[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ Skip to main content

Advertisement

Log in

An efficient position-sensitive fuzzy keyword search scheme for encrypted data on hybrid cloud

  • Published:
Cluster Computing Aims and scope Submit manuscript

Abstract

With the growing demand for effective and privacy-preserving data retrieval, searchable encryption has emerged as a promising solution for searching encrypted data stored on remote servers. Compared with exact keyword search, fuzzy keyword search can address misspellings and formatting inconsistencies, thus greatly enhancing the user’s search experience. However, existing fuzzy keyword search schemes tend to ignore the effect of letter position on the sorting of search results, resulting in redundant search results. To address this problem, a novel fuzzy sorting search scheme is proposed to efficiently search encrypted cloud data, which enables sorting while searching. The proposed scheme improves the sorting efficiency while increasing the search accuracy. The proposed scheme considers the alphabetical position of the keywords and uses the Euclidean distance metric to measure the similarity between search keywords and document keywords. To decrease the storage space for indexes, the proposed scheme build a binary index tree and design a tree-based search algorithm based on letter vectors and thresholds. To improve search efficiency, the proposed scheme combines keyword weight and keyword similarity to calculate similarity scores and uses dual servers to search encrypted cloud data. Finally, extensive analysis and experiments certify the effectiveness, efficiency, and accuracy of the proposed scheme, demonstrating its ability to meet the need for security, efficiency, and accuracy.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
£29.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price includes VAT (United Kingdom)

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10

Similar content being viewed by others

Data Availability

No datasets were generated or analysed during the current study.

References

  1. Wang, Z., Gao, W., Yu, J., Shen, W., Hao, R.: Lightweight secure deduplication based on data popularity. IEEE Syst. J. 17(4), 5531–5542 (2023). https://doi.org/10.1109/JSYST.2023.3307883

    Article  MATH  Google Scholar 

  2. Gao, W., Yu, J., Hao, R., Kong, F., Liu, X.: Privacy-preserving face recognition with multi-edge assistance for intelligent security systems. IEEE Internet Things J. 10(12), 10948–10958 (2023). https://doi.org/10.1109/JIOT.2023.3240166

    Article  MATH  Google Scholar 

  3. Wang, Z., Gao, W., Yang, M., Hao, R.: Enabling secure data sharing with data deduplication and sensitive information hiding in cloud-assisted electronic medical systems. Clust. Comput. 26(6), 3839–3854 (2023)

    Article  MATH  Google Scholar 

  4. Lu, Q., Yang, Z., Zhang, H., Chen, F., Xian, H.: Mrfe: a deep learning based multidimensional radio frequency fingerprinting enhancement approach for iot device identification. IEEE Internet Things J. (2024). https://doi.org/10.1109/JIOT.2024.3414195

  5. Tian, C., Yu, J., Zhang, H., Xue, H., Wang, C., Ren, K.: Novel secure outsourcing of modular inversion for arbitrary and variable modulus. IEEE Trans. Serv. Comput. 15(1), 241–253 (2022). https://doi.org/10.1109/TSC.2019.2937486

    Article  MATH  Google Scholar 

  6. Su, Q., Zhang, R., Xue, R., You, S., Gao, S.: Distributed attribute-based signature with attribute dynamic update for smart grid. IEEE Trans. Industr. Informat. (2022). https://doi.org/10.1109/TII.2022.3228688

  7. Shen, W., Gai, C., Yu, J., Su, Y.: Keyword-based remote data integrity auditing supporting full data dynamics. IEEE Trans. Serv. Comput. (2023). https://doi.org/10.1109/TSC.2023.3339521

  8. Chen, B., Xiang, T., He, D., Li, H., Choo, K.-K.R.: Bpvse: publicly verifiable searchable encryption for cloud-assisted electronic health records. IEEE Trans. Inf. Forens. Secur. 18, 3171–3184 (2023). https://doi.org/10.1109/TIFS.2023.3275750

    Article  Google Scholar 

  9. Ge, X., Yu, J., Hao, R.: Privacy-preserving graph matching query supporting quick subgraph extraction. IEEE Trans. Depend. Secur Comput. 21(3), 1286–1300 (2024). https://doi.org/10.1109/TDSC.2023.3276360

    Article  MATH  Google Scholar 

  10. Zheng, Y., Zhu, H., Lu, R., Guan, Y., Zhang, S., Wang, F., Shao, J., Li, H.: Pgsim: efficient and privacy-preserving graph similarity query over encrypted data in cloud. IEEE Trans. Inf. Forens. Secur. 18, 2030–2045 (2023). https://doi.org/10.1109/TIFS.2023.3262147

    Article  MATH  Google Scholar 

  11. Li, X., Tong, Q., Zhao, J., Miao, Y., Ma, S., Weng, J., Ma, J., Choo, K.-K.R.: Vrfms: verifiable ranked fuzzy multi-keyword search over encrypted data. IEEE Trans. Serv. Comput. 16(1), 698–710 (2023). https://doi.org/10.1109/TSC.2021.3140092

