skip to main content
10.1145/3374587.3374646acmotherconferencesArticle/Chapter ViewAbstractPublication PagescsaiConference Proceedingsconference-collections
research-article

A Study of Ciphertext Fuzzy Retrieval Based on Information Matrix

Published: 04 March 2020 Publication History

Abstract

To the ciphertext retrieval and the security of ciphertext database, we propose a ciphertext fuzzy retrieval method based on the information matrix in this paper. On the basis of the Bloom Filter, we introduce the index of the information matrix and the digital disturbance in the process of index generation, after which we performe the string conversion encryption. It not only supports the fuzzy search function of strings, but resists similarity attacks as well. With the DFR method during ciphertext retrieval, the first stage of filtering is completed by index matching, and then the exact retrieval is performed. Experiments and safety analysis show that the scheme has more advantages in efficiency and safety.

References

[1]
Yang M, Zhou X G, Zeng J Q, and Xu J J. 2016. Challenges and solutions of information security issues in the age of big data, China Communications, No.03, pp.193--202, 2016.
[2]
Agrawal R, Kiernan J, Srikant R, "Order preserving encryption for numeric data". Proceedings of the 2004 ACM SIGMOD International Conference on Management of Data, Paris: ACM, pp.563--574, 2004.
[3]
Dan B, Goh E J, Nissim K, "Evaluating 2-DNF formulas on ciphertexts", Lecture Notes in Computer Science, pp.325--341, 2005.
[4]
Shmueli E, Vaisenberg R, Elovici Y, and Glezer C, "Database encryption: an overview of contemporary challenges and design considerations", vol.38, issue 3, pp. 29--34, 2010.
[5]
Dong Q X, Guan Z, Chen Z, "Cryptographic technologies enabling computation over encrypted data", Application Research of Computers, No.09, pp.2561--2572, 2016.
[6]
Hacigumus H, lyer B, Mehrotra, "Executing SQL over Encrypted Data in Database service", University of California, pp.2--34, 2002.
[7]
Hacigumus H, Bara, "Executing SQL over encrypted data in the database service", University of California, pp.10--23, 2005.
[8]
Boneh D, Waters B, "Conjunclive, subset, and range queries on encrypted data", the theory of Cryptography, pp.535--554, 2007.
[9]
Popa R A, Redfield C, Zeldovich N, "CryptDB: protecting confidentiality with encrypted query processing", Proceedings of the Twenty-Third ACM Symposium on Operating Systems Principles, pp.85--100, 2011.
[10]
Cui G H, Tang X M, "Research on the implementation of encryption in database", Cryptography and Information, No.01, pp.17--21, 2000.
[11]
Goh E J, "Secure indexes", IACR Cryptology ePrint Archive, pp.216, 2003.
[12]
Yang T, Liu A X, Shahzad M, and Yang D S et, al. "A shifting bloom filter framework for set queries", IEEE/ACM Transactions on Networking, vol.25, issue.5, pp.3116--3131, 2017.
[13]
Gong Z, "Survey on lightweight hash functions", Journal of Cryptologic Research, vol.3, issue.1, pp.1--11, 2016.

Cited By

View all
  • (2020)Privacy-preserving searchable encryption in the intelligent edge computingComputer Communications10.1016/j.comcom.2020.09.012164(31-41)Online publication date: Dec-2020

Index Terms

  1. A Study of Ciphertext Fuzzy Retrieval Based on Information Matrix

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Other conferences
    CSAI '19: Proceedings of the 2019 3rd International Conference on Computer Science and Artificial Intelligence
    December 2019
    370 pages
    ISBN:9781450376273
    DOI:10.1145/3374587
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    In-Cooperation

    • Shenzhen University: Shenzhen University

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 04 March 2020

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. Bloom Filter
    2. Database
    3. Fuzzy retrieval
    4. Information matrix

    Qualifiers

    • Research-article
    • Research
    • Refereed limited

    Conference

    CSAI2019

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)0
    • Downloads (Last 6 weeks)0
    Reflects downloads up to 16 Feb 2025

    Other Metrics

    Citations

    Cited By

    View all
    • (2020)Privacy-preserving searchable encryption in the intelligent edge computingComputer Communications10.1016/j.comcom.2020.09.012164(31-41)Online publication date: Dec-2020

    View Options

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Figures

    Tables

    Media

    Share

    Share

    Share this Publication link

    Share on social media