2015
DOI: 10.1186/s13673-015-0039-9
|View full text |Cite
|
Sign up to set email alerts
|

Implementation of searchable symmetric encryption for privacy-preserving keyword search on cloud storage

Abstract: BackgroundWith the rapid development of cloud computing and mobile networking technologies, users tend to access their stored data from the remote cloud storage with mobile devices. The main advantage of cloud storage is its ubiquitous user accessibility and also its virtually unlimited data storage capabilities. Despite such benefits provided by the cloud, the major challenge that remains is the concern over the confidentiality and privacy of data while adopting the cloud storage services [1]. For instance, u… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
20
0

Year Published

2016
2016
2023
2023

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 34 publications
(20 citation statements)
references
References 22 publications
0
20
0
Order By: Relevance
“…In all these SE schemes, the data-owner encrypts the documents in the collection and then provides the trapdoor to the end-users for data searching and access. [8][9][10][11][12][13][14][15] These SE schemes can be classified either as ''conjunctive search scheme'' or ''disjunctive search scheme.'' A conjunctive search scheme is one that can retrieve only those documents which contain all the search terms present in the search query.…”
Section: Figure 1 Conjunctive Search Scenariomentioning
confidence: 99%
See 1 more Smart Citation
“…In all these SE schemes, the data-owner encrypts the documents in the collection and then provides the trapdoor to the end-users for data searching and access. [8][9][10][11][12][13][14][15] These SE schemes can be classified either as ''conjunctive search scheme'' or ''disjunctive search scheme.'' A conjunctive search scheme is one that can retrieve only those documents which contain all the search terms present in the search query.…”
Section: Figure 1 Conjunctive Search Scenariomentioning
confidence: 99%
“…To overcome these drawbacks, various researchers have proposed searchable encryption (SE) schemes to provide efficient retrieval of the outsourced encrypted documents. In all these SE schemes, the data‐owner encrypts the documents in the collection and then provides the trapdoor to the end‐users for data searching and access . These SE schemes can be classified either as “conjunctive search scheme” or “disjunctive search scheme.” A conjunctive search scheme is one that can retrieve only those documents which contain all the search terms present in the search query.…”
Section: Introductionmentioning
confidence: 99%
“…In other words, authentication of user personal profile information that is saved in HSS is executed using MME; at this time, eNB is used as a connection instrument [16,17]. However, there are various threats that can harm the entire LTE network by tracing attacks, terminal tracing attacks, and privacy infringement attacks during a LTE initial attach process [18][19][20].…”
Section: The Lte Networkmentioning
confidence: 99%
“…Symmetric searchable encryption along with implementation results is discussed by Salam et al (2015). Sharable IDbased encryption employing a single keyword search scheme is also proposed by Xu et al (2015).…”
Section: Related Workmentioning
confidence: 99%