TY - JOUR
T1 - Secure Hashing-Based Verifiable Pattern Matching
AU - Chen, Fei
AU - Wang, Donghong
AU - Li, Ronghua
AU - Chen, Jianyong
AU - Ming, Zhong
AU - Liu, Alex X.
AU - Duan, Huayi
AU - Wang, Cong
AU - Qin, Jing
N1 - Funding Information:
Manuscript received December 25, 2017; revised March 10, 2018; accepted March 18, 2018. Date of publication April 9, 2018; date of current version May 21, 2018. This work was supported in part by the National Natural Science Foundation of China under Grant 61502314 and Grant 61672358, in part by the Science and Technology Plan Projects of Shenzhen under Grant JCYJ20160307115030281 and Grant JCYJ20170302145623566, in part by a Grant from the Innovation and Technology Fund of Hong Kong under Project ITS/304/16, and in part by CCF-Venustech funding under Grant CCF-VenustechRP2017001. The associate editor coordinating the review of this manuscript and approving it for publication was Dr. Julien Bringer. (Corresponding author: Jianyong Chen.) F. Chen, D. Wang, J. Chen, and Z. Ming are with the College of Computer Science and Engineering, Shenzhen University, Shen-zhen 518060, China (e-mail: [email protected]; [email protected]; [email protected]; [email protected]).
Publisher Copyright:
© 2005-2012 IEEE.
PY - 2018/11
Y1 - 2018/11
N2 - Verifiable pattern matching is the problem of finding a given pattern verifiably from the outsourced textual data, which is resident in an untrusted remote server. This problem has drawn much attention due to a large number of applications. The state-of-the-art method for this problem suffers from low efficiency. To enable fast verifiable pattern matching, we propose a novel scheme in this paper. Our scheme is based on an ordered set accumulator data structure and a newly developed verifiable suffix array structure, which only involves fast cryptographic hash computations. Our scheme also supports fast multiple-occurrence pattern matching. A striking feature of our proposed scheme is that our scheme works even with no secret keys, which ensures public verifiability. We conduct extensive experiments to evaluate the proposed scheme using Java. The results show that our scheme is orders of magnitude faster than the state-of-the-art work. Specifically, our scheme with public verifiability only costs a preprocessing time of 47 s (merely one-time off-line cost during outsourcing), a search time of 30μ s , a verification time of 149∼mu s , and a proof size of 2760 bytes for a verifiable pattern matching query with pattern length 200 on 10-million long textual data which consists of sequences of two-byte, Unicode characters in Java.
AB - Verifiable pattern matching is the problem of finding a given pattern verifiably from the outsourced textual data, which is resident in an untrusted remote server. This problem has drawn much attention due to a large number of applications. The state-of-the-art method for this problem suffers from low efficiency. To enable fast verifiable pattern matching, we propose a novel scheme in this paper. Our scheme is based on an ordered set accumulator data structure and a newly developed verifiable suffix array structure, which only involves fast cryptographic hash computations. Our scheme also supports fast multiple-occurrence pattern matching. A striking feature of our proposed scheme is that our scheme works even with no secret keys, which ensures public verifiability. We conduct extensive experiments to evaluate the proposed scheme using Java. The results show that our scheme is orders of magnitude faster than the state-of-the-art work. Specifically, our scheme with public verifiability only costs a preprocessing time of 47 s (merely one-time off-line cost during outsourcing), a search time of 30μ s , a verification time of 149∼mu s , and a proof size of 2760 bytes for a verifiable pattern matching query with pattern length 200 on 10-million long textual data which consists of sequences of two-byte, Unicode characters in Java.
KW - accumulator
KW - hashing
KW - Pattern matching outsourcing
KW - verifiability
UR - http://www.scopus.com/inward/record.url?scp=85045194671&partnerID=8YFLogxK
U2 - 10.1109/TIFS.2018.2825141
DO - 10.1109/TIFS.2018.2825141
M3 - Journal article
AN - SCOPUS:85045194671
SN - 1556-6013
VL - 13
SP - 2677
EP - 2690
JO - IEEE Transactions on Information Forensics and Security
JF - IEEE Transactions on Information Forensics and Security
IS - 11
ER -