Abstract
Searchable encryption is an effective way to ensure the security and availability of encrypted outsourced cloud data. Among existing solutions, the keyword exact search solution is relatively inflexible, while the fuzzy keyword search solution either has a high index overhead or suffers from the false-positive. Furthermore, no existing fuzzy keyword search solution considers the homoglyph search on encrypted data. In this paper, we propose an efficient privacy-preserving homoglyph search scheme supporting arbitrary languages (POSA, in short). We enhance the performance of the fuzzy keyword search in three aspects. Firstly, we formulate the similarity of homoglyph and propose a privacy-preserving homoglyph search. Secondly, we put forward an index build mechanism without the false-positive, which reduces the storage overhead of the index and is suitable for arbitrary languages. Thirdly, POSA returns just the user’s search, i.e., all returned documents contain the search keyword or its homoglyph. The theoretical analysis and experimental evaluations on real-world datasets demonstrate the effectiveness and efficiency of POSA.
Similar content being viewed by others
References
Li X, Li J, Yiu S, Gao C, Xiong J. Privacy-preserving edge-assisted image retrieval and classification in IoT. Frontiers of Computer Science, 2019, 13(5): 1136–1147
Shen Z, Shu J, Xue W. Preferred search over encrypted data. Frontiers of Computer Science, 2018, 12(3): 593–607
Xu P, Wu Q, Wang W, Susilo W, Domingoferrer J, Jin H. Generating searchable public-key ciphertexts with hidden structures for fast keyword search. IEEE Transactions on Information Forensics and Security, 2015, 10(9): 1993–2006
Chen B, Wu L, Kumar N, Choo K K R, He D. Lightweight searchable public-key encryption with forward privacy over IIoT outsourced data. IEEE Transactions on Emerging Topics in Computing, 2019, DOI:https://doi.org/10.1109/TETC.2019.2737789
Kamara S, Papamanthou C, Roeder T. Dynamic searchable symmetric encryption. In: Proceedings of ACM Conference on Computer and Communications Security. 2012, 965–976
Li J, Wang Q, Wang C, Cao N, Ren K, Lou W. Fuzzy keyword search over encrypted data in cloud computing. In: Proceedings of IEEE International Conference on Computer Communications. 2010, 1–5
Yang Y, Liu X, Deng R H, Weng J. Flexible wildcard searchable encryption system. IEEE Transactions on Services Computing, 2020, 13(3): 464–477
Woodbridge J, Anderson H S, Ahuja A, Grant D. Detecting homoglyph attacks with a siamese neural network. In: Procedings of IEEE Symposium on Security and Privacy Workshops. 2018, 22–28
Wang C, Ren K, Yu S, Urs K M R. Achieving usable, privacy-assured similarity search over outsourced cloud data. In: Proceedings of IEEE International Conference on Computer Communications. 2012, 451–459
Zhu X, Wang G, Xie D. Fuzzy and semantic search over encrypted data in the cloud. In: Proceedings of International Conference on Security Privacy and Anonymity in Computation Communication and Storage. 2016, 332–341
Awad A, Matthews A, Qiao Y, Lee B. Chaotic searchable encryption for mobile cloud storage. IEEE Transactions on Cloud Computing, 2018, 6(2): 440–452
Bringer J, Chabanne H, Kindarji B. Error-tolerant searchable encryption. In: Proceedings of IEEE International Conference on Computer Communications. 2009, 1–6
Wang B, Yu S, Lou W, Hou Y T. Privacy-preserving multi-keyword fuzzy search over encrypted data in the cloud. In: Proceedings of IEEE International Conference on Computer Communications. 2014, 2112–2120
Fu Z, Wu X, Guan C, Sun X, Ren K. Toward efficient multi-keyword fuzzy search over encrypted outsourced data with accuracy improvement. IEEE Transactions on Information Forensics and Security, 2016, 11(12): 2706–2716
Yang Y, Liu X, Deng R H. Multi-user multi-keyword rank search over encrypted data in arbitrary language. IEEE Transactions on Dependable and Secure Computing, 2020, 17(2): 320–334
Yang S, Tang S, Zhang X. Privacy-preserving k nearest neighbor query with authentication on road networks. Journal of Parallel and Distributed Computing, 2019, 134: 25–36
Wu Y, Tang S, Zhao B, Peng Z. BPTM: blockchain-based privacy-preserving task matching in crowdsourcing. IEEE Access, 2019, 7: 45605–45617
