Searchable Symmetric Encryption

Author:

Poh Geong Sen1,Chin Ji-Jian2,Yau Wei-Chuen3,Choo Kim-Kwang Raymond4,Mohamad Moesfa Soeheila1

Affiliation:

1. MIMOS Berhad, Kuala Lumpur, Malaysia

2. Multimedia University, Selangor, Malaysia

3. Xiamen University Malaysia, Sepang, Selangor

4. The University of Texas at San Antonio, TX, USA

Abstract

Searchable Symmetric Encryption (SSE) when deployed in the cloud allows one to query encrypted data without the risk of data leakage. Despite the widespread interest, existing surveys do not examine in detail how SSE’s underlying structures are designed and how these result in the many properties of a SSE scheme. This is the gap we seek to address, as well as presenting recent state-of-the-art advances on SSE. Specifically, we present a general framework and believe the discussions may lead to insights for potential new designs. We draw a few observations. First, most schemes use index table, where optimal index size and sublinear search can be achieved using an inverted index. Straightforward updating can only be achieved using direct index, but search time would be linear. A recent trend is the combinations of index table, and tree, deployed for efficient updating and storage. Secondly, mechanisms from related fields such as Oblivious RAM (ORAM) have been integrated to reduce leakages. However, using these mechanisms to minimise leakages in schemes with richer functionalities (e.g., ranked, range) is relatively unexplored. Thirdly, a new approach (e.g., multiple servers) is required to mitigate new and emerging attacks on leakage. Lastly, we observe that a proposed index may not be practically efficient when implemented, where I/O access must be taken into consideration.

Funder

Rackspace

Cloud Technology Endowed Professorship from the 80/20 Foundation

Publisher

Association for Computing Machinery (ACM)

Subject

General Computer Science,Theoretical Computer Science

Reference122 articles.

1. Near-optimal hashing algorithms for approximate nearest neighbor in high dimensions

2. Apache. 2016. Hbase. ( 2016 ). Retrieved from https://hbase.apache.org/. Apache. 2016. Hbase. (2016). Retrieved from https://hbase.apache.org/.

Cited by 76 articles. 订阅此论文施引文献 订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献

1. Comprehensive Survey on Privacy-Preserving Spatial Data Query in Transportation Systems;IEEE Transactions on Intelligent Transportation Systems;2023-12

2. A Survey on Searchable Symmetric Encryption;ACM Computing Surveys;2023-11-27

3. Improving cloud storage and privacy security for digital twin based medical records;Journal of Cloud Computing;2023-10-30

4. Personal health record storage and sharing using searchable encryption and blockchain: A comprehensive survey;SECURITY AND PRIVACY;2023-10-23

5. An Effective Public-key Authenticated Searchable Encryption for Protecting Sensitive data in Healthcare IoT;2023 International Conference on Evolutionary Algorithms and Soft Computing Techniques (EASCT);2023-10-20

同舟云学术

1.学者识别学者识别

2.学术分析学术分析

3.人才评估人才评估

"同舟云学术"是以全球学者为主线,采集、加工和组织学术论文而形成的新型学术文献查询和分析系统,可以对全球学者进行文献检索和人才价值评估。用户可以通过关注某些学科领域的顶尖人物而持续追踪该领域的学科进展和研究前沿。经过近期的数据扩容,当前同舟云学术共收录了国内外主流学术期刊6万余种,收集的期刊论文及会议论文总量共计约1.5亿篇,并以每天添加12000余篇中外论文的速度递增。我们也可以为用户提供个性化、定制化的学者数据。欢迎来电咨询!咨询电话:010-8811{复制后删除}0370

www.globalauthorid.com

TOP

Copyright © 2019-2024 北京同舟云网络信息技术有限公司
京公网安备11010802033243号  京ICP备18003416号-3