Abstract
With the growing demand for effective and privacy-preserving data retrieval, searchable encryption has emerged as a promising solution for searching encrypted data stored on remote servers. Compared with exact keyword search, fuzzy keyword search can address misspellings and formatting inconsistencies, thus greatly enhancing the user’s search experience. However, existing fuzzy keyword search schemes tend to ignore the effect of letter position on the sorting of search results, resulting in redundant search results. To address this problem, a novel fuzzy sorting search scheme is proposed to efficiently search encrypted cloud data, which enables sorting while searching. The proposed scheme improves the sorting efficiency while increasing the search accuracy. The proposed scheme considers the alphabetical position of the keywords and uses the Euclidean distance metric to measure the similarity between search keywords and document keywords. To decrease the storage space for indexes, the proposed scheme build a binary index tree and design a tree-based search algorithm based on letter vectors and thresholds. To improve search efficiency, the proposed scheme combines keyword weight and keyword similarity to calculate similarity scores and uses dual servers to search encrypted cloud data. Finally, extensive analysis and experiments certify the effectiveness, efficiency, and accuracy of the proposed scheme, demonstrating its ability to meet the need for security, efficiency, and accuracy.
Similar content being viewed by others
Data Availability
No datasets were generated or analysed during the current study.
References
Wang, Z., Gao, W., Yu, J., Shen, W., Hao, R.: Lightweight secure deduplication based on data popularity. IEEE Syst. J. 17(4), 5531–5542 (2023). https://doi.org/10.1109/JSYST.2023.3307883
Gao, W., Yu, J., Hao, R., Kong, F., Liu, X.: Privacy-preserving face recognition with multi-edge assistance for intelligent security systems. IEEE Internet Things J. 10(12), 10948–10958 (2023). https://doi.org/10.1109/JIOT.2023.3240166
Wang, Z., Gao, W., Yang, M., Hao, R.: Enabling secure data sharing with data deduplication and sensitive information hiding in cloud-assisted electronic medical systems. Clust. Comput. 26(6), 3839–3854 (2023)
Lu, Q., Yang, Z., Zhang, H., Chen, F., Xian, H.: Mrfe: a deep learning based multidimensional radio frequency fingerprinting enhancement approach for iot device identification. IEEE Internet Things J. (2024). https://doi.org/10.1109/JIOT.2024.3414195
Tian, C., Yu, J., Zhang, H., Xue, H., Wang, C., Ren, K.: Novel secure outsourcing of modular inversion for arbitrary and variable modulus. IEEE Trans. Serv. Comput. 15(1), 241–253 (2022). https://doi.org/10.1109/TSC.2019.2937486
Su, Q., Zhang, R., Xue, R., You, S., Gao, S.: Distributed attribute-based signature with attribute dynamic update for smart grid. IEEE Trans. Industr. Informat. (2022). https://doi.org/10.1109/TII.2022.3228688
Shen, W., Gai, C., Yu, J., Su, Y.: Keyword-based remote data integrity auditing supporting full data dynamics. IEEE Trans. Serv. Comput. (2023). https://doi.org/10.1109/TSC.2023.3339521
Chen, B., Xiang, T., He, D., Li, H., Choo, K.-K.R.: Bpvse: publicly verifiable searchable encryption for cloud-assisted electronic health records. IEEE Trans. Inf. Forens. Secur. 18, 3171–3184 (2023). https://doi.org/10.1109/TIFS.2023.3275750
Ge, X., Yu, J., Hao, R.: Privacy-preserving graph matching query supporting quick subgraph extraction. IEEE Trans. Depend. Secur Comput. 21(3), 1286–1300 (2024). https://doi.org/10.1109/TDSC.2023.3276360
Zheng, Y., Zhu, H., Lu, R., Guan, Y., Zhang, S., Wang, F., Shao, J., Li, H.: Pgsim: efficient and privacy-preserving graph similarity query over encrypted data in cloud. IEEE Trans. Inf. Forens. Secur. 18, 2030–2045 (2023). https://doi.org/10.1109/TIFS.2023.3262147
