Revisiting the Practicality of Search on Encrypted Data: From the Security Broker's Perspective

被引:0
|
作者
Han, Peiyi [1 ,2 ]
Liu, Chuanyi [1 ]
Fang, Binxing [1 ,3 ]
Wang, Guofeng [1 ,2 ]
Song, Xiaobao [4 ]
Wan, Lei [4 ]
机构
[1] Harbin Inst Technol Shenzhen, Shenzhen 518055, Peoples R China
[2] Beijing Univ Posts & Telecommun, Sch Comp Sci, Beijing 100876, Peoples R China
[3] Univ Elect Sci & Technol China, Inst Elect & Informat Engn Dongguan, Dongguan 523000, Peoples R China
[4] Shenzhen Yunanbao Technol Co Ltd, Shenzhen 518057, Peoples R China
基金
中国国家自然科学基金; 国家高技术研究发展计划(863计划);
关键词
SUBSET;
D O I
10.1155/2016/8057208
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
The primary business challenge for the customers to use outsourced computation and storage is the loss of data control and security. So encryption will become a commodity in the near future. There is big diffusion with the above scenario: take advantage of current application's full functionalities at the same time ensuring their sensitive data remains protected and under customers' control. Prior works have achieved effective progress towards satisfying both sides. But there are still some technical challenges, such as supporting file or data-stream based applications and supporting full-text and advanced searches. In this paper, a novel security broker based encrypted data search scheme, called Enc-YUN, is proposed, which transparently builds a reverse index at the security broker when the data flow is transmitted to the cloud. And search firstly takes place on the index, in which the mapping structure corresponds to and retrieves the very encrypted data in the cloud on behalf of the client. With this scheme, updated-to-date full-text search techniques can be easily integrated to carry out the most advanced search functionalities, at the same time, maintaining the strongest levels of data protection from curious providers or third parties. Experimental results show that Enc-YUN is effective with broad categories of cloud applications, and the performance overhead induced is minor and acceptable according to user's perceptual experience.
引用
收藏
页数:9
相关论文
共 50 条
  • [1] A Cloud Access Security Broker Based Approach for Encrypted Data Search and Sharing
    Liu, Chuanyi
    Wang, Guofeng
    Han, Peiyi
    Pan, Hezhong
    Fang, Binxing
    2017 INTERNATIONAL CONFERENCE ON COMPUTING, NETWORKING AND COMMUNICATIONS (ICNC), 2016, : 422 - 426
  • [2] Geometric Range Search on Encrypted Data With Forward/Backward Security
    Kermanshahi, Shabnam Kasra
    Sun, Shi-Feng
    Liu, Joseph K.
    Steinfeld, Ron
    Nepal, Surya
    Lau, Wang Fat
    Au, Man Ho Allen
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2022, 19 (01) : 698 - 716
  • [3] Revamping Federated Learning Security from a Defender's Perspective: A Unified Defense with Homomorphic Encrypted Data Space
    Kumar, K. Naveen
    Mitra, Reshmi
    Mohan, C. Krishna
    2024 IEEE/CVF CONFERENCE ON COMPUTER VISION AND PATTERN RECOGNITION (CVPR), 2024, : 24387 - 24397
  • [4] Security analysis of secure kNN and ranked keyword search over encrypted data
    Ogata, Wakaha
    Otemori, Takaaki
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2020, 19 (04) : 419 - 425
  • [5] Security analysis of secure kNN and ranked keyword search over encrypted data
    Wakaha Ogata
    Takaaki Otemori
    International Journal of Information Security, 2020, 19 : 419 - 425
  • [6] Machine Learning Meets Encrypted Search: The Impact and Efficiency of OMKSA in Data Security
    Wei, Zhongkai
    Su, Ye
    Zhang, Xi
    Yang, Haining
    Qin, Jing
    Ma, Jixin
    INTERNATIONAL JOURNAL OF INTELLIGENT SYSTEMS, 2025, 2025 (01)
  • [7] Verifiable Fuzzy Multi-Keyword Search Over Encrypted Data With Adaptive Security
    Tong, Qiuyun
    Miao, Yinbin
    Weng, Jian
    Liu, Ximeng
    Choo, Kim-Kwang Raymond
    Deng, Robert H. H.
    IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, 2023, 35 (05) : 5386 - 5399
  • [8] Health Insurance, from a Child Language Broker's Perspective
    Martinez, Krissia
    Orellana, Marjorie Faulstich
    Murillo, Marco A.
    Rodriguez, Michael A.
    INTERNATIONAL MIGRATION, 2017, 55 (05) : 31 - 43
  • [9] Revisiting Security Estimation for LWE with Hints from a Geometric Perspective
    Dachman-Soled, Dana
    Gong, Huijing
    Hanson, Tom
    Kippen, Hunter
    ADVANCES IN CRYPTOLOGY - CRYPTO 2023, PT V, 2023, 14085 : 748 - 781
  • [10] Revisiting intelligent audit from a data science perspective
    Lu, Hongru
    Wu, Zhiang
    NEUROCOMPUTING, 2025, 623