Please use this identifier to cite or link to this item:
https://idr.l4.nitk.ac.in/jspui/handle/123456789/13949
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Siva Kumar D.V.N. | - |
dc.contributor.author | Santhi Thilagam, P. | - |
dc.date.accessioned | 2020-03-31T14:22:10Z | - |
dc.date.available | 2020-03-31T14:22:10Z | - |
dc.date.issued | 2019 | - |
dc.identifier.citation | Information Systems, 2019, Vol.81, , pp.63-81 | en_US |
dc.identifier.uri | 10.1016/j.is.2018.11.004 | - |
dc.identifier.uri | https://idr.nitk.ac.in/jspui/handle/123456789/13949 | - |
dc.description.abstract | More and more data owners are encouraged to outsource their data onto cloud servers for reducing infrastructure, maintenance cost and also to get ubiquitous access to their stored data. However, security is one issue that discourages data owners from adopting cloud servers for data storage. Searchable Encryption (SE) is one of the few ways of assuring privacy and confidentiality of such data by storing them in encrypted form at the cloud servers. SE enables the data owners and users to search over encrypted data through trapdoors. Most of the user information requirements are fulfilled either through Boolean or Ranked search approaches. This paper aims at understanding how the confidentiality and privacy of information can be guaranteed while processing single and multi-keyword queries over encrypted data using Boolean and Ranked search approaches. This paper presents all possible leakages that happen in SE and also specifies which privacy preserving approach to be adopted in SE schemes to prevent those leakages to help the practitioners and researchers to design and implement secure searchable encryption systems. It also highlights various application scenarios where SE could be utilized. This paper also explores the research challenges and open problems that need to be focused in future. © 2018 Elsevier Ltd | en_US |
dc.title | Approaches and challenges of privacy preserving search over encrypted data | en_US |
dc.type | Review | en_US |
Appears in Collections: | 5. Miscellaneous Publications |
Files in This Item:
There are no files associated with this item.
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.