Research on fuzzy keyword search method for encrypted data in cloud computing

Source: Internet
Author: User
Keywords Cloud computing keyword search fuzzy search r~+ tree searchable encryption

Research on fuzzy keyword search method for encrypted data in cloud computing

Du Junqiang of Shaanxi Normal University

This paper from the following aspects of research: first introduced the basic concept of public key cryptography keyword search, from the definition of public key cryptography to introduce public key cryptography keyword search model, from which the introduction of public Key cryptography keyword search contains identity-based encryption. Then, the structure of the searchable encryption scheme is given, from the concept of bilinear mapping, the concept of provable security, the security of the stochastic Oracle model and public key encryption, the construction of the key search scheme is introduced, finally the security of the scheme is proved. Secondly, the paper proposes a r+ tree to support a variety of string similarity operations to build the index, realize the Fuzzy keyword search of the encrypted data in cloud computing, quantify the similarity of the keyword with the edit distance, and propose a method of retrieving the file which is close to the exact keyword. The efficiency of fuzzy keyword search is improved by string clustering. The fuzzy extractor is used to establish a specific scheme to realize fuzzy keyword search. and resist the adaptive adversary attack under the perfect safety definition. This scheme also applies to other approximate metrics, such as Hamming distance, edit distance, and poor collection. This scheme does not require users to build and store any data ahead of time, only use secret key to encrypt data document and COMPUTE trap keyword. In addition, the index form contains the random string extracted from the fuzzy extractor, and according to the Fuzzy Extractor, the scheme can transform the Fuzzy keyword search on the ciphertext to the EXACT keyword search on the clear text.


Research on fuzzy keyword search method for encrypted data in cloud computing

Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.