Revisiting the Practicality of Search on Encrypted Data: From the Security Broker's Perspective

被引:0
|
作者
Han, Peiyi [1 ,2 ]
Liu, Chuanyi [1 ]
Fang, Binxing [1 ,3 ]
Wang, Guofeng [1 ,2 ]
Song, Xiaobao [4 ]
Wan, Lei [4 ]
机构
[1] Harbin Inst Technol Shenzhen, Shenzhen 518055, Peoples R China
[2] Beijing Univ Posts & Telecommun, Sch Comp Sci, Beijing 100876, Peoples R China
[3] Univ Elect Sci & Technol China, Inst Elect & Informat Engn Dongguan, Dongguan 523000, Peoples R China
[4] Shenzhen Yunanbao Technol Co Ltd, Shenzhen 518057, Peoples R China
基金
中国国家自然科学基金; 国家高技术研究发展计划(863计划);
关键词
SUBSET;
D O I
10.1155/2016/8057208
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
The primary business challenge for the customers to use outsourced computation and storage is the loss of data control and security. So encryption will become a commodity in the near future. There is big diffusion with the above scenario: take advantage of current application's full functionalities at the same time ensuring their sensitive data remains protected and under customers' control. Prior works have achieved effective progress towards satisfying both sides. But there are still some technical challenges, such as supporting file or data-stream based applications and supporting full-text and advanced searches. In this paper, a novel security broker based encrypted data search scheme, called Enc-YUN, is proposed, which transparently builds a reverse index at the security broker when the data flow is transmitted to the cloud. And search firstly takes place on the index, in which the mapping structure corresponds to and retrieves the very encrypted data in the cloud on behalf of the client. With this scheme, updated-to-date full-text search techniques can be easily integrated to carry out the most advanced search functionalities, at the same time, maintaining the strongest levels of data protection from curious providers or third parties. Experimental results show that Enc-YUN is effective with broad categories of cloud applications, and the performance overhead induced is minor and acceptable according to user's perceptual experience.
引用
收藏
页数:9
相关论文
共 50 条
  • [21] Data Aggregation in Wireless Sensor Networks: From the Perspective of Security
    Liu, Xiaowu
    Yu, Jiguo
    Li, Feng
    Lv, Weifeng
    Wang, Yinglong
    Cheng, Xiuzhen
    IEEE INTERNET OF THINGS JOURNAL, 2020, 7 (07): : 6495 - 6513
  • [22] FORMAL SEARCH AND REFERRALS FROM A FIRM'S PERSPECTIVE
    Rebien, Martina
    Stops, Michael
    Zaharieva, Anna
    INTERNATIONAL ECONOMIC REVIEW, 2020, 61 (04) : 1679 - 1748
  • [23] Revisiting Karl Barth's doctrine of baptism from a perspective on prayer
    Cocksworth, Ashley
    SCOTTISH JOURNAL OF THEOLOGY, 2015, 68 (03) : 255 - 272
  • [24] OT Security: Challenges in setting up Security from the Pperator's Perspective
    Glawe, Matthias
    ATP MAGAZINE, 2024, (09):
  • [25] Schooling and ESE: revisiting Stevenson's gap from a pragmatist perspective
    Tryggvason, Asgeir
    Sund, Louise
    Ohman, Johan
    ENVIRONMENTAL EDUCATION RESEARCH, 2022, 28 (08) : 1237 - 1250
  • [26] From democracy to conflict: The UN's search for peace and security
    Smith, AM
    SECURITY DIALOGUE, 2003, 34 (03) : 357 - 362
  • [27] S3C: An Architecture for Space-Efficient Semantic Search over Encrypted Data in the Cloud
    Woodworth, Jason
    Salehi, Mohsen Amini
    Raghavan, Vijay
    2016 IEEE INTERNATIONAL CONFERENCE ON BIG DATA (BIG DATA), 2016, : 3722 - 3731
  • [28] Revisiting Online Privacy and Security Mechanisms Applied in the In-App Payment Realm from the Consumers' Perspective
    Ezennaya-Gomez, Salatiel
    Blumenthal, Edgar
    Eckardt, Marten
    Krebs, Justus
    Kuo, Christopher
    Porbeck, Julius
    Toplu, Emirkan
    Kiltz, Stefan
    Dittmann, Jana
    PROCEEDINGS OF THE 17TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY, ARES 2022, 2022,
  • [29] Cross-Border Data Security from the Perspective of Risk Assessment
    Wang, Na
    Wu, Gaofei
    Rong, Jingfeng
    Yan, Zheng
    Yue, Qiuling
    Hu, Jinglu
    Zhang, Yuqing
    INFORMATION SECURITY PRACTICE AND EXPERIENCE, ISPEC 2023, 2023, 14341 : 91 - 104
  • [30] The Evolvement of Big Data Systems: From the Perspective of an Information Security Application
    Chen, Gang
    Wu, Sai
    Wang, Yuan
    BIG DATA RESEARCH, 2015, 2 (02) : 65 - 73