
Abstract With the rapid development of the cloud computing, more and more users choose to store their encrypted data on the cloud server. Searchable encryption (SE) schemes capacitate legal users to retrieve encrypted data in the cloud server and the cloud server does not leak sensitive information about the encrypted data. In this paper, we use searchable symmetric encryption (SSE) to construct our scheme. SSE can be divided into exact keyword searchable encryption and fuzzy keyword searchable encryption. Fuzzy keyword searchable encryption scheme takes into account the minor clerical errors of users. When the query keyword does not match the index stored in the cloud server, the fuzzy keyword searchable encryption schemes can find the closest keyword and return the matching encrypted documents, which improves the availability of the cloud server. In this paper, we propose a multi-keyword fuzzy searchable encryption scheme by using locality sensitive hashing (LSH) and bloom filter which has high search accuracy.
| selected citations These citations are derived from selected sources. This is an alternative to the "Influence" indicator, which also reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically). | 9 | |
| popularity This indicator reflects the "current" impact/attention (the "hype") of an article in the research community at large, based on the underlying citation network. | Top 10% | |
| influence This indicator reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically). | Top 10% | |
| impulse This indicator reflects the initial momentum of an article directly after its publication, based on the underlying citation network. | Top 10% |
