支持词频和用户喜好的密文模糊检索()
分享到:

《深圳大学学报理工版》[ISSN:1000-2618/CN:44-1401/N]

卷:
第32卷
期数:
2015年第5期
页码:
532-537
栏目:
电子与信息科学
出版日期:
2015-09-18

文章信息/Info

Title:
Fuzzy search over encrypted data supporting word frequencies and user preferences in cloud storage
文章编号:
201505012
作者:
郭文杰12张应辉12郑东1
1)西安邮电大学无线网络安全技术国家工程实验室,西安 710121
2)中国科学院信息工程研究所信息安全国家重点实验室,北京 100093
Author(s):
Guo Wenjie1 2 Zhang Yinghui1 2 and Zheng Dong1
1) National Engineering Laboratory for Wireless Security, Xi’an University of Posts and Telecommunications, Xi’an 710121, P.R.China
2) State Key Laboratory of Information Engineering, Institute of Information Security, Chinese Academy of Sciences, Beijing 100093, P.R.China
关键词:
数据安全可搜索加密用户喜好多关键词搜索隐私保护云存储
Keywords:
data security searchable encryption users preference multi-keyword search privacy-preserving cloud storage
分类号:
TP 309.2
DOI:
10.3724/SP.J.1249.2015.05532
文献标志码:
A
摘要:
为在云计算环境下实现具有隐私保护的数据检索,设计支持词频和用户喜好的多关键词模糊搜索方案.该方案采用布隆过滤器,在文件索引的建立过程中嵌入词频信息,在查询向量的生成过程中嵌入用户喜好信息,并基于局部敏感哈希函数实现关键词的模糊检索.在数据搜索过程中,该方案允许授权用户输入多个关键词,并对每个关键词设定相应的权重,即使关键词存在误差,也可准确地返回相关数据.安全性分析表明,该方案在已知密文模型的条件下是安全的,可保护查询关键词和陷门信息不被云存储服务器获取.
Abstract:
In order to protect privacy in cloud computing environment, we design a multi-keyword fuzzy search scheme that supports word frequency and user preference. This new scheme employs a bloom filter. The keyword frequency information is embedded during the file index establishment process, and the user preference is included in the generation of a querying vector. Finally, a fuzzy multi-keyword search is implemented based on the local sensitive hash function. The proposed scheme allows authorized users to input multiple keywords, and set their corresponding weights. It returns accurate results even if the keywords contain certain errors. Security analysis shows that the new scheme is safe under the known cipher model. It can protect the query keywords and trapdoor information from being elicited by the cloud storage server.

参考文献/References:

