Change search
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf
A survey on design and implementation of protected searchable data in the cloud
Aarhus University, Denmark.
University of Westminster, UK.
Karlsruhe Institute of Technology, Germany.
RISE - Research Institutes of Sweden (2017-2019), ICT, SICS.ORCID iD: 0000-0003-0132-857x
2017 (English)In: Computer Science Review, ISSN 1574-0137, E-ISSN 1876-7745, Vol. 26, p. 17-30Article in journal (Refereed) Published
Abstract [en]

While cloud computing has exploded in popularity in recent years thanks to the potential efficiency and cost savings of outsourcing the storage and management of data and applications, a number of vulnerabilities that led to multiple attacks have deterred many potential users. As a result, experts in the field argued that new mechanisms are needed in order to create trusted and secure cloud services. Such mechanisms would eradicate the suspicion of users towards cloud computing by providing the necessary security guarantees. Searchable Encryption is among the most promising solutions—one that has the potential to help offer truly secure and privacy-preserving cloud services. We start this paper by surveying the most important searchable encryption schemes and their relevance to cloud computing. In light of this analysis we demonstrate the inefficiencies of the existing schemes and expand our analysis by discussing certain confidentiality and privacy issues. Further, we examine how to integrate such a scheme with a popular cloud platform. Finally, we have chosen – based on the findings of our analysis – an existing scheme and implemented it to review its practical maturity for deployment in real systems. The survey of the field, together with the analysis and with the extensive experimental results provides a comprehensive review of the theoretical and practical aspects of searchable encryption.

Place, publisher, year, edition, pages
2017. Vol. 26, p. 17-30
Keywords [en]
Cloud computing, Cloud storage, Searchable encryption, Security, Data privacy, Digital storage, Distributed database systems, Information management, Network function virtualization, Outsourcing, Surveys, Web services, Cloud platforms, Cloud services, Cloud storages, Design and implementations, Potential efficiency, Privacy preserving, Searchable encryptions, Cryptography
National Category
Natural Sciences
Identifiers
URN: urn:nbn:se:ri:diva-33201DOI: 10.1016/j.cosrev.2017.08.001Scopus ID: 2-s2.0-85028031885OAI: oai:DiVA.org:ri-33201DiVA, id: diva2:1179236
Available from: 2018-01-31 Created: 2018-01-31 Last updated: 2025-09-23Bibliographically approved

Open Access in DiVA

fulltext(287 kB)152 downloads
File information
File name FULLTEXT01.pdfFile size 287 kBChecksum SHA-512
141e81aeda687741854b7b39d255ddee7e1cd0d43de6316a9be4be6bc76114e152745cb0e1260f2a6f47ec3c6d6194281a47a1b3e2d2c756e3e778024584be4b
Type fulltextMimetype application/pdf

Other links

Publisher's full textScopus

Authority records

Paladi, Nicolae

Search in DiVA

By author/editor
Paladi, Nicolae
By organisation
SICS
In the same journal
Computer Science Review
Natural Sciences

Search outside of DiVA

GoogleGoogle Scholar
Total: 152 downloads
The number of downloads is the sum of all downloads of full texts. It may include eg previous versions that are now no longer available

doi
urn-nbn

Altmetric score

doi
urn-nbn
Total: 241 hits
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf