Cover
Vol. 17 No. 2 (2021)

Published: December 31, 2021

Pages: 1-10

Original Article

Secure Multi-keyword Similarity Search Over Encrypted Data With Security Improvement

Abstract

Searchable encryption (SE) is an interesting tool that enables clients to outsource their encrypted data into external cloud servers with unlimited storage and computing power and gives them the ability to search their data without decryption. The current solutions of SE support single-

References

  1. M. S. Islam, M. Kuzu, and M. Kantarcioglu, "Access pattern disclosure on searchable encryption: ramification, attack and mitigation," in Ndss, 2012, vol. 20, p. 12: Citeseer.
  2. D. X. Song, D. Wagner, and A. Perrig, "Practical techniques for searches on encrypted data," in Proceeding 2000 IEEE Symposium on Security and Privacy. S&P 2000, 2000, pp. 44-55: IEEE.
  3. E.-J. J. I. C. e. A. Goh, "Secure indexes," in Proc. Cryptol. ePrint Arch. vol. 2003, p. 216, 2003.
  4. R. Curtmola, J. Garay, S. Kamara, and R. J. J. o. C. S. Ostrovsky, "Searchable symmetric encryption: improved definitions and efficient constructions," in Proc. CCS, vol. 19, no. 5, pp. 895-934, 2011.
  5. Y.-C. Chang and M. Mitzenmacher, "Privacy preserving keyword searches on remote encrypted data," in International conference on applied cryptography and network security, 2005, pp. 442-455: Springer.
  6. P. Golle, J. Staddon, and B. Waters, "Secure conjunctive keyword search over encrypted data," in International conference on applied cryptography and network security, 2004, pp. 31-45: Springer.
  7. L. Ballard, S. Kamara, and F. Monrose, "Achieving efficient conjunctive keyword searches over encrypted data," in International conference on information and communications security, 2005, pp. 414-426: Springer.
  8. D. Boneh and B. Waters, "Conjunctive, subset, and range queries on encrypted data," in Theory of cryptography conference, 2007, pp. 535-554: Springer.
  9. J. Li, Q. Wang, C. Wang, N. Cao, K. Ren, and W. Lou, "Fuzzy keyword search over encrypted data in cloud computing," in 2010 Proceedings IEEE INFOCOM, 2010, pp. 1-5: IEEE.
  10. J. Li, Q. Wang, C. Wang, N. Cao, K. Ren, and W. J. I. C. e. A. Lou, "Enabling Efficient Fuzzy Keyword Search over Encrypted Data in Cloud Computing," in IACR Cryptol. ePrint. vol. 2009, p. 593, 2009.
  11. C. Wang, K. Ren, S. Yu, and K. M. R. Urs, "Achieving usable and privacy-assured similarity search over outsourced cloud data," in 2012 Proceedings IEEE INFOCOM, 2012, pp. 451-459: IEEE.
  12. M. Kuzu, M. S. Islam, and M. Kantarcioglu, "Efficient similarity search over encrypted data," in 2012 IEEE 28th International Conference on Data Engineering, 2012, pp. 1156-1167: IEEE.
  13. B. Wang, S. Yu, W. Lou, and Y. T. Hou, "Privacy- preserving multi-keyword fuzzy search over encrypted data in the cloud," in IEEE INFOCOM 2014-IEEE Conference on Computer Communications, 2014, pp. 2112-2120: IEEE.
  14. D. Cash, P. Grubbs, J. Perry, and T. Ristenpart, "Leakage-abuse attacks against searchable encryption," in Proceedings of the 22nd ACM SIGSAC conference on computer and communications security, 2015, pp. 668- 679.
  15. Y. Zhang, J. Katz, and C. Papamanthou, "All your queries are belong to us: The power of file-injection attacks on searchable encryption," in 25th {USENIX} Security Symposium ({USENIX} Security 16), 2016, pp. 707-720.
  16. P. Paillier, "Public-key cryptosystems based on composite degree residuosity classes," in International conference on the theory and applications of cryptographic techniques, 1999, pp. 223-238: Springer.
  17. C. Wang, N. Cao, J. Li, K. Ren, and W. Lou, "Secure ranked keyword search over encrypted cloud data," in 2010 IEEE 30th international conference on distributed computing systems, 2010, pp. 253-262: IEEE.
  18. C. Wang, N. Cao, K. Ren, W. J. I. T. o. p. Lou, and d. systems, "Enabling secure and efficient ranked keyword search over outsourced cloud data," vol. 23, no. 8, pp. 1467-1479, 2011.