Shu J, Yang K, Jia X, Liu X, Wang C, Deng R H. Proxy-free privacy-preserving task matching with efficient revocation in crowdsourcing. IEEE Transactions on Dependable and Secure Computing, 2021, 18(1): 117–130
Park H A, Kim B H, Lee D H, Chung Y D, Zhan J. Secure similarity search. In: Proceedings of IEEE International Conference on Granular Computing. 2007, 598–598
Kuzu M, Islam M S, Kantarcioglu M. Efficient similarity search over encrypted data. In: Proceedings of IEEE International Conference on Data Engineering. 2012, 1156–1167
Wang J, Yu X, Zhao M. Privacy-preserving ranked multi-keyword fuzzy search on cloud encrypted data supporting range query. Arabian Journal for Science and Engineering, 2015, 40(8): 2375–2388
Zhu X, Liu Q, Wang G. Verifiable dynamic fuzzy search over encrypted data in cloud computing. In: Proceedings of International Conference on Algorithms and Architectures for Parallel Processing. 2015, 655–666
Yuan X, Wang X, Wang C, Yu C, Nutanong S. Privacy-preserving similarity joins over encrypted data. IEEE Transactions on Information Forensics and Security, 2017, 12(11): 2763–2775
Homann D, Göge C, Wiese L. Dynamic similarity search over encrypted data with low leakage. In: Proceedings of International Workshop on Security and Trust Management. 2017, 19–35
Liu Z, Jia C, Yang J, Yuan K. Format-preserving fuzzy query mechanism. In: Proceedings of IEEE International Conference on Emerging Intelligent Data and Web Technologies. 2013, 220–226
Zhu H, Mei Z, Wu B, Li H, Cui Z. Fuzzy keyword search and access control over ciphertexts in cloud computing. In: Proceedings of Australasian Conference on Information Security and Privacy. 2017, 248–265
Hua Y, Xiao B, Liu X, Feng D. The design and implementations of locality-aware approximate queries in hybrid storage systems. IEEE Transactions on Parallel and Distributed Systems, 2014, 26(11): 3194–3207
Yang Y, Yang S, Ke M. Ranked fuzzy keyword search based on simhash over encrypted cloud data. Chinese Journal of Computers, 2017, 40(2): 431–444
Raghavendra S, Girish S, Geeta C M, Buyya R, Venugopal K R, Iyengar S S, Patnaik L M. Split keyword fuzzy and synonym search over encrypted cloud data. Multimedia Tools and Applications, 2018, 77(8): 10135–10156
Zhou W, Liu L, Jing H, Zhang C, Yao S, Wang S. K-gram based fuzzy keyword search over encrypted cloud computing. Journal of Software Engineering and Applications, 2013, 6(1): 29–33
Ahsan M A M, Chowdhury F Z, Sabilah M, Wahab A W B A, Idris M Y I B. An efficient fuzzy keyword matching technique for searching through encrypted cloud data. In: Proceedings of IEEE International Conference on Research and Innovation in Information Systems. 2017, 1–5
Krishna C R, Mittal S A. Privacy preserving synonym based fuzzy multi-keyword ranked search over encrypted cloud data. In: Proceedings of IEEE International Conference on Computing Communication and Automation. 2016, 1187–1194
Shi X J, Hu S P. Fuzzy multi-keyword query on encrypted data in the cloud. In: Proceedings of IEEE Internation Conference on Applied Computing and Information Technology/Computational Science/Intelligence and Applied Informatics/Big Data Cloud Computing Data Science & Engineering. 2016, 419–425
Ding W, Liu Y, Zhang J. Chinese-keyword fuzzy search and extraction over encrypted patent documents. In: Proceedings of IEEE International Joint Conference on Knowledge Discovery Knowledge Engineering and Knowledge Management. 2015, 168–176
Levenshtein V. Binary codes capable of correcting spurious insertions and deletion of ones. Problems of information Transmission, 1965, 1(1): 8–17
Ran H, Wang Q, Jiang C. Similar Chinese Characters Dictionary. 1st ed. Beijing: Foreign Language Teaching and Research Press, 2010
Curtmola R, Garay J, Kamara S, Ostrovsky R. Searchable symmetric encryption: improved definitions and efficient constructions. Journal of Computer Security, 2011, 19(5): 895–934
Xu P, Liang S, Wang W, Susilo W, Wu Q, Jin H. Dynamic searchable symmetric encryption with physical deletion and small leakage. In: Proceddings of Australasian Conference on Information Security and Privacy. 2017, 207–226
Porter M F. An algorithm for suffix stripping. Program, 2006, 14(3): 130–137
Wang C, Cao N, Ren K, Lou W. Enabling secure and efficient ranked keyword search over outsourced cloud data. IEEE Transactions on Parallel and Distributed Systems, 2011, 23(8): 1467–1479
Lai J, Zhou X, Deng R H, Li Y, Chen K. Expressive search on encrypted data. In: Proceedings of ACM SIGSAC Symposium on Information Computer and Communications Security. 2013, 243–252
Bösch C, Hartel P, Jonker W, Peter A. A survey of provably secure searchable encryption. ACM Computing Surveys, 2015, 47(2): 1–51
Ning J, Xu J, Liang K, Zhang F, Chang E C. Passive attacks against searchable encryption. IEEE Transactions on Information Forensics and Security, 2019, 14(3): 789–802
Cash D, Grubbs P, Perry J, Ristenpart T. Leakage-abuse attacks against searchable encryption. In: Proceedings of ACM Conference on Computer and Communications Security. 2015, 668–679
Xu P, Tang S, Xu P, Wu Q, Hu H, Susilo W. Practical multi-keyword and boolean search over encrypted e-mail in cloud server. IEEE Transactions on Services Computing, 2019, DOI:https://doi.org/10.1109/TSC.2019.2903502
Acknowledgements
The authors thank the editor-in-chief, associate editor and reviewers for their valuable comments and suggestions. Moreover, Bowen Zhao would especially like to thank professor Shaohua Tang, the late doctoral supervisor, for his guidance and help. This work was supported in part by the National Natural Science Foundation of China (Grant Nos. U1804263 and 61702105).
Author information
Authors and Affiliations
Corresponding author
Additional information
Bowen Zhao received his BS and MS degree in information security from Hunan University of Science and Technology and Guangxi University, China in 2014 and 2017, respectively. He is currently pursuing his PhD degree from South China University of Technology, China. His research interests include information security and privacy-preserving in mobile crowdsensing and cloud computing. He is a student member of the CCF.
Shaohua Tang received the BS and MS degrees in applied mathematics from the South China University of Technology, China in 1991 and 1994, respectively, and the PhD degree in communication and information system from the South China University of Technology, China in 1998. He has been a Full Professor with the School of Computer Science and Engineering, South China University of Technology, China, since 2004. He is also a jointly appointed full professor with the Peng Cheng Laboratory, China. He has authored or co-authored over 100 technical papers in journals and conference proceedings. His current research interests include information security, data security, and privacy-preserving in cloud computing and big data. He is a member of the IEEE Computer Society.
Ximeng Liu received the BSc degree in electronic engineering and the PhD degree in Cryptography from Xidian University, China in 2010 and 2015, respectively. Now he is the full professor in the College of Mathematics and Computer Science, Fuzhou University, China. Also, he was a research fellow at the School of Information System, Singapore Management University, Singapore. He has published more than 200 papers on the topics of cloud security and big data security papers in IEEE Trans. He awards “Minjiang Scholars” Distinguished Professor, “Qishan Scholars” at Fuzhou University, and ACM SIGSAC China Rising Star Award (2018). His research interests include cloud security, applied cryptography and big data security. He is a member of the IEEE, ACM, and CCF.
Yiming Wu received the BS degree in software engineering in the direction of information security from Wuhan University of Technology, China in 2017. He is currently pursuing his MS degree from South China University of Technology, China. His research interests include information security and blockchain technology.
Electronic Supplementary Material
Rights and permissions
About this article
Cite this article
Zhao, B., Tang, S., Liu, X. et al. Return just your search: privacy-preserving homoglyph search for arbitrary languages. Front. Comput. Sci. 16, 162801 (2022). https://doi.org/10.1007/s11704-020-0102-1
Received:
Accepted:
Published:
DOI: https://doi.org/10.1007/s11704-020-0102-1