0% found this document useful (0 votes)
15 views

Abstract

Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
15 views

Abstract

Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 2

Abstract:

The cloud computing treats computing as a utility and leases out the computing and storage
capacities to the public individuals. In such a framework, the individual can remotely store her
data on the cloud server, namely data outsourcing, and then make the cloud data open for public
access through the cloud server. This represents a more scalable, low-cost and stable way for
public data access because of the scalability and high efficiency of cloud servers, and therefore is
favorable to small enterprises .Note that the outsourced data may contain sensitive privacy
information. It is often necessary to encrypt the private data before transmitting the data to the
cloud servers. The data encryption, however, would significantly lower the usability of data due
to the difficulty of searching over the encrypted data. Simply encrypting the data may still cause
other security concerns. For instance, Google Search uses SSL (Secure Sockets Layer) to encrypt
the connection between search user and Google server when private data, such as documents and
emails, appear in the search results. However, if the search user clicks into another website from
the search results page, that website may be able to identify the search terms that the user has
used. On addressing above issues, the searchable encryption has been recently developed as a
fundamental approach to enable searching over encrypted cloud data, which proceeds the
following operations.

Firstly, the data owner needs to generate several keywords according to the outsourced
data. These keywords are then encrypted and stored at the cloud server. When a search user
needs to access the outsourced data, it can select some relevant keywords and send the ciphertext
of the selected keywords to the cloud server. The cloud server then uses the ciphertext to match
the outsourced encrypted keywords, and lastly returns the matching results to the search user. To
achieve the similar search efficiency and precision over encrypted data as that of plaintext
keyword search, an extensive body of research has been developed propose a ranked keyword
search scheme which considers the relevance scores of keywords. Unfortunately, due to using
order-preserving encryption (OPE) to achieve the ranking property, the proposed scheme cannot
achieve unlinkability of trapdoor.Firstly, query with user preferences is very popular in the
plaintext search. It enables personalized search and can more accurately represent user’s
requirements, but has not been thoroughly studied and supported in the encrypted data domain.
Secondly, to further improve the user’s experience on searching, an important and fundamental
function is to enable the multi-keyword search with the comprehensive logic operations, i.e., the
“AND”, “OR” and “NO” operations of keywords. This is fundamental for search users to prune
the searching space and quickly identify the desired data.

You might also like