期刊文献+

A Novel Fuzzy Keyword Retrieval Scheme over Encrypted Cloud Data

A Novel Fuzzy Keyword Retrieval Scheme over Encrypted Cloud Data
原文传递
导出
摘要 In this paper, we focus on the fuzzy keyword search problem over the encrypted cloud data in the cloud computing and propose a novel Two-Step-Bloom-Secure-Filter (TSBSF) scheme based on Bloom filter to realize the efficiency and flexibility of data use. The proposed scheme not only reduces the space complexity significantly but also supports the data update with low time complexity and guarantees the search accuracy. Experimental results on real world data have certified the validity and practicality of this novel method. In this paper, we focus on the fuzzy keyword search problem over the encrypted cloud data in the cloud computing and propose a novel Two-Step-Bloom-Secure-Filter (TSBSF) scheme based on Bloom filter to realize the efficiency and flexibility of data use. The proposed scheme not only reduces the space complexity significantly but also supports the data update with low time complexity and guarantees the search accuracy. Experimental results on real world data have certified the validity and practicality of this novel method.
出处 《Wuhan University Journal of Natural Sciences》 CAS 2013年第5期393-401,共9页 武汉大学学报(自然科学英文版)
基金 Supported by the National Natural Science Foundation of China (61170234) (60803155) the Strategic Priority Research Program of the Chinese Academy of Sciences (XDA06030601) the Funding of Science and Technology on Information Assurance Laboratory (KJ-13-02)
关键词 fuzzy search privacy preserving cloud computing fuzzy search privacy preserving cloud computing
  • 相关文献

参考文献17

  • 1Armbrust M, Fox A, Griffith R, et al. A view of cloud comput-ting [J]. Communications of the ACM, 2010, 53(4): 50-58.
  • 2Curtmola R, Garay J, Kamara S, et al. Searchable symmetric encryption: improved definitions and efficient constructions [C] //Proe 13th ACM Conference on Computer and communica- tions security. New York: ACM Press, 2006: 79-88.
  • 3Shmueli E, Waisenberg R, Elovici Y, et al. Designing secure indexes for encrypted databases [C]//Proc 19th Annual IFIP WG 11.3 Working Conference on Data and Applications Se- curity. Berlin, Heidelberg: Springer-Verlag, 2005: 54- 68.
  • 4Yang C, Zhang W, Xu J, et al. A fast privacy-preserving multi-keyword search scheme on cloud data [C]//Proc 2012 International Conference on Cloud and Service Computing (CSC). Shanghai: IEEE Press, 2012: 104-110.
  • 5Xu J, Zhang W, Yang C, et al. Two-Step-Ranking secure multi-keyword search over encrypted cloud data [C]//Proc 2012 International Conference on Cloud and Service Com- puting (CSC). Shanghai: IEEE Press, 2012: 124-130.
  • 6Li J, Wang Q, Wang C, et al. Fuzzy keyword search over en- crypted data in cloud computing [C]//Proc 30th IEEE Interna- tional Conference on Computer Communications (INFOCOM). San Diego: IEEE Press, 2010: 1-5.
  • 7Wang C, Ren K, Yu S, et al. Achieving usable and pri- vacy-assured similarity search over outsourced cloud data [C] //Proc 32th IEEE International Conference on Computer Communications (INFOCOM). Orlando: IEEE Press, 2012: 451-459.
  • 8Chuah M, Hu W. Privacy-aware bedtree based solution for fuzzy multi-keyword search over encrypted data [C]//Proe 31st International Conferenee on Distributed Computing Systems Workshops (ICDCSW). Minneapolis: IEEE Press, 2011 : 273-281.
  • 9Liu C, Zhu L, Li L, et al. Fuzzy keyword search on en- crypted cloud storage data with small index [C]//Proc 2011International Conference on Cloud Computing and Intelli- gence Systems (CCIS). Beijing: IEEE Press, 2011: 269-273.
  • 10Wei Zhou,Lixi Liu,He Jing,Chi Zhang,Shaowen Yao,Shipu Wang.K-Gram Based Fuzzy Keyword Search over Encrypted Cloud Computing[J].Journal of Software Engineering and Applications,2013,6(1):29-32. 被引量:4

共引文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部