Research on fuzzy keyword search method for encrypted data in cloud computing
Source: Internet
Author: User
KeywordsCloud computing keyword search fuzzy search r~+ tree searchable encryption
Research on fuzzy keyword search method for encrypted data in cloud computing
Du Junqiang of Shaanxi Normal University
This paper from the following aspects of research: first introduced the basic concept of public key cryptography keyword search, from the definition of public key cryptography to introduce public key cryptography keyword search model, from which the introduction of public Key cryptography keyword search contains identity-based encryption. Then, the structure of the searchable encryption scheme is given, from the concept of bilinear mapping, the concept of provable security, the security of the stochastic Oracle model and public key encryption, the construction of the key search scheme is introduced, finally the security of the scheme is proved. Secondly, the paper proposes a r+ tree to support a variety of string similarity operations to build the index, realize the Fuzzy keyword search of the encrypted data in cloud computing, quantify the similarity of the keyword with the edit distance, and propose a method of retrieving the file which is close to the exact keyword. The efficiency of fuzzy keyword search is improved by string clustering. The fuzzy extractor is used to establish a specific scheme to realize fuzzy keyword search. and resist the adaptive adversary attack under the perfect safety definition. This scheme also applies to other approximate metrics, such as Hamming distance, edit distance, and poor collection. This scheme does not require users to build and store any data ahead of time, only use secret key to encrypt data document and COMPUTE trap keyword. In addition, the index form contains the random string extracted from the fuzzy extractor, and according to the Fuzzy Extractor, the scheme can transform the Fuzzy keyword search on the ciphertext to the EXACT keyword search on the clear text.
Research on fuzzy keyword search method for encrypted data in cloud computing
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.