Efficient Fuzzy Search on Encrypted Data

نویسندگان

  • Alexandra Boldyreva
  • Nathan Chenette
چکیده

We study the problem of efficient (sub-linear) fuzzy search on encrypted outsourced data, inthe symmetric-key setting. In particular, a user who stores encrypted data on a remote untrustedserver forms queries that enable the server to efficiently locate the records containing the requestedkeywords, even though the user may misspell keywords or provide noisy data in the query. Wedefine an appropriate primitive for a general closeness function on the message space that we callefficiently fuzzy-searchable encryption (EFSE ). Next we identify an optimal security notion forEFSE. We demonstrate that existing schemes do not meet our security definition and propose anew scheme that we prove secure under basic assumptions. Unfortunately, the scheme requireslarge ciphertext length, but we show that, in a sense, this space-inefficiency is unavoidable for ageneral, optimally-secure scheme. Seeking the right balance between efficiency and security, wethen show how to construct schemes that are more efficient and satisfy a weaker security notionthat we propose. To illustrate, we present and analyze a more space-efficient scheme for supportingfuzzy search on biometric data that achieves the weaker notion.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Fuzzy retrieval of encrypted data by multi-purpose data-structures

The growing amount of information that has arisen from emerging technologies has caused organizations to face challenges in maintaining and managing their information. Expanding hardware, human resources, outsourcing data management, and maintenance an external organization in the form of cloud storage services, are two common approaches to overcome these challenges; The first approach costs of...

متن کامل

EliMFS: Achieving Efficient, Leakage-resilient, and Multi-keyword Fuzzy Search on Encrypted Cloud Data

Motivated by privacy preservation requirements for outsourced data, keyword searches over encrypted cloud data have become a hot topic. Compared to single-keyword exact searches, multi-keyword fuzzy search schemes attract more attention because of their improvements in search accuracy, typo tolerance, and user experience in general. However, existing multi-keyword fuzzy search solutions are not...

متن کامل

Conjunctive Fuzzy Keyword Search Over Encrypted Data in Cloud Computing

As Cloud Computing becomes prevalent, more and more sensitive information are centralized into the cloud. For the protect data privacy, sensitive data usually have to be encrypted before outsourcing, which makes efficient data utilization a very challenging task. Although traditional searchable encryption schemes allow a user to search over encrypted data through keywords and selectively retrie...

متن کامل

Efficient verifiable fuzzy keyword search over encrypted data in cloud computing

As cloud computing becomes prevalent, more and more sensitive data is being centralized into the cloud by users. To maintain the confidentiality of sensitive user data against untrusted servers, the data should be encrypted before they are uploaded. However, this raises a new challenge for performing search over the encrypted data efficiently. Although the existing searchable encryption schemes...

متن کامل

Improving the Efficiency of Data Retrieval in Secure Cloud by Introducing Conjunction of Keywords

Cloud computing uses internet and central remote servers to maintain data and applications. This allows much more efficient computing by centralizing storage, memory, procession and bandwidth. The data is stored in off-premises and accessing this data through keyword search. Traditional keyword search was based on plaintext keyword search. But for protecting data privacy the sensitive data shou...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:
  • IACR Cryptology ePrint Archive

دوره 2014  شماره 

صفحات  -

تاریخ انتشار 2014