高级检索
    王恺璇, 李宇溪, 周福才, 王权琦. 面向多关键字的模糊密文搜索方法[J]. 计算机研究与发展, 2017, 54(2): 348-360. DOI: 10.7544/issn1000-1239.2017.20151125
    引用本文: 王恺璇, 李宇溪, 周福才, 王权琦. 面向多关键字的模糊密文搜索方法[J]. 计算机研究与发展, 2017, 54(2): 348-360. DOI: 10.7544/issn1000-1239.2017.20151125
    Wang Kaixuan, Li Yuxi, Zhou Fucai, Wang Quanqi. Multi-Keyword Fuzzy Search over Encrypted Data[J]. Journal of Computer Research and Development, 2017, 54(2): 348-360. DOI: 10.7544/issn1000-1239.2017.20151125
    Citation: Wang Kaixuan, Li Yuxi, Zhou Fucai, Wang Quanqi. Multi-Keyword Fuzzy Search over Encrypted Data[J]. Journal of Computer Research and Development, 2017, 54(2): 348-360. DOI: 10.7544/issn1000-1239.2017.20151125

    面向多关键字的模糊密文搜索方法

    Multi-Keyword Fuzzy Search over Encrypted Data

    • 摘要: 围绕多关键字的模糊匹配和数据安全性保障问题,展开对多关键字模糊搜索方法的研究,提出一种面向多关键字的模糊密文搜索方案.该方案以布隆过滤器(Bloom filter)为基础,使用对偶编码函数和位置敏感Hash函数来对文件索引进行构建,并使用距离可恢复加密算法对该索引进行加密,实现了对多关键字的密文模糊搜索.同时方案不需要提前设置索引存储空间,从而大大降低了搜索的复杂度.除此之外,该方案与已有方案相比不需要预定义字典库,降低了存储开销.实验分析和安全分析表明,该方案不仅能够实现面向多关键字的密文模糊搜索,而且保证了方案的机密性和隐私性.

       

      Abstract: Cloud computing is one of the most important and promising technologies. Data owners can outsource their sensitive data in a cloud and retrieve them whenever and wherever they want. But for protecting data privacy, sensitive data have to be encrypted before storing, which abandons traditional data utilization based on plaintext keyword search. Around the multi-keyword fuzzy matching and data security protection problems, we propose a multi-keyword fuzzy search method on the encrypted data. Based on the Bloom filter, our scheme uses dual coding function and the position sensitive Hash function to build file index. In the meantime, it uses the distance recoverable encryption arithmetic to encrypt the file index, consequently achieving the function which is facing the multi-keyword to fuzzy search over the encrypted data. Meanwhile, the scheme does not need to set index storage space in advance, which greatly reduces the complexity of the search. Compared with the existing solutions, the scheme does not need predefined dictionary library which lowers the storage overhead in consequence. Experimental analysis and security analysis show that the proposed scheme not only achieves the multi-keyword fuzzy search over the encrypted data, and guarantees the confidentiality and privacy.

       

    /

    返回文章
    返回