Journal of University of Science and Technology of China ›› 2021, Vol. 51 ›› Issue (7): 562-576.DOI: 10.52396/JUST-2021-0071

Previous Articles    

An efficient multi-user multi-keyword fuzzy search scheme over encrypted cloud storage

Ling Huaze1, Xue Kaiping1*, Wei David S.L.2, Li Ruidong3   

  1. 1. School of Cyber Security, University of Science and Technology of China, Hefei, Anhui 230027, China;
    2. Computer and Information Science Department, Fordham University, NY 10458, USA;
    3. College of Science and Engineering, Kanazawa University, Kakuma-machi, Kanazawa 920-1192, Japan
  • Received:2021-03-12 Revised:2021-03-28 Online:2021-07-31 Published:2021-12-15
  • Contact: * E-mail: kpxue@ustc.edu.cn

Abstract: As more and more enterprises and individuals choose to outsource their encrypted private data to the cloud, Searchable Encryption (SE), which solves the issue of keyword-searching over encrypted data, is becoming much more important. To overcome typos and semantic diversity existing in query requests, fuzzy search is introduced to achieve a misspelling-tolerate search-supported encryption scheme. However, current schemes of fuzzy search over encrypted data not only bring in high computing and communication overhead in multi-user scenarios but also are unable to cover all kinds of error types under the premise of an effective accuracy. In this paper, we thus propose a multi-user multi-keyword fuzzy searchable encryption scheme. Specifically, we introduce the permuterm index to support multi-keyword wildcard search which can solve more kinds of misspelling with a higher degree of correctness. Moreover, by letting the cloud server re-encrypt indexes user encrypt, our scheme supports unshared-key multi-user fuzzy search, reducing users' computing overhead effectively and improving the level of privacy-preserving. The results of experiments demonstrate that, compared with existing schemes, our scheme not only has a better accuracy rate, but also supports more varieties of misspelling keyword search with acceptable computational overhead.

Key words: encrypted cloud storage, proxy re-encryption, privacy preservation, searchable encryption

CLC Number: