Approaches and challenges of privacy preserving search over encrypted data

被引:5
作者
Kumar, D. V. N. Siva [1 ]
Thilagam, P. Santhi [1 ]
机构
[1] Natl Inst Technol Karnataka, Dept Comp Sci & Engn, Surathkal, India
关键词
Searchable encryption; Boolean search; Ranked search; Privacy of index; Trapdoors; Ranking; Search and access pattern; PUBLIC-KEY ENCRYPTION; KEYWORD RANKED SEARCH; RANGE QUERIES; CLOUD; SECURE; RETRIEVAL; SUBSET;
D O I
10.1016/j.is.2018.11.004
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
More and more data owners are encouraged to outsource their data onto cloud servers for reducing infrastructure, maintenance cost and also to get ubiquitous access to their stored data. However, security is one issue that discourages data owners from adopting cloud servers for data storage. Searchable Encryption (SE) is one of the few ways of assuring privacy and confidentiality of such data by storing them in encrypted form at the cloud servers. SE enables the data owners and users to search over encrypted data through trapdoors. Most of the user information requirements are fulfilled either through Boolean or Ranked search approaches. This paper aims at understanding how the confidentiality and privacy of information can be guaranteed while processing single and multi-keyword queries over encrypted data using Boolean and Ranked search approaches. This paper presents all possible leakages that happen in SE and also specifies which privacy preserving approach to be adopted in SE schemes to prevent those leakages to help the practitioners and researchers to design and implement secure searchable encryption systems. It also highlights various application scenarios where SE could be utilized. This paper also explores the research challenges and open problems that need to be focused in future. (C) 2018 Elsevier Ltd. All rights reserved.
引用
收藏
页码:63 / 81
页数:19
相关论文
共 112 条
  • [1] Abdalla M, 2005, LECT NOTES COMPUT SC, V3621, P205
  • [2] Agrawal Rakesh, 2004, ACM SIGMOD INT C MAN, P563
  • [3] An overview of the commercial cloud monitoring tools: research dimensions, design issues, and state-of-the-art
    Alhamazani, Khalid
    Ranjan, Rajiv
    Mitra, Karan
    Rabhi, Fethi
    Jayaraman, Prem Prakash
    Khan, Samee Ullah
    Guabtni, Adnene
    Bhatnagar, Vasudha
    [J]. COMPUTING, 2015, 97 (04) : 357 - 377
  • [4] [Anonymous], 2006, OFF LINE KEYWORD GUE, DOI DOI 10.1007/11844662_6
  • [5] [Anonymous], 2013, Financial Cryptography Data Security
  • [6] [Anonymous], TUTORIAL ANAL SURVEY
  • [7] [Anonymous], 2004, 2 INT C APPL CRYPT N, DOI DOI 10.1007/978-3-540-24852-1_3
  • [8] [Anonymous], TRAPDOOR PRIVACY ASY
  • [9] [Anonymous], 2008, P 11 INT C EXTENDING
  • [10] [Anonymous], 2012, IACR CRYPTOLOGY EPRI