Ning et al., 2018 - Google Patents
Passive attacks against searchable encryptionNing et al., 2018
View PDF- Document ID
- 9242681900379736858
- Author
- Ning J
- Xu J
- Liang K
- Zhang F
- Chang E
- Publication year
- Publication venue
- IEEE Transactions on Information Forensics and Security
External Links
Snippet
Searchable encryption (SE) provides a privacy-preserving mechanism for data users to search over encrypted data stored on a remote server. Researchers have designed a number of SE schemes with high efficiency yet allowing some degree of leakage profile to …
- 238000011084 recovery 0 abstract description 55
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/30286—Information retrieval; Database structures therefor; File system structures therefor in structured data stores
- G06F17/30386—Retrieval requests
- G06F17/30424—Query processing
- G06F17/30533—Other types of queries
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6227—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database where protection concerns the structure of data, e.g. records, types, queries
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/3061—Information retrieval; Database structures therefor; File system structures therefor of unstructured textual data
- G06F17/30613—Indexing
- G06F17/30619—Indexing indexing structures
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6209—Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/3061—Information retrieval; Database structures therefor; File system structures therefor of unstructured textual data
- G06F17/30634—Querying
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/30861—Retrieval from the Internet, e.g. browsers
- G06F17/30864—Retrieval from the Internet, e.g. browsers by querying, e.g. search engines or meta-search engines, crawling techniques, push systems
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2107—File encryption
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Ning et al. | Passive attacks against searchable encryption | |
| Sun et al. | Catch you if you lie to me: Efficient verifiable conjunctive keyword search over large dynamic encrypted cloud data | |
| US11425171B2 (en) | Method and system for cryptographic attribute-based access control supporting dynamic rules | |
| Bösch et al. | A survey of provably secure searchable encryption | |
| US7395437B2 (en) | System and method for fast querying of encrypted databases | |
| Ying et al. | Reliable policy updating under efficient policy hidden fine-grained access control framework for cloud data sharing | |
| Yi et al. | Privacy-preserving user profile matching in social networks | |
| Liu et al. | Verifiable ranked search over dynamic encrypted data in cloud computing | |
| Wang et al. | Secure and efficient similarity retrieval in cloud computing based on homomorphic encryption | |
| CN104052740A (en) | Verifiable dictionary-based searchable encryption method in cloud storage | |
| Chen et al. | The power of bamboo: On the post-compromise security for searchable symmetric encryption | |
| Deng et al. | Achieving fine-grained data sharing for hierarchical organizations in clouds | |
| Peng et al. | Dynamic keyword search with hierarchical attributes in cloud computing | |
| Mei et al. | Practical multi-source multi-client searchable encryption with forward privacy: Refined security notion and new constructions | |
| Zhang et al. | Secdedup: Secure encrypted data deduplication with dynamic ownership updating | |
| Hahn et al. | Multi-key similar data search on encrypted storage with secure pay-per-query | |
| Liu et al. | A novel secure scheme for supporting complex SQL queries over encrypted databases in cloud computing | |
| Xu et al. | SPCSS: Social network based privacy-preserving criminal suspects sensing | |
| Barouti et al. | Symmetrically-private database search in cloud computing | |
| Muhammad et al. | A secure data outsourcing scheme based on Asmuth–Bloom secret sharing | |
| Qin et al. | Privacy-preserving substring search on multi-source encrypted gene data | |
| Huang et al. | An Efficient and Verifiable Encrypted Data Filtering Framework Over Large-Scale Storage in Cloud Edge | |
| Wang et al. | Beyond Access Pattern: Efficient Volume-Hiding Multi-Range Queries Over Outsourced Data Services | |
| Jiang et al. | A novel privacy preserving keyword search scheme over encrypted cloud data | |
| Ghosh et al. | Efficient verifiable range and closest point queries in zero-knowledge |