Fuzzy Dynamical Searchable Encryption Scheme Based on Balanced Binary Tree

被引:0
|
作者
Hu, Xiang [1 ]
Qin, Baodong [1 ]
机构
[1] Xian Univ Posts & Telecommun, Natl Engn Res Ctr Secured Wireless, Xian 710121, Peoples R China
基金
中国国家自然科学基金;
关键词
Searchable encryption; fuzzy search; dynamic update; balanced binary tree;
D O I
10.1109/ICNLP60986.2024.10692818
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
In recent years, the issues of data security and privacy in the field of cloud computing have garnered increasing attention. To prevent data leakage, data owners choose to encrypt their data documents before uploading them. However, effectively retrieving such data has become a new challenge. In this paper, we propose an innovative dynamic searchable encryption scheme that supports fuzzy search. Our scheme employs a balanced binary tree as the index, storing document identifiers with the same keywords in leaf nodes and generating Bloom filters for them. Additionally, we introduce random values during the index generation process, thereby enhancing the security of the index. Leveraging the unique structure of this tree-based index, we have successfully reduced the time complexity of search operations, lowering time costs, and enabling dynamic updates. Finally, through theoretical analysis and experimental validation, we demonstrate the outstanding efficiency of our scheme in achieving retrieval and a lower time complexity compared to other schemes.
引用
收藏
页码:277 / 282
页数:6
相关论文
共 50 条
  • [31] Searchable Encryption Scheme on the Cloud Via Fully Homomorphic Encryption
    Liu, Jian
    Han, Jing-Li
    Wang, Zhao-Li
    PROCEEDINGS OF 2016 SIXTH INTERNATIONAL CONFERENCE ON INSTRUMENTATION & MEASUREMENT, COMPUTER, COMMUNICATION AND CONTROL (IMCCC 2016), 2016, : 108 - 111
  • [32] Multi-Recipient Certificate-Based Searchable Encryption Scheme
    Liu H.
    Ming Y.
    Wang C.-H.
    Zhao Y.
    Jisuanji Xuebao/Chinese Journal of Computers, 2024, 47 (03): : 544 - 557
  • [33] Multi-user and Keyword-based Searchable Encryption Scheme
    Zhang, Ya-ling
    Liu, Li-jun
    Wang, Shang-ping
    PROCEEDINGS OF 2016 12TH INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY (CIS), 2016, : 223 - 227
  • [34] A Novel Proximity Based Searchable Encryption Scheme Using Referential Dissimilarity
    Mallaiah, Kurra
    Pande, Prateek
    Ramachandram, S.
    PROCEEDINGS OF THE 2017 INTERNATIONAL CONFERENCE ON INVENTIVE SYSTEMS AND CONTROL (ICISC 2017), 2017, : 253 - 261
  • [35] Searchable Attribute-based Encryption Scheme for Dynamic User Groups
    Wang J.-W.
    Ning J.-T.
    Xu S.-M.
    Yin X.-C.
    Chen H.-X.
    Ruan Jian Xue Bao/Journal of Software, 2023, 34 (04): : 1907 - 1925
  • [36] Attribute-Based Searchable Encryption Scheme in Smart Healthcare Blockchain
    Yan, Chen
    Wang, Luping
    Wu, Hongjie
    Hu, Fuyuan
    Chen, Jing
    Lu, Weizhong
    2023 23RD IEEE INTERNATIONAL CONFERENCE ON DATA MINING WORKSHOPS, ICDMW 2023, 2023, : 698 - 705
  • [37] Identity-based Searchable Encryption Scheme for Encrypted Email System
    Niu Shufen
    Xie Yaya
    Yang Pingping
    Wang Caifen
    Du Xiaoni
    JOURNAL OF ELECTRONICS & INFORMATION TECHNOLOGY, 2020, 42 (07) : 1803 - 1810
  • [38] An efficient conjunctive keyword searchable encryption scheme
    Wang, Shang-Ping
    Liu, Li-Jun
    Zhang, Ya-Ling
    Dianzi Yu Xinxi Xuebao/Journal of Electronics and Information Technology, 2013, 35 (09): : 2266 - 2271
  • [39] Verifiable and Searchable Symmetric Encryption Scheme Based on the Public Key Cryptosystem
    Duan, Gangqiang
    Li, Shuai
    ELECTRONICS, 2023, 12 (18)
  • [40] A Hierarchical Searchable Encryption Scheme Using Blockchain-Based Indexing
    Li, Yuxi
    Zhou, Fucai
    Ji, Dong
    Xu, Zifeng
    ELECTRONICS, 2022, 11 (22)