    Article  MATH  Google Scholar 

  12. Tong, Q., Miao, Y., Weng, J., Liu, X., Choo, K.-K.R., Deng, R.H.: Verifiable fuzzy multi-keyword search over encrypted data with adaptive security. IEEE Trans. Knowl. Data Eng. 35(5), 5386–5399 (2023). https://doi.org/10.1109/TKDE.2022.3152033

    Article  MATH  Google Scholar 

  13. Wang, B., Yu, S., Lou, W., Hou, Y.T.: Privacy-preserving multi-keyword fuzzy search over encrypted data in the cloud. In: IEEE INFOCOM 2014—IEEE Conference on Computer Communications, pp. 2112–2120 (2014). https://doi.org/10.1109/INFOCOM.2014.6848153

  14. Li, J., Wang, Q., Wang, C., Cao, N., Ren, K., Lou, W.: Fuzzy keyword search over encrypted data in cloud computing. In: 2010 Proceedings IEEE INFOCOM, pp. 1–5 (2010). https://doi.org/10.1109/INFCOM.2010.5462196

  15. Liu, C., Zhu, L., Li, L., Tan, Y.: Fuzzy keyword search on encrypted cloud storage data with small index. In: 2011 IEEE International Conference on Cloud Computing and Intelligence Systems, pp. 269–273 (2011). https://doi.org/10.1109/CCIS.2011.6045073

  16. Jie, W., Xiao, Y., Ming, Z., Yong, W.: A novel dynamic ranked fuzzy keyword search over cloud encrypted data. In: 2014 IEEE 12th International Conference on Dependable, Autonomic and Secure Computing, pp. 91–96 (2014). https://doi.org/10.1109/DASC.2014.25

  17. Fu, Z., Wu, X., Guan, C., Sun, X., Ren, K.: Toward efficient multi-keyword fuzzy search over encrypted outsourced data with accuracy improvement. IEEE Trans. Inf. Forens. Secur. 11(12), 2706–2716 (2016). https://doi.org/10.1109/TIFS.2016.2596138

    Article  MATH  Google Scholar 

  18. Fan, K., Yin, J., Wang, J., Li, H., Yang, Y.: Multi-keyword fuzzy and sortable ciphertext retrieval scheme for big data. In: GLOBECOM 2017—2017 IEEE Global Communications Conference, pp. 1–6 (2017). https://doi.org/10.1109/GLOCOM.2017.8254990

  19. Zhong, H., Li, Z., Cui, J., Sun, Y., Liu, L.: Efficient dynamic multi-keyword fuzzy search over encrypted cloud data. J. Netw. Comput. Appl. 149, 102469 (2020). https://doi.org/10.1016/j.jnca.2019.102469

    Article  MATH  Google Scholar 

  20. Zhang, H., Zhao, S., Guo, Z., Wen, Q., Li, W., Gao, F.: Scalable fuzzy keyword ranked search over encrypted data on hybrid clouds. IEEE Trans. Cloud Comput. 11(1), 308–323 (2023). https://doi.org/10.1109/TCC.2021.3092358

    Article  MATH  Google Scholar 

  21. Boneh, D., Di Crescenzo, G., Ostrovsky, R., Persiano, G.: Public key encryption with keyword search. In: Cachin, C., Camenisch, J.L. (eds.) Advances in Cryptology—EUROCRYPT 2004, pp. 506–522. Springer, Berlin, Heidelberg (2004)

  22. Wang, C., Cao, N., Li, J., Ren, K., Lou, W.: Secure ranked keyword search over encrypted cloud data. In: 2010 IEEE 30th International Conference on Distributed Computing Systems, pp. 253–262 (2010). https://doi.org/10.1109/ICDCS.2010.34

  23. Malkauthekar, M.D.: Analysis of Euclidean distance and Manhattan distance measure in face recognition. In: 3rd International Conference on Computational Intelligence and Information Technology (CIIT 2013), pp. 503–507 (2013). https://doi.org/10.1049/cp.2013.2636

  24. Wang, C., Ren, K., Yu, S., Urs, K.M.R.: Achieving usable and privacy-assured similarity search over outsourced cloud data. In: 2012 Proceedings IEEE INFOCOM, pp. 451–459 (2012). https://doi.org/10.1109/INFCOM.2012.6195784

  25. Xu, Q., Shen, H., Sang, Y., Tian, H.: Privacy-preserving ranked fuzzy keyword search over encrypted cloud data. In: 2013 International Conference on Parallel and Distributed Computing, Applications and Technologies, pp. 239–245 (2013). https://doi.org/10.1109/PDCAT.2013.44

  26. Cao, N., Wang, C., Li, M., Ren, K., Lou, W.: Privacy-preserving multi-keyword ranked search over encrypted cloud data. IEEE Trans. Parallel Distrib. Syst. 25(1), 222–233 (2014)

