2020
DOI: 10.1109/access.2020.2966367
|View full text |Cite
|
Sign up to set email alerts
|

FSSE: An Effective Fuzzy Semantic Searchable Encryption Scheme Over Encrypted Cloud Data

Abstract: Currently, searchable encryption has attracted considerable attention in the field of cloud computing. The existing research mainly focuses on keyword-based search schemes, most of which support the exact matching of keywords. However, keyword-based search schemes ignore spelling errors and semantic expansions of keywords. The significant drawback makes the existing techniques unsuitable in cloud computing as it greatly affects system usability and can not completely satisfy the users' search intentions. In th… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
15
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
6
1
1

Relationship

0
8

Authors

Journals

citations
Cited by 14 publications
(15 citation statements)
references
References 36 publications
0
15
0
Order By: Relevance
“…Compared with the traditional method, Jaccard similarity and re‐encryption have been adopted to reduce the cost of calculation and storage. Liu 16 proposed a fuzzy semantic searchable encryption scheme, which uses the keyword fingerprint generation. Zhu et al 17 investigated the possible problems of searchable encryption when the server is malicious, and proposed a verifiable dynamic fuzzy keyword search scheme.…”
Section: Related Workmentioning
confidence: 99%
“…Compared with the traditional method, Jaccard similarity and re‐encryption have been adopted to reduce the cost of calculation and storage. Liu 16 proposed a fuzzy semantic searchable encryption scheme, which uses the keyword fingerprint generation. Zhu et al 17 investigated the possible problems of searchable encryption when the server is malicious, and proposed a verifiable dynamic fuzzy keyword search scheme.…”
Section: Related Workmentioning
confidence: 99%
“…The searchable encryption schemes are primarily classified into Searchable Symmetric Encryption and Public Key Encryption with Keyword Search [2] depending upon the type of encryption primitive used and notion of provable security. The searchable encryption systems is further classified based on the type of search operation into keyword based and semantic based searchable encryption system [23]. The keyword based searchable encryption system uses either specially designed secure encrypted indexes to support search operations over encrypted data or sequential scanning of encrypted documents to support search [4].…”
Section: Searchable Encryptionmentioning
confidence: 99%
“…In this paper, we follows the same model of [24,27,28], which propose that both DO and DU are trusted parties. However, SS and FS are assumed to be "honest-but-curious" servers as in [3,9,23].…”
Section: B Security Modelmentioning
confidence: 99%
“…Additionally, we consider that the two involved servers there are non-collusion, as adopted by most previous solutions [28][29][30].…”
Section: B Security Modelmentioning
confidence: 99%