首页> 外文期刊>Concurrency, practice and experience >Searchable encryption: A survey on privacy-preserving search schemes on encrypted outsourced data
【24h】

Searchable encryption: A survey on privacy-preserving search schemes on encrypted outsourced data

机译:可搜索的加密:加密外包数据保留隐私搜索方案的调查

获取原文
获取原文并翻译 | 示例
           

摘要

Outsourcing confidential data to cloud storage leads to privacy challenges that can be reducedusing encryption. However, with encryption in place, the utilization of the data is reduced, whichleads to reduced quality of experience of the users. To overcome this, searchable encryption(SE) schemes are utilized, which allow the end users to retrieve the relevant documents fromthe cloud, for which various researchers have worked utilizing different techniques. Despite thepopularity of the searchable encryption schemes, most of the surveys either do not provide orpresent an incomplete taxonomy of SE schemes. Hence, in this paper, we attempt to presenta complete taxonomy/classification of the searchable encryption schemes in terms of the typeof search, type of index, results retrieved, implementation type, multiplicity of users, and thetechnique used. From the literature, it is observed that inner product similarity is widely adoptedby researchers to compute the similarity of the query and the document index as it providesboth conjunctive and disjunctive searching (ie, have better search capability) but requires highsearch time (ie, have lower search efficiency). On the other hand, schemes based on binarycomparisons exist, which require less search time (ie, have better search efficiency) but supportonly conjunctive searching (ie, have limited search capability). Thus, a major conclusion drawnfrom our work is that there is an imbalance between search capability and search efficiency,ie, in the existing schemes, search capability can be improved at the cost of search time only.Therefore, we suggest that one direction where researchers should work on is to provide abalance between search capability and search efficiency.
机译:将机密数据外包给云存储导致隐私挑战可以减少使用加密。但是,通过加密到位,减少了数据的利用率,这导致用户的经验质量降低。克服这一点,可搜索的加密(SE)使用方案,允许最终用户从中检索相关文件云,各种研究人员都使用不同的技术。尽管可搜索的加密方案的普及,大部分调查都不提供或提出了SE计划的不完整分类。因此,在本文中,我们试图呈现在类型方面的可搜索加密方案的完整分类/分类搜索,索引类型,结果检索,实现类型,用户多重性,以及技术使用。从文献中,观察到内部产品相似度被广泛采用通过研究人员根据提供的查询和文档索引的相似性计算联合和分解搜索(即具有更好的搜索能力),但需要高搜索时间(即,搜索效率较低)。另一方面,基于二进制的方案存在比较,这需要较少的搜索时间(即,具有更好的搜索效率)但是支持只有联合搜索(即,有限的搜索能力有限)。因此,一个主要的结论从我们的工作来看,搜索能力与搜索效率之间存在不平衡,即,在现有方案中,可以以搜索时间的成本提高搜索能力。因此,我们建议研究人员应该努力的一个方向是提供一个搜索能力与搜索效率之间的平衡。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号