  19. N. Cao, C. Wang, M. Li, K. Ren, W. J. I. T. o. p. Lou, and d. systems, "Privacy-preserving multi-keyword ranked search over encrypted cloud data," in Proc. IEEE INFOCOM, vol. 25, no. 1, pp. 222-233, 2013.
  20. W. Sun et al., "Privacy-preserving multi-keyword text search in the cloud supporting similarity-based ranking," Mohammed & Abdulsada in Proceedings of the 8th ACM SIGSAC symposium on Information, computer and communications security, 2013, pp. 71-82.
  21. R. Li, Z. Xu, W. Kang, K. C. Yow, and C.-Z. J. F. G. C. S. Xu, "Efficient multi-keyword ranked query over encrypted data in cloud computing," in Future Generation Computer Systems vol. 30, pp. 179-190, 2014.
  22. C.-M. Yu, C.-Y. Chen, and H.-C. J. I. s. j. Chao, "Privacy-preserving multikeyword similarity search over outsourced cloud data," in IEEE systems journal, vol. 11, no. 2, pp. 385-394, 2015.
  23. J. Wang, X. Yu, M. J. A. J. f. S. Zhao, and Engineering, "Privacy-preserving ranked multi-keyword fuzzy search on cloud encrypted data supporting range query," in Arabian Journal for Science and Engineering, vol. 40, no. 8, pp. 2375-2388, 2015.
  24. Z. Fu, X. Wu, C. Guan, X. Sun, K. J. I. T. o. I. F. Ren, and Security, "Toward efficient multi-keyword fuzzy search over encrypted outsourced data with accuracy improvement," in IEEE Transactions, vol. 11, no. 12, pp. 2706-2716, 2016.
  25. T. Moataz, A. Shikfa, N. Cuppens-Boulahia, and F. Cuppens, "Semantic search over encrypted data," in ICT 2013, 2013, pp. 1-5: IEEE.
  26. Z. Fu, J. Shu, X. Sun, and D. Zhang, "Semantic keyword search based on trie over encrypted cloud data," in Proceedings of the 2nd international workshop on security in cloud computing, 2014, pp. 59-62.
  27. S. Bugiel, S. Nurnberger, A. Sadeghi, and T. Schneider, "Twin clouds: An architecture for secure cloud computing," in Workshop on cryptography and security in clouds (WCSC 2011), 2011, vol. 1217889.
  28. G. Liu, G. Yang, S. Bai, Q. Zhou, and H. J. I. A. Dai, "FSSE: An effective fuzzy semantic searchable encryption scheme over encrypted cloud data," in IEEE Access, vol. 8, pp. 71893-71906, 2020.
  29. Z. Fu, L. Xia, X. Sun, A. X. Liu, G. J. I. T. o. I. F. Xie, and Security, "Semantic-aware searching over encrypted data for cloud computing," in IEEE Transactions, vol. 13, no. 9, pp. 2359-2371, 2018.
  30. K. Xue et al., "Two-cloud secure database for numeric- related SQL range queries with privacy preserving," in IEEE Transactions, vol. 12, no. 7, pp. 1596-1608, 2017.
  31. M. F. J. P. Porter, "An algorithm for suffix stripping," Program, 1980.
  32. J. B. J. M. T. C. L. Lovins, "Development of a stemming algorithm," Mech. Transl. Comput. Linguistics, vol. 11, no. 1-2, pp. 22-31, 1968.
  33. P. Indyk and R. Motwani, "Approximate nearest neighbors: towards removing the curse of dimensionality," in Proceedings of the thirtieth annual ACM symposium on Theory of computing, 1998, pp. 604-613.
  34. A. Gionis, P. Indyk, and R. Motwani, "Similarity search in high dimensions via hashing," in Vldb, 1999, vol. 99, no. 6, pp. 518-529.
  35. F. Saad Muhi, "A Pseudorandom Binary Generator Based on Chaotic Linear Feedback Shift Register," Iraqi Journal for Electrical And Electronic Engineering vol. 12, pp. 155-160, 2016.
  36. W. Jiang, M. Murugesan, C. Clifton, and L. Si, "Similar document detection with limited information disclosure," in 2008 IEEE 24th International Conference on Data Engineering, 2008, pp. 735-743: IEEE.
  37. M. Murugesan, W. Jiang, C. Clifton, L. Si, and J. T. V. J. Vaidya, "Efficient privacy-preserving similar document detection," The VLDB Journal, vol. 19, no. 4, pp. 457-475, 2010.
  38. S. Buyrukbilen and S. Bakiras, "Secure similar document detection with simhash," in Workshop on Secure Data Management, 2013, pp. 61-75: Springer.