Searching Encrypted Data
نویسندگان
چکیده
Company data are very often outsourced to datacentres in order to lower costs of maintaining hardware. If the outsourced data are to be kept secure from a third party, the connection between the datacentre and the company could be secured by a protocol similar to SSL. This, however, requires that the data is stored at the datacentre in plaintext form, meaning the company has to trust the datacentre and its administrators. Alternatively, the data themselves could be encrypted, however, the outputs of typical cryptographic algorithms are not amenable to search. This project explores the research area of searching over encrypted data, specifically using a secure pre-processed index approach. The output of the project is a system developed for the PostgreSQL 8.3 database management system that allows data to be encrypted and stored in a database table whilst allowing for secure, server-side searches with minimal performance overhead, both in space and time. The datarate achieved by the encryption algorithm is around 2.21MB/s, which is shown to be faster than an existing plaintext PostgreSQL indexing algorithm. The search algorithm is shown to be around twice as fast as plaintext linear search, with a rate of 300MB/s, but slower than indexed plaintext search. These results demonstrate the system’s practicality within an industrial setting.
منابع مشابه
Private Key based query on encrypted data
Nowadays, users of information systems have inclination to use a central server to decrease data transferring and maintenance costs. Since such a system is not so trustworthy, users' data usually upkeeps encrypted. However, encryption is not a nostrum for security problems and cannot guarantee the data security. In other words, there are some techniques that can endanger security of encrypted d...
متن کاملBrowse searchable encryption schemes: Classification, methods and recent developments
With the advent of cloud computing, data owners tend to submit their data to cloud servers and allow users to access data when needed. However, outsourcing sensitive data will lead to privacy issues. Encrypting data before outsourcing solves privacy issues, but in this case, we will lose the ability to search the data. Searchable encryption (SE) schemes have been proposed to achieve this featur...
متن کاملA Survey on Keyword Based Search over Outsourced Encrypted Data
To ensure security, encryption techniques play a major role when data are outsourced to the cloud. Problem of retrieving the data from the cloud servers is considered. Many searching techniques are used for retrieving the data. This study focused on a set of keyword based search algorithms. It provides secure data retrieval with high efficiency. It concludes Ranked Searchable Symmetric Encrypti...
متن کاملEfficient verifiable fuzzy keyword search over encrypted data in cloud computing
As cloud computing becomes prevalent, more and more sensitive data is being centralized into the cloud by users. To maintain the confidentiality of sensitive user data against untrusted servers, the data should be encrypted before they are uploaded. However, this raises a new challenge for performing search over the encrypted data efficiently. Although the existing searchable encryption schemes...
متن کاملConjunctive Fuzzy Keyword Search Over Encrypted Data in Cloud Computing
As Cloud Computing becomes prevalent, more and more sensitive information are centralized into the cloud. For the protect data privacy, sensitive data usually have to be encrypted before outsourcing, which makes efficient data utilization a very challenging task. Although traditional searchable encryption schemes allow a user to search over encrypted data through keywords and selectively retrie...
متن کاملAttribute Based Encryption (abe) Algorithm for Searching and Securing Encrypted Data
Cloud servers are virtual servers that can be run on cloud computing environmental and it encrypts data by a common key. Due to this accessing client through server is easy. In this paper, client can encrypt, store and search data by their own key on server. If client sends encrypted queries to the server for searching, it returns the encrypted matching data without knowing about plain text. In...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2009