A scoping review of searchable encryption schemes in cloud computing: taxonomy, methods, and recent developments

被引:15
作者
Varri, Umasankararao [1 ,2 ]
Pasupuleti, Syamkumar [2 ]
Kadambari, K., V [1 ]
机构
[1] Natl Inst Technol NIT Warangal, Hyderabad, Telangana, India
[2] IDRBT, Hyderabad, Telangana, India
关键词
Cloud storage; Searchable encryption; Privacy preserving; Search functionality; Security; PUBLIC-KEY ENCRYPTION; MULTI-KEYWORD SEARCH; RANKED SEARCH; SECURE; PRIVACY; EFFICIENT; QUERIES;
D O I
10.1007/s11227-019-03087-y
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
With the emergence of cloud computing, data owners are showing interest to outsource the data to the cloud servers and allowing the data users to access the data as and when required.However, outsourcing sensitive data into the cloud leads to privacy issues. Encrypting the data before outsourcing provides privacy, but it does not provide search functionality. To achieve search over encrypted data without compromising the privacy, searchable encryption (SE) schemes have been proposed. It protects the user's sensitive information by providing searchability on encrypted data stored in the cloud. In this paper, we surveyed different SE schemes which are existed in the cloud domain. In this survey, we presented the taxonomy of the SE schemes: symmetric searchable encryption, public key searchable encryption, and attribute-based searchable encryption schemes, and then provided a detailed discussion on the SE schemes in terms of index structure and search functionality. A comparative analysis of SE schemes is also provided on security and performance. Furthermore, we discussed the challenges, future directions, and applications of SE schemes.
引用
收藏
页码:3013 / 3042
页数:30
相关论文
共 76 条
[1]  
Ahsan MAM, 2017, INT CONF RES INNOV
[2]  
Ali FS, 2016, 2016 INTERNATIONAL CONFERENCE ON NETWORK AND INFORMATION SYSTEMS FOR COMPUTERS (ICNISC), P260, DOI [10.1109/ICNISC.2016.82, 10.1109/ICNISC.2016.064]
[3]  
[Anonymous], 2016, IACR CRYPTOL EPRINT
[4]  
Bellare M., 1994, Advances in Cryptology - CRYPTO '94. 14th Annual International Cryptology Conference. Proceedings, P216
[5]  
Bost R., 2016, IACR Cryptol. ePrint Arch.
[6]  
Cai CJ, 2017, IEEE ICC
[7]   A Secure Conjunctive Keywords Search over Encrypted Cloud Data Against Inclusion-Relation Attack [J].
Cai, Ke ;
Hong, Cheng ;
Zhang, Min ;
Feng, Dengguo ;
Lv, Zhiquan .
2013 IEEE FIFTH INTERNATIONAL CONFERENCE ON CLOUD COMPUTING TECHNOLOGY AND SCIENCE (CLOUDCOM), VOL 1, 2013, :339-346
[8]   Privacy-Preserving Multi-Keyword Ranked Search over Encrypted Cloud Data [J].
Cao, Ning ;
Wang, Cong ;
Li, Ming ;
Ren, Kui ;
Lou, Wenjing .
IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2014, 25 (01) :222-233
[9]   Dynamic Searchable Encryption in Very-Large Databases: Data Structures and Implementation [J].
Cash, David ;
Jaeger, Joseph ;
Jarecki, Stanislaw ;
Jutla, Charanjit ;
Krawczyk, Hugo ;
Rosu, Marcel-Catalin ;
Steine, Michael .
21ST ANNUAL NETWORK AND DISTRIBUTED SYSTEM SECURITY SYMPOSIUM (NDSS 2014), 2014,
[10]  
Chang YC, 2005, LECT NOTES COMPUT SC, V3531, P442