Li, X., Tong, Q., Zhao, J., Miao, Y., Ma, S., Weng, J., Ma, J., Choo, K.-K.R.: Vrfms: verifiable ranked fuzzy multi-keyword search over encrypted data. IEEE Trans. Serv. Comput. 16(1), 698–710 (2023). https://doi.org/10.1109/TSC.2021.3140092
Tong, Q., Miao, Y., Weng, J., Liu, X., Choo, K.-K.R., Deng, R.H.: Verifiable fuzzy multi-keyword search over encrypted data with adaptive security. IEEE Trans. Knowl. Data Eng. 35(5), 5386–5399 (2023). https://doi.org/10.1109/TKDE.2022.3152033
Wang, B., Yu, S., Lou, W., Hou, Y.T.: Privacy-preserving multi-keyword fuzzy search over encrypted data in the cloud. In: IEEE INFOCOM 2014—IEEE Conference on Computer Communications, pp. 2112–2120 (2014). https://doi.org/10.1109/INFOCOM.2014.6848153
Li, J., Wang, Q., Wang, C., Cao, N., Ren, K., Lou, W.: Fuzzy keyword search over encrypted data in cloud computing. In: 2010 Proceedings IEEE INFOCOM, pp. 1–5 (2010). https://doi.org/10.1109/INFCOM.2010.5462196
Liu, C., Zhu, L., Li, L., Tan, Y.: Fuzzy keyword search on encrypted cloud storage data with small index. In: 2011 IEEE International Conference on Cloud Computing and Intelligence Systems, pp. 269–273 (2011). https://doi.org/10.1109/CCIS.2011.6045073
Jie, W., Xiao, Y., Ming, Z., Yong, W.: A novel dynamic ranked fuzzy keyword search over cloud encrypted data. In: 2014 IEEE 12th International Conference on Dependable, Autonomic and Secure Computing, pp. 91–96 (2014). https://doi.org/10.1109/DASC.2014.25
Fu, Z., Wu, X., Guan, C., Sun, X., Ren, K.: Toward efficient multi-keyword fuzzy search over encrypted outsourced data with accuracy improvement. IEEE Trans. Inf. Forens. Secur. 11(12), 2706–2716 (2016). https://doi.org/10.1109/TIFS.2016.2596138
Fan, K., Yin, J., Wang, J., Li, H., Yang, Y.: Multi-keyword fuzzy and sortable ciphertext retrieval scheme for big data. In: GLOBECOM 2017—2017 IEEE Global Communications Conference, pp. 1–6 (2017). https://doi.org/10.1109/GLOCOM.2017.8254990
Zhong, H., Li, Z., Cui, J., Sun, Y., Liu, L.: Efficient dynamic multi-keyword fuzzy search over encrypted cloud data. J. Netw. Comput. Appl. 149, 102469 (2020). https://doi.org/10.1016/j.jnca.2019.102469
Zhang, H., Zhao, S., Guo, Z., Wen, Q., Li, W., Gao, F.: Scalable fuzzy keyword ranked search over encrypted data on hybrid clouds. IEEE Trans. Cloud Comput. 11(1), 308–323 (2023). https://doi.org/10.1109/TCC.2021.3092358
Boneh, D., Di Crescenzo, G., Ostrovsky, R., Persiano, G.: Public key encryption with keyword search. In: Cachin, C., Camenisch, J.L. (eds.) Advances in Cryptology—EUROCRYPT 2004, pp. 506–522. Springer, Berlin, Heidelberg (2004)
Wang, C., Cao, N., Li, J., Ren, K., Lou, W.: Secure ranked keyword search over encrypted cloud data. In: 2010 IEEE 30th International Conference on Distributed Computing Systems, pp. 253–262 (2010). https://doi.org/10.1109/ICDCS.2010.34
Malkauthekar, M.D.: Analysis of Euclidean distance and Manhattan distance measure in face recognition. In: 3rd International Conference on Computational Intelligence and Information Technology (CIIT 2013), pp. 503–507 (2013). https://doi.org/10.1049/cp.2013.2636
Wang, C., Ren, K., Yu, S., Urs, K.M.R.: Achieving usable and privacy-assured similarity search over outsourced cloud data. In: 2012 Proceedings IEEE INFOCOM, pp. 451–459 (2012). https://doi.org/10.1109/INFCOM.2012.6195784
Xu, Q., Shen, H., Sang, Y., Tian, H.: Privacy-preserving ranked fuzzy keyword search over encrypted cloud data. In: 2013 International Conference on Parallel and Distributed Computing, Applications and Technologies, pp. 239–245 (2013). https://doi.org/10.1109/PDCAT.2013.44
Cao, N., Wang, C., Li, M., Ren, K., Lou, W.: Privacy-preserving multi-keyword ranked search over encrypted cloud data. IEEE Trans. Parallel Distrib. Syst. 25(1), 222–233 (2014)
Xu, Z., Kang, W., Li, R., Yow, K., Xu, C.-Z.: Efficient multi-keyword ranked query on encrypted data in the cloud. In: 2012 IEEE 18th International Conference on Parallel and Distributed Systems, pp. 244–251 (2012). https://doi.org/10.1109/ICPADS.2012.42
