[go: up one dir, main page]

Ning et al., 2018 - Google Patents

Passive attacks against searchable encryption

Ning et al., 2018

View PDF
Document ID
9242681900379736858
Author
Ning J
Xu J
Liang K
Zhang F
Chang E
Publication year
Publication venue
IEEE Transactions on Information Forensics and Security

External Links

Snippet

Searchable encryption (SE) provides a privacy-preserving mechanism for data users to search over encrypted data stored on a remote server. Researchers have designed a number of SE schemes with high efficiency yet allowing some degree of leakage profile to …
Continue reading at www.zjuisee.zju.edu.cn (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/30Information retrieval; Database structures therefor; File system structures therefor
    • G06F17/30286Information retrieval; Database structures therefor; File system structures therefor in structured data stores
    • G06F17/30386Retrieval requests
    • G06F17/30424Query processing
    • G06F17/30533Other types of queries
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6227Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database where protection concerns the structure of data, e.g. records, types, queries
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/30Information retrieval; Database structures therefor; File system structures therefor
    • G06F17/3061Information retrieval; Database structures therefor; File system structures therefor of unstructured textual data
    • G06F17/30613Indexing
    • G06F17/30619Indexing indexing structures
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6209Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/30Information retrieval; Database structures therefor; File system structures therefor
    • G06F17/3061Information retrieval; Database structures therefor; File system structures therefor of unstructured textual data
    • G06F17/30634Querying
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/30Information retrieval; Database structures therefor; File system structures therefor
    • G06F17/30861Retrieval from the Internet, e.g. browsers
    • G06F17/30864Retrieval from the Internet, e.g. browsers by querying, e.g. search engines or meta-search engines, crawling techniques, push systems
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2107File encryption

Similar Documents

Publication Publication Date Title
Ning et al. Passive attacks against searchable encryption
Sun et al. Catch you if you lie to me: Efficient verifiable conjunctive keyword search over large dynamic encrypted cloud data
US11425171B2 (en) Method and system for cryptographic attribute-based access control supporting dynamic rules
Bösch et al. A survey of provably secure searchable encryption
US7395437B2 (en) System and method for fast querying of encrypted databases
Ying et al. Reliable policy updating under efficient policy hidden fine-grained access control framework for cloud data sharing
Yi et al. Privacy-preserving user profile matching in social networks
Liu et al. Verifiable ranked search over dynamic encrypted data in cloud computing
Wang et al. Secure and efficient similarity retrieval in cloud computing based on homomorphic encryption
CN104052740A (en) Verifiable dictionary-based searchable encryption method in cloud storage
Chen et al. The power of bamboo: On the post-compromise security for searchable symmetric encryption
Deng et al. Achieving fine-grained data sharing for hierarchical organizations in clouds
Peng et al. Dynamic keyword search with hierarchical attributes in cloud computing
Mei et al. Practical multi-source multi-client searchable encryption with forward privacy: Refined security notion and new constructions
Zhang et al. Secdedup: Secure encrypted data deduplication with dynamic ownership updating
Hahn et al. Multi-key similar data search on encrypted storage with secure pay-per-query
Liu et al. A novel secure scheme for supporting complex SQL queries over encrypted databases in cloud computing
Xu et al. SPCSS: Social network based privacy-preserving criminal suspects sensing
Barouti et al. Symmetrically-private database search in cloud computing
Muhammad et al. A secure data outsourcing scheme based on Asmuth–Bloom secret sharing
Qin et al. Privacy-preserving substring search on multi-source encrypted gene data
Huang et al. An Efficient and Verifiable Encrypted Data Filtering Framework Over Large-Scale Storage in Cloud Edge
Wang et al. Beyond Access Pattern: Efficient Volume-Hiding Multi-Range Queries Over Outsourced Data Services
Jiang et al. A novel privacy preserving keyword search scheme over encrypted cloud data
Ghosh et al. Efficient verifiable range and closest point queries in zero-knowledge