2011 31st International Conference on Distributed Computing Systems Workshops 2011
DOI: 10.1109/icdcsw.2011.11
|View full text |Cite
|
Sign up to set email alerts
|

Privacy-Aware BedTree Based Solution for Fuzzy Multi-keyword Search over Encrypted Data

Abstract: Abstract-As Cloud Computing technology becomes more mature, many organizations and individuals are interested in storing more sensitive data e.g. personal health records, customers related information in the cloud. Such sensitive data needs to be encrypted before it is outsourced to the cloud. Typically, the cloud servers also need to support a keyword search feature for these encrypted files. Traditional searchable encryption schemes typically only support exact keyword matches. However, users sometimes have … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
61
0

Year Published

2013
2013
2023
2023

Publication Types

Select...
5
3
1

Relationship

0
9

Authors

Journals

citations
Cited by 100 publications
(61 citation statements)
references
References 15 publications
0
61
0
Order By: Relevance
“…In this paper, we use the same threat model described in previous searchable symmetric encryption (SSE) scheme [6,7,10,11,14,15]. We consider an "honest-but-curious" server in our model.…”
Section: Threat Modelmentioning
confidence: 99%
See 1 more Smart Citation
“…In this paper, we use the same threat model described in previous searchable symmetric encryption (SSE) scheme [6,7,10,11,14,15]. We consider an "honest-but-curious" server in our model.…”
Section: Threat Modelmentioning
confidence: 99%
“…But traditional SE schemes only support exact keyword search [3][4][5][6][7][8]. To enhance the search flexibility and usability, some research has been done on fuzzy keyword search [9][10][11][12][13]. These solutions support tolerance of minor typos and format inconsistencies, such as, search for "million" by carelessly typing "milion", or "datamining" by typing "data-mining".…”
Section: Introductionmentioning
confidence: 99%
“…They also support single user architecture [11] and multi-user architecture [10]. In addition, works done to support single keyword search [11], [13], multi-keyword search and ranking [3], [14], [15], subset query and range query [16], [17] and fuzzy multi-keyword search [18], [19]. Most of the previous work done on SE to improve secrecy motivated by adversary activity [20], [21].…”
Section: Searchable Encryption (Se)mentioning
confidence: 99%
“…Song et al, proposed the first practical searchable encryption method [1]. After that, in order to enhance the search flexibility and usability, some researchers proposed works to support similar keyword search which could tolerate typing errors [2][3][4]. On the other hand, some of the works focused on multi-keyword searches which could return more accurate results ranked according to some predefined criterions [5][6][7][8][9][10][11][12].…”
Section: Introductionmentioning
confidence: 99%