Background: Our work is focused on fuzzy keyword search over encrypted data in Cloud Computing. Methods: We adapt results on private identification schemes by Bringer et al. to this new context. We here exploit a classical embedding of the edit distance into the Hamming distance. Results: Our way of doing enables some flexibility on the tolerated edit distance when looking for close keywords while preserving the confidentiality of the queries. Conclusion: Our proposal is proved secure in a security model taking into account privacy.
CITATION STYLE
Bringer, J., & Chabanne, H. (2012). Embedding edit distance to enable private keyword search. Human-Centric Computing and Information Sciences, 2(1), 1–12. https://doi.org/10.1186/2192-1962-2-2
Mendeley helps you to discover research relevant for your work.