2019
DOI: 10.1002/cpe.5284
|View full text |Cite
|
Sign up to set email alerts
|

Survey on secure search over encrypted data on the cloud

Abstract: Cloud computing has become a potential resource for businesses and individuals to outsource their data to remote but highly accessible servers. However, the potential of cloud services has not been fully realized due to users concerns about data privacy and security. User-side encryption techniques can be employed to mitigate the security concerns, but once the data is encrypted, no processing (eg, searching) can be performed on the outsourced data. Searchable Encryption (SE) techniques have been widely studie… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
16
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
7
2

Relationship

0
9

Authors

Journals

citations
Cited by 29 publications
(17 citation statements)
references
References 75 publications
0
16
0
Order By: Relevance
“…The work by Fu et al (2018) further stated that there are various searchable encryption techniques for performing searches on secure outsourced data. Pham et al (2018) also proposed an architecture for delivering a secure search technique as a solution to the problem of searching over encrypted data in the cloud. Similarly, Attribute-Based Encryption (ABE) schemes enhance the flexibility of accessing confidential data as well as the ease of sharing such data, as illustrated in Figure 3 which presents a search model of encrypted data in cloud.…”
Section: Cloud Securitymentioning
confidence: 99%
“…The work by Fu et al (2018) further stated that there are various searchable encryption techniques for performing searches on secure outsourced data. Pham et al (2018) also proposed an architecture for delivering a secure search technique as a solution to the problem of searching over encrypted data in the cloud. Similarly, Attribute-Based Encryption (ABE) schemes enhance the flexibility of accessing confidential data as well as the ease of sharing such data, as illustrated in Figure 3 which presents a search model of encrypted data in cloud.…”
Section: Cloud Securitymentioning
confidence: 99%
“…The confidentiality of sensitive data like Electronic Health Records (EHR) outsourced to CSP is protected from external and internal attacks by deploying a searchable encryption scheme specially designed to support operations like search and updates over encrypted data [22].…”
Section: Related Workmentioning
confidence: 99%
“…With the popularity of data outsourcing services, there is an increasing need for data security [1,2] and privacy protection in cloud computing. Privacy-preserving outsourcing protocol provides an effective way to cope with this problem [3].…”
Section: Introductionmentioning
confidence: 99%