2012
DOI: 10.1186/preaccept-1253053215890607
|View full text |Cite
|
Sign up to set email alerts
|

Embedding edit distance to enable private keyword search

Abstract: Background: Our work is focused on fuzzy keyword search over encrypted data in Cloud Computing. Methods: We adapt results on private identification schemes by Bringer et al. to this new context. We here exploit a classical embedding of the edit distance into the Hamming distance. Results: Our way of doing enables some flexibility on the tolerated edit distance when looking for close keywords while preserving the confidentiality of the queries. Conclusion: Our proposal is proved secure in a security model takin… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2013
2013
2015
2015

Publication Types

Select...
7
1

Relationship

0
8

Authors

Journals

citations
Cited by 18 publications
(5 citation statements)
references
References 21 publications
0
5
0
Order By: Relevance
“…This is not sufficient to formulate the real world bidding behavior. So, we will apply the data mining techniques [20,21,22] to find out the practice bidding strategies. Then, we will evaluate the performance of the NDSSA for the advertisers with the obtained bidding strategies.…”
Section: Resultsmentioning
confidence: 99%
“…This is not sufficient to formulate the real world bidding behavior. So, we will apply the data mining techniques [20,21,22] to find out the practice bidding strategies. Then, we will evaluate the performance of the NDSSA for the advertisers with the obtained bidding strategies.…”
Section: Resultsmentioning
confidence: 99%
“…Namely, users' searching input should exactly match the keywords contained in the files. As an attempt to enhance search flexibility, fuzzy keyword search over encrypted cloud data has been proposed [14][15][16]19]. Li et al and Wang et al both exploited edit distance as the similarity metric of keywords to construct the fuzzy keywords set as indexes.…”
Section: Related Workmentioning
confidence: 99%
“…Liu proposed "dictionary-based fuzzy set construction" to further reduce the size of fuzzy keywords set [17]. Relying on an asymmetric security model, Bringer et al proposed a fuzzy search scheme based on the embedding of edit distance into Hamming distance [19]. This scheme does not need priori define of fuzzy keywords set.…”
Section: Related Workmentioning
confidence: 99%
“…Security [3,18] is one of most important issues in various computing environments. Multiple security holes have been found in different Android components [15,20].…”
Section: Repackaging Vulnerabilitymentioning
confidence: 99%