通信与信息网络学报 ›› 2016, Vol. 1 ›› Issue (4): 52-65.doi: 10.11959/j.issn.2096-1081.2016.043

• • 上一篇    下一篇

  

  • 修回日期:2016-11-25 出版日期:2016-12-25 发布日期:2019-07-19

Secure searchable encryption: a survey

Yunling WANG1(),Jianfeng WANG1,2(),Xiaofeng CHEN1()   

  1. 1 State Key Laboratory of Integrated Service Networks (ISN), Xidian University, Xian 710071, China
    2 Guangxi Cooperative Innovation Center of Cloud Computing and Big Data, Guilin University of Electronic Technology, Guilin 541004, China
  • Revised:2016-11-25 Online:2016-12-25 Published:2019-07-19
  • About author:WANG Yunling received a masters degree in electronics and communication engineering from Xidian University, China, in 2015. She is now a Ph. D. candidate in the area of cryptography at Xidian University, China. Her research interests include cloud computing and applied cryptography.|WANG Jianfeng received an M. S. degree in mathematics and a Ph. D. degree in cryptography from Xidian University, in 2013 and 2016, respectively. He currently works at Xidian University. His research interests include applied cryptography and secure outsourced storage.|CHEN Xiaofeng received B. S. and M. S. degrees in mathematics from Northwest University, Xi’an, China, in 1998 and 2000, respectively, and a Ph. D. degree in cryptography from Xidian University, Xi’an, in 2003, where he is currently a Professor. His research interests include applied cryptography and cloud computing security. He has authored over 100 research papers in refereed international conferences and journals. His work has been cited over 5 300 times in Google scholar. He is on the editorial board of IEEE Transactions on dependable and secure computing security and communication networks, telecommunication systems, etc. He has served as the program/general chair or a program committee member for over 30 international conferences.
  • Supported by:
    Guangxi Cooperative Innovation Center of Cloud Computing and Big Data(YD16506)

Abstract:

Cloud computing facilitates convenient and on-demand network access to a centralized pool of resources. Currently, many users prefer to outsource data to the cloud in order to mitigate the burden of local storage. However, storing sensitive data on remote servers poses privacy challenges and is currently a source of concern. SE (Searchable Encryption) is a positive way to protect users sensitive data, while preserving search ability on the server side. SE allows the server to search encrypted data without leaking information in plaintext data. The two main branches of SE are SSE (Searchable Symmetric Encryption) and PEKS (Public key Encryption with Keyword Search). SSE allows only private key holders to produce ciphertexts and to create trapdoors for search, whereas PEKS enables a number of users who know the public key to produce ciphertexts but allows only the private key holder to create trapdoors. This article surveys the two main techniques of SE: SSE and PEKS. Different SE schemes are categorized and compared in terms of functionality, efficiency, and security. Moreover, we point out some valuable directions for future work on SE schemes.

Key words: cloud storage, encrypted data, searchable encryption, searchable symmetric encryption, public key encryption with keyword search

[1] 赵 方,马 严,罗海勇,林 权. 基于顽健估计的室内节点定位算法[J]. 通信学报, 2008, 29(11): 15 -120 .
[2] 刘林峰,刘业. 基于满Steiner树问题的水下无线传感器网络拓扑愈合算法研究[J]. 通信学报, 2010, 0(9): 9 -37 .
[3] 党军宏,晏 坚,曹志刚. 基于OFDM星载交换的星地上行链路跨层设计算法[J]. 通信学报, 2010, 0(9): 7 -117 .
[4] 牛建伟,郭锦铠,刘燕,童超. 基于移动预测的高效机会网络路由算法[J]. 通信学报, 2010, 31(9A): 11 -80 .
[5] 刘青格,邵定蓉,李署坚. 从素数码到级联素数码[J]. 通信学报, 2007, 28(4): 19 -127 .
[6] 周 航,阮秋琦. 基于ROI分割和相干映射的裸手字母手势识别[J]. 通信学报, 2007, 28(5): 15 .
[7] 刘 武,段海新,张 洪,吴建平. 基于信任的P2P网络安全管理体系结构研究[J]. 通信学报, 2008, 29(11A): 3 -16 .
[8] 何晓明,冀晖,毛东峰,唐宏. 电信IP网向SDN演进的探讨[J]. 电信科学, 2014, 30(6): 131 -137 .
[9] 程东年,汪斌强,王保进,张建辉. 网络结构自调整的柔性内涵初探[J]. 通信学报, 2012, 33(8): 26 -222 .
[10] 张 霞,马连川,曹 源,张玉琢. CTCS-3级GSM-R车地通信数据丢失概率及其影响的研究[J]. 通信学报, 2014, 35(12): 24 -209 .