Automatic text processing: the transformation, analysis, and retrieval of information by computer
Automatic text processing: the transformation, analysis, and retrieval of information by computer
Managing gigabytes (2nd ed.): compressing and indexing documents and images
Managing gigabytes (2nd ed.): compressing and indexing documents and images
FOCS '06 Proceedings of the 47th Annual IEEE Symposium on Foundations of Computer Science
Searchable symmetric encryption: improved definitions and efficient constructions
Proceedings of the 13th ACM conference on Computer and communications security
Fuzzy keyword search over encrypted data in cloud computing
INFOCOM'10 Proceedings of the 29th conference on Information communications
Secure Ranked Keyword Search over Encrypted Cloud Data
ICDCS '10 Proceedings of the 2010 IEEE 30th International Conference on Distributed Computing Systems
Privacy-Aware BedTree Based Solution for Fuzzy Multi-keyword Search over Encrypted Data
ICDCSW '11 Proceedings of the 2011 31st International Conference on Distributed Computing Systems Workshops
Hi-index | 0.00 |
Breaches of data security and privacy have prompted concerns about data outsourcing. Encryption is an ideal solution, yet searching over encrypted data is a challenging task. Traditional data retrieval no longer hold, so searchable encryption (SE) techniques rise in response. Most of the related efforts are narrowly focused and problem-specific. None of them has simultaneously achieved the five keyword search functions (F5): fuzzy, multi-keyword, and ranked search as well as keyword addition/removal and instantaneous search revocation, together with the five privacy preserving requirements (P5): keyword privacy, index privacy, token privacy, search pattern privacy, and access pattern privacy. In this paper, a full-featured approach called F5P5 is presented, which achieves F5 and P5 simultaneously. Analysis and experiments show that F5P5 is secure and privacy preserving, and provides high-precision search results and is efficiency in terms of computation and storage.