• Complex
  • Title
  • Keyword
  • Abstract
  • Scholars
  • Journal
  • ISSN
  • Conference
成果搜索

author:

Yang, Yang (Yang, Yang.) [1] | Yang, Shu-Lue (Yang, Shu-Lue.) [2] | Ke, Min (Ke, Min.) [3]

Indexed by:

EI Scopus PKU CSCD

Abstract:

With the development of cloud computing, data owners are motivated to outsource their data and the corresponding complex management tasks to the public cloud for convenience and economic savings. In order to protect data privacy, data owners prefer to outsource their sensitive data in an encrypted form to the cloud, which makes the traditional search techniques useless. Searchable encryption is a technique to search on encrypted data without decryption to realize efficient data utilization. There have been some studies on secure searching over encrypted cloud data, which pay attention to both privacy and practicability of data. However, most of them are based on accurate keyword matching. The fuzzy keyword search problem remains unsolved. Up to date, the existing construction of fuzzy keyword search schemes has to build fuzzy keyword set. It will lead to tremendous computation and storage overheads. In this paper, we propose a new scheme without constructing fuzzy keyword set. Based on the idea of dimension reduction of Simhash, each keyword is transformed to a Simhash fingerprint by n -gram method to achieve fuzzy matching. Combining the hamming distance and keyword relevance score, we design a double factor ranking algorithm to sort the results accurately. In addition, tree structure and a novel traversal method are utilized to further improve the efficiency of our proposed scheme. The tree can be traversed even if the value of the tree node is not equal to the expected value by the proposed traversal method. Theoretical analysis and experimental results show that the scheme realizes the ranked fuzzy keyword search over encrypted cloud data. Meanwhile, the computation and storage overheads are greatly reduced. © 2017, Science Press. All right reserved.

Keyword:

Cloud computing Cryptography Data privacy Digital storage Forestry Hamming distance Search engines Trees (mathematics)

Community:

  • [ 1 ] [Yang, Yang]College of Mathematics and Computer Science, Fuzhou University, Fuzhou; 350108, China
  • [ 2 ] [Yang, Yang]Key Lab of Information Security of Network System in Fujian Province, Fuzhou University, Fuzhou; 350108, China
  • [ 3 ] [Yang, Shu-Lue]College of Physics and Information Engineering, Fuzhou University, Fuzhou; 350108, China
  • [ 4 ] [Yang, Shu-Lue]Key Lab of Information Security of Network System in Fujian Province, Fuzhou University, Fuzhou; 350108, China
  • [ 5 ] [Ke, Min]College of Mathematics and Computer Science, Fuzhou University, Fuzhou; 350108, China
  • [ 6 ] [Ke, Min]Key Lab of Information Security of Network System in Fujian Province, Fuzhou University, Fuzhou; 350108, China

Reprint 's Address:

  • 杨书略

    [yang, shu-lue]college of physics and information engineering, fuzhou university, fuzhou; 350108, china;;[yang, shu-lue]key lab of information security of network system in fujian province, fuzhou university, fuzhou; 350108, china

Show more details

Related Keywords:

Related Article:

Source :

Chinese Journal of Computers

ISSN: 0254-4164

CN: 11-1826/TP

Year: 2017

Issue: 2

Volume: 40

Page: 431-444

Cited Count:

WoS CC Cited Count: 0

SCOPUS Cited Count: 17

ESI Highly Cited Papers on the List: 0 Unfold All

WanFang Cited Count:

Chinese Cited Count:

30 Days PV: 1

Online/Total:200/10047671
Address:FZU Library(No.2 Xuyuan Road, Fuzhou, Fujian, PRC Post Code:350116) Contact Us:0591-22865326
Copyright:FZU Library Technical Support:Beijing Aegean Software Co., Ltd. 闽ICP备05005463号-1