2017
DOI: 10.1145/3064005
|View full text |Cite
|
Sign up to set email alerts
|

Searchable Symmetric Encryption

Abstract: Searchable Symmetric Encryption (SSE) when deployed in the cloud allows one to query encrypted data without the risk of data leakage. Despite the widespread interest, existing surveys do not examine in detail how SSE’s underlying structures are designed and how these result in the many properties of a SSE scheme. This is the gap we seek to address, as well as presenting recent state-of-the-art advances on SSE. Specifically, we present a general framework and believe the discussions may lead to insights for pot… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
53
0
4

Year Published

2018
2018
2023
2023

Publication Types

Select...
6

Relationship

0
6

Authors

Journals

citations
Cited by 120 publications
(62 citation statements)
references
References 89 publications
0
53
0
4
Order By: Relevance
“…We mention only a few of them and refer to recent surveys [4], [19] for an extensive summary on SSE. [7] captured first formally the intuitive goal of minimizing information leakage during keyword search (see section III-B).…”
Section: A Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…We mention only a few of them and refer to recent surveys [4], [19] for an extensive summary on SSE. [7] captured first formally the intuitive goal of minimizing information leakage during keyword search (see section III-B).…”
Section: A Related Workmentioning
confidence: 99%
“…The latter solution allows logarithmic search complexity in the number of keywords. This clear benefit caused that the inverted index approach became prevalent in SSE design which made significant progress in the past years [19]. At the same time these solutions are rather complex and while operating smoothly on huge static databases (DB), handling the rapid expansion of the DB turns out to be more troublesome as the underlying data structure has to be updated without information leakage (see Table I for details).…”
Section: Introductionmentioning
confidence: 99%
“…[1][2][3][4][5][6][7][8] But the data on the cloud are not under the user's physical control; illegal users can try to get the information contained in the data by the unauthorized access. [1][2][3][4][5][6][7][8] But the data on the cloud are not under the user's physical control; illegal users can try to get the information contained in the data by the unauthorized access.…”
Section: Introductionmentioning
confidence: 99%
“…Another survey work proposed by Han et al 3 provides a classification similar to that in the work of Bösch et al 1 A recent work is proposed by Poh et al, 2 which classifies the literature based on the type of index used (also referred to as structure by the authors). Another survey work proposed by Han et al 3 provides a classification similar to that in the work of Bösch et al 1 A recent work is proposed by Poh et al, 2 which classifies the literature based on the type of index used (also referred to as structure by the authors).…”
mentioning
confidence: 99%
“…the gaps in terms of efficiency, security, and query expressiveness. Another survey work proposed by Han et al 3 provides a classification similar to that in the work of Bösch et al 1 A recent work is proposed by Poh et al, 2 which classifies the literature based on the type of index used (also referred to as structure by the authors). They have highlighted works existing in the domain of symmetric searchable encryption.…”
mentioning
confidence: 99%