skip to main content
10.1145/3458744.3474040acmotherconferencesArticle/Chapter ViewAbstractPublication PagesicppConference Proceedingsconference-collections
research-article

FMSM: A Fuzzy Multi-keyword Search Scheme for Encrypted Cloud Data based on Multi-chain Network

Published: 23 September 2021 Publication History

Abstract

Searchable encryption is an efficient and secure solution that can perform search operation in ciphertext on cloud servers. It is widely used by a growing number of businesses and individuals. However, most existing searchable encryption schemes typically overestimate the security level of the cloud server, which is an untrusted and centralized third party in fact. The emergence of blockchain technology solves the trustworthiness problem of the third party with features such as decentralization, verifiability and immutability. The combination of searchable encryption and blockchain technology uses the smart contract instead of the cloud server to execute ciphertext search task, which improves security and efficiency of search significantly. We propose a Fuzzy Multi-keyword Search Scheme for Encrypted Cloud Data based on Multi-chain Network (FMSM). FMSM is a distributed searchable encryption scheme since we adopt a multi-chain architecture. It not only supports fuzzy multi-keyword search and dynamic updates for encrypted cloud data, but also supports parallel processing of data. In FMSM, counting bloom filter and MinHash algorithm are used to construct index vectors and query vectors on the corresponding two chains, besides, the search is done on a third chain. All of these calculation tasks are executed in the way of distributed computing, which makes the index construction and search process more efficient and the sorting results more accurate. The security analysis and performance evaluation show that the FMSM has high security, reliability, search efficiency and accuracy.

