Secure searches in the cloud: A survey

被引:44
作者
Han, Fei [1 ]
Qin, Jing [1 ]
Hu, Jiankun [2 ]
机构
[1] Shandong Univ, Sch Math, Jinan 250100, Peoples R China
[2] Univ New S Wales, Sch Engn & Informat Technol, Def Force Acad Canberra, Sydney, NSW 2052, Australia
来源
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE | 2016年 / 62卷
关键词
Cloud security; Cloud storage; Information retrieval; Searchable encryption; Secure keyword search; PUBLIC-KEY ENCRYPTION; FUZZY KEYWORD SEARCH; PRIVACY; EFFICIENT; ATTACKS; SCHEME; QUERY;
D O I
10.1016/j.future.2016.01.007
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Cloud security is a huge concern when users and enterprises consider to deploy cloud computing services. This article mainly presented an important aspect of cloud security which is called searchable encryption. Searchable encryption is a scheme that enable users to secure search on encrypted data stored in cloud. To guarantee privacy of users' data, users encrypt their data files before uploading, then when they need to fetch some files, they can use searchable encryption to execute keyword search on encrypted data. Searchable encryption can be classified by three models, each is corresponding with different application scenario. Two of them are suitable with cloud architecture. They are called searchable public key encryption and searchable symmetric encryption respectively. Searchable public key encryption is mainly for data sharing scenario. A user wants to share some data files with other users privately. He can encrypt these files with receivers' public key. And receivers can securely search on it with their private keys. Searchable symmetric encryption can enable users securely using their online storage. They can upload data files which are encrypted with their secret keys. And then they can securely search on these encrypted data with the secret key no matter when and where they are. (C) 2016 Elsevier B.V. All rights reserved.
引用
收藏
页码:66 / 75
页数:10
相关论文
共 77 条
[71]   Ciphertext-Policy Attribute-Based Encryption: An Expressive, Efficient, and Provably Secure Realization [J].
Waters, Brent .
PUBLIC KEY CRYPTOGRAPHY - PKC 2011, 2011, 6571 :53-70
[72]   Security and privacy for storage and computation in cloud computing [J].
Wei, Lifei ;
Zhu, Haojin ;
Cao, Zhenfu ;
Dong, Xiaolei ;
Jia, Weiwei ;
Chen, Yunlu ;
Vasilakos, Athanasios V. .
INFORMATION SCIENCES, 2014, 258 :371-386
[73]   SESA: an efficient searchable encryption scheme for auction in emerging smart grid marketing [J].
Wen, Mi ;
Lu, Rongxing ;
Lei, Jingsheng ;
Li, Hongwei ;
Liang, Xiaoghui ;
Shen, Xuemin .
SECURITY AND COMMUNICATION NETWORKS, 2014, 7 (01) :234-244
[74]   An efficient PHR service system supporting fuzzy keyword search and fine-grained access control [J].
Xhafa, Fatos ;
Wang, Jianfeng ;
Chen, Xiaofeng ;
Liu, Joseph K. ;
Li, Jin ;
Krause, Paul .
SOFT COMPUTING, 2014, 18 (09) :1795-1802
[75]   Public-Key Encryption with Fuzzy Keyword Search: A Provably Secure Scheme under Keyword Guessing Attack [J].
Xu, Peng ;
Jin, Hai ;
Wu, Qianhong ;
Wang, Wei .
IEEE TRANSACTIONS ON COMPUTERS, 2013, 62 (11) :2266-2277
[76]  
Yanjiang Yang, 2011, Proceedings of the 2011 IEEE 3rd International Conference on Cloud Computing Technology and Science (CloudCom 2011), P264, DOI 10.1109/CloudCom.2011.43
[77]   Efficient public key encryption with revocable keyword search [J].
Yu, Yong ;
Ni, Jianbing ;
Yang, Haomiao ;
Mu, Yi ;
Susilo, Willy .
SECURITY AND COMMUNICATION NETWORKS, 2014, 7 (02) :466-472