Abstract
Public Key Encryption with Keyword Search (PEKS) allows users to search encrypted files by a specific keyword without compromising the original data security. Almost all current PEKS schemes enable users to search exact keyword only instead of imprecise keyword (such as “latest”, “biggest”, etc.). Therefore, if the keyword is fuzzy, these PEKS schemes will be terminated and then report errors. Besides, some PEKS schemes are not secure mainly because they are vulnerable to Off-line Keyword Guessing Attack (OKGA). This research paper incorporates with Mamdani Fuzzy Inference System to PEKS for supporting Fuzzy Keyword Search. Secondly, the proposed scheme is proved to be semantic secure under the random oracle models so that it is able to resist OKGA. In addition, the new scheme allows users to search multiple keywords and therefore, it could be applied to the general public networks.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Boneh, D., Di Crescenzo, G., Ostrovsky, R., Persiano, G.: Public key encryption with keyword search. In: Advances in Cryptology - EUROCRYPT, pp. 506–522 (2004)
Baek, J., Safavi-Naini, R., Susilo, W.: Public key encryption with keyword search revisited. In: Computational Science and its Applications? ICCSA 2008, pp. 1249–1259 (2008)
Byun, J., Rhee, H., Park, H., Lee, D.: Off-line keyword guessing attacks on recent keyword search schemes over encrypted data. Lecture Notes in Computer Science, pp. 75–83 (2006)
Yau, W., Heng, S., Goi, B.: Off-line keyword guessing attacks on recent public key encryption with keyword search schemes. Lecture Notes in Computer Science, pp. 100–105 (2008)
Tang, Q., Chen, L.: Public-key encryption with registered keyword search. In: Public Key Infrastructures, Services and Applications, pp. 163–178 (2010)
Rhee, H., Park, J., Susilo, W., Lee, D.: Trapdoor security in a searchable public-key encryption scheme with a designated tester. J. Syst. Softw. 83(5), 763–771 (2010)
Wang, T., Au, M., Wu, W.: An efficient secure channel free searchable encryption scheme with multiple keywords. In: Network and System Security, vol. 9955, pp. 251–265 (2016)
Zadeh, L.: Outline of a new approach to the analysis of complex systems and decision processes. IEEE Trans. Syst. Man Cybern SMC 3(1), 28–44 (1973)
Mamdani, E.H., Assilian, S.: An experiment in linguistic synthesis with a fuzzy logic controller. Int. J. Man-Mach. Stud. 7(1), 1–13 (1975)
Takagi, T., Sugeno, M.: Fuzzy identification of systems and its applications to modeling and control. IEEE Trans. Syst. Man Cybern. 15, 116–132 (1985)
Singh, J., Singh, N., Sharma, J.K.: Fuzzy modeling and identification of intelligent control for refrigeration compressor. J. Sci. Ind. Res. 65, 22–30 (2006)
Lermontov, A., Yokoyama, L., Lermontov, M., Machado, M.A.S.: River quality analysis using fuzzy water quality index: Ribeira do Iguape river watershed, Brazil. Ecol. Indic. 9, 1188–1197 (2009)
Marchini, A., Facchinetti, T., Mistri, M.: F-IND: a framework to design fuzzy indices of environmental conditions. Ecol. Indic. 9, 485–496 (2009)
De Caro, A., Iovino, V.: JPBC: Java pairing based cryptography. In: 2011 IEEE Symposium on Computers and Communications (ISCC) (2011)
Cingolani, P., Alcalá-Fdez, J.: jFuzzyLogic: a Java library to design fuzzy logic controllers according to the standard for fuzzy control programming. Int. J. Comput. Intell. Syst. 6(Supplement 1), 61–75 (2013)
Cingolani, P., Alcala-Fdez, J.: jFuzzyLogic: a robust and flexible Fuzzy-Logic inference system language implementation. In: 2012 IEEE International Conference on Fuzzy Systems (FUZZ-IEEE). IEEE (2012)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 The Editor(s) (if applicable) and The Author(s), under exclusive license to Springer Nature Switzerland AG
About this paper
Cite this paper
Kazemian, H.B., Ma, Y. (2020). Fuzzy Logic Application to Searchable Cryptography. In: Iliadis, L., Angelov, P., Jayne, C., Pimenidis, E. (eds) Proceedings of the 21st EANN (Engineering Applications of Neural Networks) 2020 Conference. EANN 2020. Proceedings of the International Neural Networks Society, vol 2. Springer, Cham. https://doi.org/10.1007/978-3-030-48791-1_32
Download citation
DOI: https://doi.org/10.1007/978-3-030-48791-1_32
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-48790-4
Online ISBN: 978-3-030-48791-1
eBook Packages: Computer ScienceComputer Science (R0)