A comparative survey of searchable encryption schemes

With the fastest technology of modern life we always have to deal with numerous data in various way. We simultaneously store and retrieve data in database of large organization, email server, cloud server etc. Due to this process both the owner and user need security of the data and therefore the data is encrypted before use. Because of this encryption process, some problem arises at the time of searching and retrieving of particular data. Searchable encryption is a scheme which assures the owner and user a secure and efficient searching operation. There has been growing interest in searchable encryption in both academics and industry. Over the years different type of construction of searchable encryption have been introduced. In some of them, researchers have emphasize on the efficiency of searchable encryption technique and somewhere security and privacy have got more attention. In this paper, a comparative survey has done on various technique of searchable encryption.

[1]  Mihir Bellare,et al.  Deterministic and Efficiently Searchable Encryption , 2007, CRYPTO.

[2]  Jian Shen,et al.  Privacy Preserving Search Schemes over Encrypted Cloud Data: A Comparative Survey , 2015, 2015 First International Conference on Computational Intelligence Theory, Systems and Applications (CCITSA).

[3]  P. Mell,et al.  The NIST Definition of Cloud Computing , 2011 .

[4]  M. A. Ullah,et al.  Cloud computing for future generation of computing technology , 2012, 2012 IEEE International Conference on Cyber Technology in Automation, Control, and Intelligent Systems (CYBER).

[5]  K. R. Venugopal,et al.  Cloud enabled 3D tablet design for medical applications , 2014, 2014 9th International Conference on Industrial and Information Systems (ICIIS).

[6]  Guido Appenzeller,et al.  The mobile people architecture , 1999, MOCO.

[7]  K. R. Venugopal,et al.  Mobile cloud computing for medical applications , 2014, 2014 Annual IEEE India Conference (INDICON).

[8]  Eu-Jin Goh,et al.  Secure Indexes , 2003, IACR Cryptol. ePrint Arch..

[9]  K. R. Venugopal,et al.  IGSK: Index Generation on Split Keyword for search over cloud data , 2015, 2015 International Conference on Computing and Network Communications (CoCoNet).

[10]  Michael Mitzenmacher,et al.  Privacy Preserving Keyword Searches on Remote Encrypted Data , 2005, ACNS.

[11]  Wei Wang,et al.  Public-Key Encryption with Fuzzy Keyword Search: A Provably Secure Scheme under Keyword Guessing Attack , 2013, IEEE Transactions on Computers.

[12]  Hyoung-Kee Choi,et al.  Efficient Protocol for Searchable encryption and secure deletion on cloud storages , 2017, 2017 IEEE International Conference on Consumer Electronics (ICCE).

[13]  M. Bellare,et al.  Searchable Encryption Revisited: Consistency Properties, Relation to Anonymous IBE, and Extensions , 2008, Journal of Cryptology.

[14]  Rafail Ostrovsky,et al.  Software protection and simulation on oblivious RAMs , 1996, JACM.

[15]  Dawn Xiaodong Song,et al.  Practical techniques for searches on encrypted data , 2000, Proceeding 2000 IEEE Symposium on Security and Privacy. S&P 2000.

[16]  Rafail Ostrovsky,et al.  Public Key Encryption with Keyword Search , 2004, EUROCRYPT.

[17]  Yinqi Tang,et al.  Phrase Search over Encrypted Data with Symmetric Encryption Scheme , 2012, 2012 32nd International Conference on Distributed Computing Systems Workshops.

[18]  Wentao Liu,et al.  Research on cloud computing security problem and strategy , 2012, 2012 2nd International Conference on Consumer Electronics, Communications and Networks (CECNet).

[19]  Zhihua Xia,et al.  A Secure and Dynamic Multi-Keyword Ranked Search Scheme over Encrypted Cloud Data , 2016, IEEE Transactions on Parallel and Distributed Systems.

[20]  Rafail Ostrovsky,et al.  Searchable symmetric encryption: Improved definitions and efficient constructions , 2011, J. Comput. Secur..

[21]  Kristin E. Lauter,et al.  Cryptographic Cloud Storage , 2010, Financial Cryptography Workshops.

[22]  Xingming Sun,et al.  Toward Efficient Multi-Keyword Fuzzy Search Over Encrypted Outsourced Data With Accuracy Improvement , 2016, IEEE Transactions on Information Forensics and Security.

[23]  Burton H. Bloom,et al.  Space/time trade-offs in hash coding with allowable errors , 1970, CACM.

[24]  Murat Kantarcioglu,et al.  Multi-Keyword search over encrypted data with scoring and search pattern obfuscation , 2015, International Journal of Information Security.

[25]  Yiwei Thomas Hou,et al.  Privacy-preserving multi-keyword fuzzy search over encrypted data in the cloud , 2014, IEEE INFOCOM 2014 - IEEE Conference on Computer Communications.