Yang, Y., Yang, S.L., Ke, M.: Ranked fuzzy keyword search based on simhash over encrypted cloud data. Chin. J. Comput. 40(2), 431–444 (2017). https://doi.org/10.11897/SP.J.1016.2017.00431
Ding, S., Li, Y., Zhang, J., Chen, L., Xu, Q.: An efficient and privacy-preserving ranked fuzzy keywords search over encrypted cloud data. In: 2016 International Conference on Behavioral, Economic and Socio-cultural Computing (BESC), pp. 1–6 (2016)
Liu, Q., Peng, Y., Pei, S., Wu, J., Peng, T., Wang, G.: Prime inner product encoding for effective wildcard-based multi-keyword fuzzy search. IEEE Trans. Serv. Comput. 15(4), 1799–1812 (2022). https://doi.org/10.1109/TSC.2020.3020688
Liu, Z., Dong, X., Feng, J., Zhang, H.: Privacy protected security cloud storage system. Comput. Eng. Appl. (2017)
Xia, Z., Wang, X., Sun, X., Wang, Q.: A secure and dynamic multi-keyword ranked search scheme over encrypted cloud data. IEEE Trans. Parallel Distrib. Syst. 27(2), 340–352 (2016). https://doi.org/10.1109/TPDS.2015.2401003
Shen, H., Xue, L., Wang, H., Zhang, L., Zhang, J.: B+-tree based multi-keyword ranked similarity search scheme over encrypted cloud data. IEEE Access 9, 150865–150877 (2021). https://doi.org/10.1109/ACCESS.2021.3125729
Halwasia, A., Sharma, M.: A fuzzy driven reliability and relevancy map for web content search optimization. In: 2015 International Conference on Computational Intelligence and Communication Networks (CICN), pp. 1211–1215 (2015). https://doi.org/10.1109/CICN.2015.233
Liu, Q., Peng, Y., Wu, J., Wang, T., Wang, G.: Secure multi-keyword fuzzy searches with enhanced service quality in cloud computing. IEEE Trans. Netw. Serv. Manage. 18(2), 2046–2062 (2021). https://doi.org/10.1109/TNSM.2020.3045467
Junqiang, D.U., Yang, B.: Fuzzy keyword search method over encrypted data in cloud computing. Comput. Eng. Appl. 51(5), 146–152 (2015). http://cea.ceaj.org/EN/Y2015/V51/I5/146
Chen, L., Liao, X., Mu, N., Wu, J., Junqing, J.: Privacy-preserving fuzzy multi-keyword search for multiple data owners in cloud computing. In: 2019 IEEE Symposium Series on Computational Intelligence (SSCI), pp. 2166–2171 (2019). https://doi.org/10.1109/SSCI44817.2019.9003109
Shan, B., Yao, Y., Li, W., Zuo, X., Yu, N.: Fuzzy keyword search over encrypted cloud data with dynamic fine-grained access control. In: 2022 IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), pp. 1340–1347 (2022). https://doi.org/10.1109/TrustCom56396.2022.00189
Han, J., Qi, L., Zhuang, J.: Vector sum range decision for verifiable multiuser fuzzy keyword search in cloud-assisted iot. IEEE Internet Things J. 11(1), 931–943 (2024). https://doi.org/10.1109/JIOT.2023.3288276
Acknowledgements
This work was supported in part by the Education Department of Shandong Province, the Natural Science Foundation of Shandong Province under Grant ZR2022QF102 and the Shandong Provinceence Youth Innovation and Technology Program Innovation Team under Grant 2022KJ296.
Funding
The funding was provided by the Education Department of Shandong Province, the Natural Science Foundation of Shandong Province under Grant ZR2022QF102 and the Shandong Provinceence Youth Innovation and Technology Program Innovation Team under Grant 2022KJ296.
Author information
Authors and Affiliations
Contributions
N.L.: Investigation, Writing-original draft, Formal analysis, Validation. Q.S.: Conceptualization, Methodology, Writing-review and editing. All the authors reviewed the manuscript.
Corresponding author
Ethics declarations
Conflict of interest
The authors declare no Conflict of interest.
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.
About this article
Cite this article
Li, N., Su, Q. An efficient position-sensitive fuzzy keyword search scheme for encrypted data on hybrid cloud. Cluster Comput 28, 9 (2025). https://doi.org/10.1007/s10586-024-04703-0
Received:
Revised:
Accepted:
Published:
DOI: https://doi.org/10.1007/s10586-024-04703-0