[1] Song D X, Wagner D, Perrig A. Practical techniques for searches on encrypted data[C]// Proceedings of the IEEE Symposium on Security and Privacy. Berkeley (USA): IEEE, 2000: 44-55.
[2] Boneh D, Crescenzo G D, Ostrovsky R, et al. Public key encryption with keyword search[C]// International Conference on the Theory and Applications of Crytographic Techniques. Berlin: Springer, 2004, 3027: 506-522.
[3] Curtmola R, Garay J, Kamara S, et al. Searchable symmetric encryption: improved definitions and efficient constructions[J]. Journal of Computer Security, 2011, 19(5): 895-934.
[4] Bsch C, Peter A, Leenders B, et al. Distributed searchable symmetric encryption[C]// PST2014 International Conference on Privacy, Security and Trust.[S. l.]: IEEE, 2014: 330-337.
[5] Byun J W, Lee D H, Lim J. Efficient conjunctive keyword search on encrypted data storage system[C]// Public Key Infrastructure: 3rd European PKI Workshop: Theory and Practice. Berlin: Springer, 2006, 4043: 184-196.
[6] Wu Qi, Wan Changxuan. Multi-user conjunctive keyword search scheme over ciphertext[J]. Computer Science, 2013, 9: 1-5.
[7] Hwang M S, Hsu S T, Lee C C. A new public key encryption with conjunctive field keyword search scheme[J]. Information Technology & Control, 2014, 43(3): 277-288.
[8] Liu Chang, Zhu Liehuang, Li Longyijia, et al. Fuzzy keyword search on encrypted cloud storage data with small index[C]// International Conference on Cloud Computing and Intelligence Systems (CCIS). Beijing: IEEE, 2011: 269-273.
[9] Strizhov M. Towards a practical and efficient search over encrypted data in the cloud[C]// International Conference on Cloud Engineering (IC2E). Tempe (USA): IEEE, 2015: 496-498.
[10] Cao Ning, Wang Cong, Li Ming, et al. Privacy-preserving multi-keyword ranked search over encrypted cloud data[J]. IEEE Transactions on Parallel & Distributed Systems, 2014, 25(1):222-233.
[11] Khan N S, Krishna C R, Khurana A. Secure ranked fuzzy multi-keyword search over outsourced encrypted cloud data[C]// International Conference on Computer and Communication Technology(ICCCT). Allahabad(India): IEEE, 2014: 241-249.
[12] Fu Zhangjie, Sun Xingming, Liu Qi, et al. Achieving efficient cloud search services: multi-keyword ranked search over encrypted cloud data supporting parallel computing[J]. IEICE Transactions on Communications, 2015, 98(1): 190-200.
[13] Fu Zhangjie, Sun Xingming, Liu Qi, et al. Achieving effective cloud search services: multi-keyword ranked search over encrypted cloud data supporting synonym query[J]. IEEE Transactions on Consumer Electronics, 2014, 60(1):164-172.
[14] Wang Bing, Yu Shucheng, Lou Wenjing, et al. Privacy-preserving multi-keyword fuzzy search over encrypted data in the cloud[C]// IEEE Conference on Computer Communications.[S. l.]: IEEE, 2014: 2112-2120.
[15] Bloom B H. Space/time trade-offs in hash coding with allowable errors[J]. Communications of the ACM, 1970, 13(7): 422-426.
[16] Indyk P, Motwani R. Approximate nearest neighbors: towards removing the curse of dimensionality[C]// Proceedings of the 30th Annual Symposium on Theory of Computing. New York (USA): ACM, 1998: 604-613.
[17] Datar M, Immorlica N, Indyk P, et al. Locality-sensitive hashing scheme based on p-stable distributions[C]// Proceedings of the 20th Annual Symposium on Computational Geometry. New York(USA): ACM, 2004: 253-262.
[18] Zobel J, Moffat A. Exploring the similarity space[J]. ACM SIGIR Forum, 1998, 32(1): 18-34.
[19] Yang Guangbao, Zheng Huijin. Access control technology based on multiple matrix[J]. Computer Systems & Applications, 2014,23(4):91-96.(in Chinese)
杨光豹,郑慧锦.基于双矩阵访问的控制技术[J].计算机系统应用,2014,23(4):91-96.
[20] Wong W K, Cheung D W, Kao B, et al. Secure kNN computation on encrypted databases[C]// Proceedings of the SIGMOD International Conference on Management of Data. New York(USA): ACM, 2009: 139-152.

相似文献/References:

[1]朱炜玲,喻建平.物联网RFID系统隐私保护三方认证协议[J].深圳大学学报理工版,2012,29(No.2(095-188)):95.[doi:10.3724/SP.J.1249.2012.02095]
 ZHU Wei-ling and YU Jian-ping.A privacy preserving three-party authentication protocol for RFID systems in the internet of things[J].Journal of Shenzhen University Science and Engineering,2012,29(5):95.[doi:10.3724/SP.J.1249.2012.02095]
[2]闫巧,宁土文.基于矩阵边采样的IP追踪[J].深圳大学学报理工版,2012,29(No.5(377-470)):399.[doi:10.3724/SP.J.1249.2012.05399]
 YAN Qiao and NING Tu-wen.IP traceback with matrix edge sampling[J].Journal of Shenzhen University Science and Engineering,2012,29(5):399.[doi:10.3724/SP.J.1249.2012.05399]
[3]田传俊.频率不相关性及其在单钥密码系统中的应用[J].深圳大学学报理工版,2015,32(1):32.[doi:10.3724/SP.J.1249.2015.01032]
 Tian Chuanjun.Frequency irrelevance and its applications in one-key cryptosystems[J].Journal of Shenzhen University Science and Engineering,2015,32(5):32.[doi:10.3724/SP.J.1249.2015.01032]

备注/Memo

备注/Memo:
Received:2015-05-04;Accepted:2015-07-27
Foundation:National Natural Science Foundation of China (61272037, 61402366); Natural Science Basic Research Program of Shaanxi Province (2015JQ6236)
Corresponding author:Professor Zheng Dong. E-mail: zhengdong@xupt.edu.cn
Citation:Guo Wenjie,Zhang Yinghui,Zheng Dong. Fuzzy search over encrypted data supporting word frequencies and user preferences in cloud storage[J]. Journal of Shenzhen University Science and Engineering, 2015, 32(5): 532-537.(in Chinese)
基金项目:国家自然科学基金资助项目(61272037,61402366);陕西省自然科学基础研究计划资助项目(2015JQ6236)
作者简介:郭文杰(1989—),男(汉族),山西省方山县人,西安邮电大学硕士研究生.E-mail:fsxycu12686@163.com
引文:郭文杰,张应辉,郑东.云存储中支持词频和用户喜好的密文模糊检索[J]. 深圳大学学报理工版,2015,32(5):532-537.
更新日期/Last Update: 2015-09-15