References

[1]
Gai Keke, Guo Jinnan, Liehuang Zhu, and Shui Yu. 2020. Blockchain meets cloud computing: a survey. IEEE Communications Surveys and Tutorials (COMST) 22, 3 (2020), 2009-2030.
[2]
Baojiang Cui, Zheli Liu, and Lingyu Wang. 2015. Key-aggregate searchable encryption (KASE) for group data sharing via cloud storage. IEEE Transactions on Computers (TC) 65, 8 (2015), 2374-2385.
[3]
Dawn. Xiaoding Song, D. Wagner, and A. Perrig. 2000. Practical Techniques for Searches on Encrypted data. In Proceedings of IEEE Symposium on Security and Privacy (SP). 44-55.
[4]
Dan Boneh, Giovanni Di Crescenzo, Rafail Ostrovsky, and Giuseppe Persiano. 2004. Public Key Encryption with Keyword Search. In International Conference on Theory and Application of Cryptographic Techniques (Eurocrypt). 506-522.
[5]
Curtmola Reza, Garay Juan, Kamara Seny, and Ostrovsky Rafaild. 2011. Searchable Symmetric Encryption: Improved Definitions and Efficient Constructions. Journal of Computer Security (JCS) 19, 5 (2011), 895-934.
[6]
Cong Wang, Ning Cao, Jin Li, Kui Ren, and Wenjing Lou. 2010. Secure Ranked Keyword Search over Encrypted Cloud Data. In IEEE International Conference on Distributed Computing Systems (ICDCS). 253-262.
[7]
Ning Cao, Cong Wang, Ming Li, Kui Ren, and Wenjing Lou. 2013. Privacy-Preserving Multi-keyword Ranked Search over Encrypted Cloud Data. 2013. IEEE Transactions on Parallel and Distributed Systems (TPDS) 25, 1 (2013), 829-837.
[8]
Wai Kit Wong, David W. Cheung, Ben Kao, and Nikos Mamoulis. 2009. Secure kNN Computation on Encrypted Databases. In ACM SIGMOD International Conference on Management of Data (MOD). 139-152.
[9]
Zhihua Xia, Xinhui Wang, Xingming Sun, and Qian Wang. 2016. A secure and dynamic multi-keyword ranked search scheme over encrypted cloud data. IEEE Transactions on Parallel and Distributed Systems (TPDS) 27, 2 (2016), 340-352.
[10]
Xueqiao Liu, Guomin Yang, Willy Susilo, Joseph Tonien, Ximeng Liu, and Jian Shen. 2020. Privacy-Preserving Multi-Keyword Searchable Encryption for Distributed Systems. IEEE Transactions on Parallel and Distributed Systems (TPDS) 32, 3 (2020), 561-574.
[11]
Zhiguo Wan and Robert H. Deng. 2016. VPSearch: achieving verifiability for privacy-preserving multi-keyword search over encrypted cloud data. IEEE transactions on dependable and secure computing (TDSC) 15, 6 (2016),1083-1095.
[12]
Xiaofeng Ding, Peng Liu, and Hai Jin. 2017. Privacy-Preserving Multi-Keyword Top-k Similarity Search Over Encrypted Data. IEEE Transactions on Dependable and Secure Computing (TDSC) 16, 2 (2017), 344-357.
[13]
Rohit Handa, Rama K. Challa, and Naveen Aggarwal. 2020. Efficient privacy-preserving scheme supporting disjunctive multi-keyword search with ranking. Concurrency and Computation: Practice and Experience (CPE) 32, 2 (2020), e5450.
[14]
Jin Li, Qian Wang, Cong Wang, Ning Cao, Kui Ren, and Wenjing Lou. 2010. Fuzzy Keyword Search over Encrypted data in Cloud Computing. In International Conference on Computer Communications (INFOCOM). 441-445.
[15]
Mehmet Kuzu, Mohammad Saiful Islam, and Murat Kantarcioglu. 2012. Efficient similarity search over encrypted data. IEEE International Conference on Data Engineering (ICDE). 1156-1167.
[16]
Piotr Indyk and Rajeev Motwani. 1998. Approximate Nearest Neighbors: towards Removing the Curse of Dimensionality. In ACM Symposium on Theory of Computing (STOC). 604-613.
[17]
Bing Wang, Shucheng Yu, Wenjing Lou, Thomas Y. Hou. 2014. Privacy-preserving Multi-keyword Fuzzy Search over Encrypted Data in the Cloud. In International Conference on Computer Communications (INFOCOM). 2112-2120.
[18]
Burton H. Bloom. 2010. Space/time trade-offs in hash coding with allowable errors. Communications of the ACM (CACM) 13, 7 (2010), 422-426.
[19]
Zhangjie Fu, Xinle Wu, Chaowen Guan, Xingming Sun, and Kui Ren. 2016. Toward efficient multi-keyword fuzzy search over encrypted outsourced data with accuracy improvement. IEEE Transactions on Information Forensics and Security (TIFS) 11, 12 (2016), 2706-2716.
[20]
Peng Jiang, Fuchuan Guo, Kaitai Liang, Jianchang Lai, and Qiaoyan Wen. 2020. Searchain: Blockchain-based private keyword search in decentralized storage. Future Generation Computer Systems (FGCS)107 (2020), 781-792.
[21]
Suhui Liu, Jiguo Yu, Yinhao Xiao, Zhiguo Wan, Shengling Wang, and Biwei Yan. 2020. BC-SABE: Blockchain-Aided Searchable Attribute-Based Encryption for Cloud-IoT. IEEE Internet of Things Journal (IOTJ) 7, 9 (2020), 7851-7867.Jason Jerald. 2015. The VR Book: Human-Centered Design for Virtual Reality. Association for Computing Machinery and Morgan & Claypool.
[22]
Shan Jiang, Jiannong Cao, Julie A. McCann, Yanni Yang, Yang Liu, Xiaoqing Wang, and Yuming Deng. 2019. Privacy-preserving and efficient multi-keyword search over encrypted data on blockchain. In IEEE International Conference on Blockchain (Blockchain), 405-410.
[23]
Huige Li, Fangguo Zhang, Jiejie He, and Haibo Tian. 2017. A searchable symmetric encryption scheme using blockchain. CoRR abs/1711.01030 (2017).
[24]
Shengshan Hu, Chengjun Cai, Qian Wang, Cong Wang, Xiangyang Luo, and Kui Ren. 2018. Searching an encrypted cloud, meets blockchain: A decentralized, reliable and fair realization. In IEEE Conference on Computer Communications (INFOCOM), 792-800.
[25]
Biwen Chen, Libing Wu, Huaqun Wang, Lu Zhou, and Debiao He. 2020. A Blockchain-Based Searchable Public-Key Encryption with Forward and Backward Privacy for Cloud-Assisted Vehicular Social Networks. IEEE Transactions on Vehicular Technology (TVT) 69, 6 (2020), 5813-5825.
[26]
Moses S. Charikar. 2002. Similarity Estimation Techniques from Rounding Algorithms. In ACM Symposium on Theory of Computing (STOC), 380-388.
[27]
Li Fan, Pei Cao, J. Almeida, and A.Z. Broder. 2000. Summary Cache: A Scalable Wide-area Web Cache Sharing Protocol. IEEE/ACM Transactions on Networking (TON) 8, 3 (2020), 281-293.
[28]
Dylan Yaga, Peter Mell, Nik Roby, and Karen Scarfone. 2019. Blockchain Technology Overview. CoRR abs/1906.11078 (2019).
[29]
Mark Soelman, Vasilios Andrikopoulos, Jorge A. Pérez, Vasileios Theodosiadis, Karel Goense, and Arne Rutjes. 2020. Hyperledger Fabric: Evaluating Endorsement Policy Strategies in Supply Chain. In IEEE International Conference on Decentralized Applications and Infrastructures (DAPPS),145-152.
[30]
Enron email dataset [EB/OL]. (2015-03-12) http://www.cs.cmu.edu/∼./enron.

