Revisiting the Practicality of Search on Encrypted Data: From the Security Broker's Perspective

被引:0
|
作者
Han, Peiyi [1 ,2 ]
Liu, Chuanyi [1 ]
Fang, Binxing [1 ,3 ]
Wang, Guofeng [1 ,2 ]
Song, Xiaobao [4 ]
Wan, Lei [4 ]
机构
[1] Harbin Inst Technol Shenzhen, Shenzhen 518055, Peoples R China
[2] Beijing Univ Posts & Telecommun, Sch Comp Sci, Beijing 100876, Peoples R China
[3] Univ Elect Sci & Technol China, Inst Elect & Informat Engn Dongguan, Dongguan 523000, Peoples R China
[4] Shenzhen Yunanbao Technol Co Ltd, Shenzhen 518057, Peoples R China
基金
中国国家自然科学基金; 国家高技术研究发展计划(863计划);
关键词
SUBSET;
D O I
10.1155/2016/8057208
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
The primary business challenge for the customers to use outsourced computation and storage is the loss of data control and security. So encryption will become a commodity in the near future. There is big diffusion with the above scenario: take advantage of current application's full functionalities at the same time ensuring their sensitive data remains protected and under customers' control. Prior works have achieved effective progress towards satisfying both sides. But there are still some technical challenges, such as supporting file or data-stream based applications and supporting full-text and advanced searches. In this paper, a novel security broker based encrypted data search scheme, called Enc-YUN, is proposed, which transparently builds a reverse index at the security broker when the data flow is transmitted to the cloud. And search firstly takes place on the index, in which the mapping structure corresponds to and retrieves the very encrypted data in the cloud on behalf of the client. With this scheme, updated-to-date full-text search techniques can be easily integrated to carry out the most advanced search functionalities, at the same time, maintaining the strongest levels of data protection from curious providers or third parties. Experimental results show that Enc-YUN is effective with broad categories of cloud applications, and the performance overhead induced is minor and acceptable according to user's perceptual experience.
引用
收藏
页数:9
相关论文
共 50 条
  • [31] SoK: Analyzing Privacy and Security of Healthcare Data from the User Perspective
    Tazi, Faiza
    Nandakumar, Archana
    Dykstra, Josiah
    Rajivan, Prashanth
    Das, Sanchari
    ACM TRANSACTIONS ON COMPUTING FOR HEALTHCARE, 2024, 5 (02):
  • [32] Revisiting Lamin Sanneh's "Western Guilt Complex" from a Grassroots Perspective
    Yu, K. Kale
    INTERNATIONAL BULLETIN OF MISSION RESEARCH, 2022, 46 (03): : 397 - 404
  • [33] Policy governance from an autopoietic perspective: revisiting Hungary's regionalization experience
    Farago, Laszlo
    Scott, James W.
    EUROPEAN PLANNING STUDIES, 2017, 25 (06) : 1034 - 1052
  • [34] GVHD - FROM A DATA MANAGER'S PERSPECTIVE
    Lindner, B.
    Greinix, H.
    BONE MARROW TRANSPLANTATION, 2014, 49 : S430 - S430
  • [35] Use of administrative data to increase the practicality of clinical trials: Insights from the Women's Health Initiative
    Anderson, Garnet L.
    Burns, Carolyn J.
    Larsen, Joseph
    Shaw, Pamela A.
    CLINICAL TRIALS, 2016, 13 (05) : 519 - 526
  • [36] Security Obstacles and Motivations for Small Businesses from a CISO's Perspective
    Wolf, Flynn
    Aviv, Adam J.
    Kuber, Ravi
    PROCEEDINGS OF THE 30TH USENIX SECURITY SYMPOSIUM, 2021, : 1199 - 1216
  • [38] Turkey's Contact Tracing Infrastructure from Security and Privacy Perspective
    Sayin, Ayse
    Sandikkaya, Mehmet Tahir
    JOURNAL OF POLYTECHNIC-POLITEKNIK DERGISI, 2024, 27 (04):
  • [39] An Analysis of China's Economic Security from the Perspective of Economic Globalization
    Zhang Jianxiong
    2011 INTERNATIONAL CONFERENCE ON SOCIAL SCIENCES AND SOCIETY (ICSSS 2011), VOL 2, 2011, : 118 - 122
  • [40] China's oil security from the supply chain perspective: A review
    Zhao, Chunfu
    Chen, Bin
    APPLIED ENERGY, 2014, 136 : 269 - 279