2015 IFIP/IEEE International Symposium on Integrated Network Management (IM) 2015
DOI: 10.1109/inm.2015.7140497
|View full text |Cite
|
Sign up to set email alerts
|

Fogging the cloud — Implementing and evaluating searchable encryption schemes in practice

Abstract: With the rise of cloud computing new ways to secure outsourced data have to be devised. Traditional approaches like simply encrypting all data before it is transferred only partially alleviate this problem. Searchable Encryption (SE) schemes enable the cloud provider to search for user supplied strings in the encrypted documents, while neither learning anything about the content of the documents nor about the search terms. Currently there are many different SE schemes defined in the literature, with their numb… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
2

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(3 citation statements)
references
References 5 publications
0
3
0
Order By: Relevance
“…Manuel Koschuch et al created Searchable Encryption (SE) techniques that enable cloud providers to explore user‐defined functionality in encrypted records or search phrases. When it comes to selecting a specific SE strategy, this paper provides no specific guidance 12 …”
Section: Literature Surveymentioning
confidence: 99%
See 1 more Smart Citation
“…Manuel Koschuch et al created Searchable Encryption (SE) techniques that enable cloud providers to explore user‐defined functionality in encrypted records or search phrases. When it comes to selecting a specific SE strategy, this paper provides no specific guidance 12 …”
Section: Literature Surveymentioning
confidence: 99%
“…When it comes to selecting a specific SE strategy, this paper provides no specific guidance. 12 SuHyun Kim et al proposed a method for transferring and handling data on lightweight devices in a variety of scenarios using the traditional cipher algorithm. In this approach, proxy re-encryption is used to organize data with more intermittent encryptions while also providing a data sharing operation to supplement the insufficient capability of lightweight machine networks.…”
Section: Encryption-based Techniquesmentioning
confidence: 99%
“…Manuel Koschuch et al [1] brought out a Searchable Encryption (SE) schemes that enable the cloud provider to search for user supplied strings in the encrypted documents, while neither learning anything about the content of the documents nor about the search terms. In this paper, there is no additional guidance is provided when selecting a specific SE scheme.…”
Section: Literature Surveymentioning
confidence: 99%