Cited By

View all
  • (2025)EDP-CVSM model-based multi-keyword ranked search scheme over encrypted cloud dataFuture Generation Computer Systems10.1016/j.future.2025.107726167(107726)Online publication date: Jun-2025
  • (2024)Ciphertext Fuzzy Retrieval Mechanism With Bidirectional Verification and Privacy ProtectionIEEE Internet of Things Journal10.1109/JIOT.2024.345845711:24(41061-41083)Online publication date: 15-Dec-2024
  • (2024)Vector Sum Range Decision for Verifiable Multiuser Fuzzy Keyword Search in Cloud-Assisted IoTIEEE Internet of Things Journal10.1109/JIOT.2023.328827611:1(931-943)Online publication date: 1-Jan-2024
  • Show More Cited By

Index Terms

  1. FMSM: A Fuzzy Multi-keyword Search Scheme for Encrypted Cloud Data based on Multi-chain Network
        Index terms have been assigned to the content through auto-classification.

        Recommendations

        Comments

        Information & Contributors

        Information

        Published In

        cover image ACM Other conferences
        ICPP Workshops '21: 50th International Conference on Parallel Processing Workshop
        August 2021
        314 pages
        ISBN:9781450384414
        DOI:10.1145/3458744
        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        Published: 23 September 2021

        Permissions

        Request permissions for this article.

        Check for updates

        Author Tags

        1. Searchable encryption
        2. blockchain
        3. fuzzy search
        4. multi-chain
        5. multi-keyword search

        Qualifiers

        • Research-article
        • Research
        • Refereed limited

        Conference

        ICPP 2021

        Acceptance Rates

        Overall Acceptance Rate 91 of 313 submissions, 29%

        Contributors

        Other Metrics

        Bibliometrics & Citations

        Bibliometrics

        Article Metrics

        • Downloads (Last 12 months)21
        • Downloads (Last 6 weeks)1
        Reflects downloads up to 02 Mar 2025

        Other Metrics

        Citations

        Cited By

        View all
        • (2025)EDP-CVSM model-based multi-keyword ranked search scheme over encrypted cloud dataFuture Generation Computer Systems10.1016/j.future.2025.107726167(107726)Online publication date: Jun-2025
        • (2024)Ciphertext Fuzzy Retrieval Mechanism With Bidirectional Verification and Privacy ProtectionIEEE Internet of Things Journal10.1109/JIOT.2024.345845711:24(41061-41083)Online publication date: 15-Dec-2024
        • (2024)Vector Sum Range Decision for Verifiable Multiuser Fuzzy Keyword Search in Cloud-Assisted IoTIEEE Internet of Things Journal10.1109/JIOT.2023.328827611:1(931-943)Online publication date: 1-Jan-2024
        • (2023)Survey on Secure Keyword Search over Outsourced Data: From Cloud to Blockchain-assisted ArchitectureACM Computing Surveys10.1145/361782456:3(1-40)Online publication date: 5-Oct-2023
        • (2023)TFS-index-based Multi-keyword Ranked Search Scheme Over Cloud Encrypted Data2023 IEEE 29th International Conference on Parallel and Distributed Systems (ICPADS)10.1109/ICPADS60453.2023.00311(2320-2327)Online publication date: 17-Dec-2023
        • (2022)Intelligent Experimental Cloud Sharing Network of Clothing Design based on Digital Image Modeling2022 International Conference on Edge Computing and Applications (ICECAA)10.1109/ICECAA55415.2022.9936443(1002-1005)Online publication date: 13-Oct-2022

        View Options

        Login options

        View options

        PDF

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader

        HTML Format

        View this article in HTML Format.

        HTML Format

        Figures

        Tables

        Media

        Share

        Share

        Share this Publication link

        Share on social media