    Article  MATH  Google Scholar 

  27. Xu, Z., Kang, W., Li, R., Yow, K., Xu, C.-Z.: Efficient multi-keyword ranked query on encrypted data in the cloud. In: 2012 IEEE 18th International Conference on Parallel and Distributed Systems, pp. 244–251 (2012). https://doi.org/10.1109/ICPADS.2012.42

  28. Yang, Y., Yang, S.L., Ke, M.: Ranked fuzzy keyword search based on simhash over encrypted cloud data. Chin. J. Comput. 40(2), 431–444 (2017). https://doi.org/10.11897/SP.J.1016.2017.00431

    Article  MATH  Google Scholar 

  29. Ding, S., Li, Y., Zhang, J., Chen, L., Xu, Q.: An efficient and privacy-preserving ranked fuzzy keywords search over encrypted cloud data. In: 2016 International Conference on Behavioral, Economic and Socio-cultural Computing (BESC), pp. 1–6 (2016)

  30. Liu, Q., Peng, Y., Pei, S., Wu, J., Peng, T., Wang, G.: Prime inner product encoding for effective wildcard-based multi-keyword fuzzy search. IEEE Trans. Serv. Comput. 15(4), 1799–1812 (2022). https://doi.org/10.1109/TSC.2020.3020688

    Article  MATH  Google Scholar 

  31. Liu, Z., Dong, X., Feng, J., Zhang, H.: Privacy protected security cloud storage system. Comput. Eng. Appl. (2017)

  32. Xia, Z., Wang, X., Sun, X., Wang, Q.: A secure and dynamic multi-keyword ranked search scheme over encrypted cloud data. IEEE Trans. Parallel Distrib. Syst. 27(2), 340–352 (2016). https://doi.org/10.1109/TPDS.2015.2401003

    Article  MATH  Google Scholar 

  33. Shen, H., Xue, L., Wang, H., Zhang, L., Zhang, J.: B+-tree based multi-keyword ranked similarity search scheme over encrypted cloud data. IEEE Access 9, 150865–150877 (2021). https://doi.org/10.1109/ACCESS.2021.3125729

    Article  MATH  Google Scholar 

  34. Halwasia, A., Sharma, M.: A fuzzy driven reliability and relevancy map for web content search optimization. In: 2015 International Conference on Computational Intelligence and Communication Networks (CICN), pp. 1211–1215 (2015). https://doi.org/10.1109/CICN.2015.233

  35. Liu, Q., Peng, Y., Wu, J., Wang, T., Wang, G.: Secure multi-keyword fuzzy searches with enhanced service quality in cloud computing. IEEE Trans. Netw. Serv. Manage. 18(2), 2046–2062 (2021). https://doi.org/10.1109/TNSM.2020.3045467

    Article  MATH  Google Scholar 

  36. Junqiang, D.U., Yang, B.: Fuzzy keyword search method over encrypted data in cloud computing. Comput. Eng. Appl. 51(5), 146–152 (2015). http://cea.ceaj.org/EN/Y2015/V51/I5/146

    MATH  Google Scholar 

  37. Chen, L., Liao, X., Mu, N., Wu, J., Junqing, J.: Privacy-preserving fuzzy multi-keyword search for multiple data owners in cloud computing. In: 2019 IEEE Symposium Series on Computational Intelligence (SSCI), pp. 2166–2171 (2019). https://doi.org/10.1109/SSCI44817.2019.9003109

  38. Shan, B., Yao, Y., Li, W., Zuo, X., Yu, N.: Fuzzy keyword search over encrypted cloud data with dynamic fine-grained access control. In: 2022 IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), pp. 1340–1347 (2022). https://doi.org/10.1109/TrustCom56396.2022.00189

  39. Han, J., Qi, L., Zhuang, J.: Vector sum range decision for verifiable multiuser fuzzy keyword search in cloud-assisted iot. IEEE Internet Things J. 11(1), 931–943 (2024). https://doi.org/10.1109/JIOT.2023.3288276

    Article  MATH  Google Scholar 

Download references

Acknowledgements

This work was supported in part by the Education Department of Shandong Province, the Natural Science Foundation of Shandong Province under Grant ZR2022QF102 and the Shandong Provinceence Youth Innovation and Technology Program Innovation Team under Grant 2022KJ296.

Funding

The funding was provided by the Education Department of Shandong Province, the Natural Science Foundation of Shandong Province under Grant ZR2022QF102 and the Shandong Provinceence Youth Innovation and Technology Program Innovation Team under Grant 2022KJ296.

Author information

Authors and Affiliations

Authors

Contributions

N.L.: Investigation, Writing-original draft, Formal analysis, Validation. Q.S.: Conceptualization, Methodology, Writing-review and editing. All the authors reviewed the manuscript.

Corresponding author

Correspondence to Qianqian Su.

Ethics declarations

Conflict of interest

The authors declare no Conflict of interest.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Li, N., Su, Q. An efficient position-sensitive fuzzy keyword search scheme for encrypted data on hybrid cloud. Cluster Comput 28, 9 (2025). https://doi.org/10.1007/s10586-024-04703-0

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • DOI: https://doi.org/10.1007/s10586-024-04703-0

Keywords