Toward Privacy-Assured and Searchable Cloud Data Storage Services

被引:25
作者
Li, Ming [1 ]
Yu, Shucheng [2 ]
Ren, Kui [3 ]
Lou, Wenjing [4 ]
Hou, Y. Thomas [4 ]
机构
[1] Utah State Univ, Dept Comp Sci, Logan, UT 84322 USA
[2] Univ Arkansas, Dept Comp Sci, Little Rock, AR 72204 USA
[3] SUNY Buffalo, Dept Comp Sci & Engn, Buffalo, NY 14260 USA
[4] Virginia Polytech Inst & State Univ, Blacksburg, VA 24061 USA
来源
IEEE NETWORK | 2013年 / 27卷 / 04期
基金
美国国家科学基金会;
关键词
Search engines - Privacy-preserving techniques;
D O I
10.1109/MNET.2013.6574666
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Cloud computing is envisioned as the next generation architecture of IT enterprises, providing convenient remote access to massively scalable data storage and application services. While this outsourced storage and computing paradigm can potentially bring great economical savings for data owners and users, its benefits may not be fully realized due to wide concerns of data owners that their private data may be involuntarily exposed or handled by cloud providers. Although end-to-end encryption techniques have been proposed as promising solutions for secure cloud data storage, a primary challenge toward building a full-fledged cloud data service remains: how to effectively support flexible data utilization services such as search over the data in a privacy-preserving manner. In this article, we identify the system requirements and challenges toward achieving privacy-assured searchable outsourced cloud data services, especially, how to design usable and practically efficient search schemes for encrypted cloud storage. We present a general methodology for this using searchable encryption techniques, which allows encrypted data to be searched by users without leaking information about the data itself and users' queries. In particular, we discuss three desirable functionalities of usable search operations: supporting result ranking, similarity search, and search over structured data. For each of them, we describe approaches to design efficient privacy-assured searchable encryption schemes, which are based on several recent symmetric-key encryption primitives. We analyze their advantages and limitations, and outline the future challenges that need to be solved to make such secure searchable cloud data service a reality.
引用
收藏
页码:56 / 62
页数:7
相关论文
共 16 条
[1]  
[Anonymous], 2009, CLOUDS BERKELEY VIEW
[2]  
Boldyreva A., 2009, LNCS, V5479
[3]  
Cao N, 2011, IEEE INFOCOM SER, P829, DOI 10.1109/INFCOM.2011.5935306
[4]   Privacy-Preserving Query over Encrypted Graph-Structured Data in Cloud Computing [J].
Cao, Ning ;
Yang, Zhenyu ;
Wang, Cong ;
Ren, Kui ;
Lou, Wenjing .
31ST INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS (ICDCS 2011), 2011, :393-402
[5]   Structured Encryption and Controlled Disclosure [J].
Chase, Melissa ;
Kamara, Seny .
ADVANCES IN CRYPTOLOGY - ASIACRYPT 2010, 2010, 6477 :577-594
[6]  
Curtmola R., 2006, P ACM CCS 06
[7]  
Dwork C, 2006, LECT NOTES COMPUT SC, V4052, P1
[8]  
Kamara S, 2010, LECT NOTES COMPUT SC, V6054, P136, DOI 10.1007/978-3-642-14992-4_13
[9]  
Li J, 2010, IEEE INT C SOL DIEL
[10]   Authorized Private Keyword Search over Encrypted Data in Cloud Computing [J].
Li, Ming ;
Yu, Shucheng ;
Cao, Ning ;
Lou, Wenjing .
31ST INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS (ICDCS 2011), 2011, :383-392