메뉴 건너뛰기




Volumn 62, Issue , 2016, Pages 66-75

Secure searches in the cloud: A survey

Author keywords

Cloud security; Cloud storage; Information retrieval; Searchable encryption; Secure keyword search

Indexed keywords

ACCESS CONTROL; DATA PRIVACY; DIGITAL STORAGE; INFORMATION RETRIEVAL; PUBLIC KEY CRYPTOGRAPHY; SEARCH ENGINES;

EID: 84958580839     PISSN: 0167739X     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.future.2016.01.007     Document Type: Article
Times cited : (53)

References (77)
  • 3
    • 79951999348 scopus 로고    scopus 로고
    • Study on cloud computing security
    • (in Chinese with English abstract)
    • [3] Feng, D., Zhang, M., Zhang, Y., Xu, Z., Study on cloud computing security. Ruan Jian Xue Bao/J. Softw. 22:1 (2011), 71–83, 10.3724/SP.J.1001.2011.03958 (in Chinese with English abstract) http://www.jos.org.cn/1000-9825/3958.htm.
    • (2011) Ruan Jian Xue Bao/J. Softw. , vol.22 , Issue.1 , pp. 71-83
    • Feng, D.1    Zhang, M.2    Zhang, Y.3    Xu, Z.4
  • 5
    • 78650065157 scopus 로고    scopus 로고
    • Security and privacy challenges in cloud computing environments
    • [5] Takabi, H., Joshi, J.B.D., Ahn, G.J., Security and privacy challenges in cloud computing environments. IEEE Secur. Priv. 8:6 (2010), 24–31.
    • (2010) IEEE Secur. Priv. , vol.8 , Issue.6 , pp. 24-31
    • Takabi, H.1    Joshi, J.B.D.2    Ahn, G.J.3
  • 6
    • 84889087663 scopus 로고    scopus 로고
    • Security and privacy for storage and computation in cloud computing
    • [6] Wei, L., Zhu, H., Cao, Z., Dong, X., Jia, W., Chen, Y., Vasilakos, A., Security and privacy for storage and computation in cloud computing. Inform. Sci. 258 (2014), 371–386.
    • (2014) Inform. Sci. , vol.258 , pp. 371-386
    • Wei, L.1    Zhu, H.2    Cao, Z.3    Dong, X.4    Jia, W.5    Chen, Y.6    Vasilakos, A.7
  • 10
    • 1942420748 scopus 로고    scopus 로고
    • Oblivious keyword search
    • [10] Ogata, W., Kurosawa, K., Oblivious keyword search. J. Complexity 20:2 (2004), 356–371.
    • (2004) J. Complexity , vol.20 , Issue.2 , pp. 356-371
    • Ogata, W.1    Kurosawa, K.2
  • 11
    • 70350649061 scopus 로고    scopus 로고
    • Predicate privacy in encryption systems
    • Springer Berlin, Heidelberg
    • [11] Shen, E., Shi, E., Waters, B., Predicate privacy in encryption systems. Theory of Cryptography, 2009, Springer, Berlin, Heidelberg, 457–473.
    • (2009) Theory of Cryptography , pp. 457-473
    • Shen, E.1    Shi, E.2    Waters, B.3
  • 13
    • 77649240581 scopus 로고    scopus 로고
    • Computing arbitrary functions of encrypted data
    • [13] Gentry, C., Computing arbitrary functions of encrypted data. Commun. ACM 53:3 (2010), 97–105.
    • (2010) Commun. ACM , vol.53 , Issue.3 , pp. 97-105
    • Gentry, C.1
  • 14
    • 85017491929 scopus 로고    scopus 로고
    • Access pattern disclosure on searchable encryption: Ramification, attack and mitigation,
    • [14] M.S. Islam, M. Kuzu, M. Kantarcioglu, Access pattern disclosure on searchable encryption: Ramification, attack and mitigation, in: NDSS. 2012, vol. 20, pp. 1–12.
    • NDSS. 2012, vol. 20, pp. 1–12.
    • Islam, M.S.1    Kuzu, M.2    Kantarcioglu, M.3
  • 15
    • 84893808472 scopus 로고    scopus 로고
    • Search pattern leakage in searchable encryption: Attacks and new construction
    • [15] Liu, C., Zhu, L., Wang, M., Tan, Y.A., Search pattern leakage in searchable encryption: Attacks and new construction. Inform. Sci. 265 (2014), 176–188.
    • (2014) Inform. Sci. , vol.265 , pp. 176-188
    • Liu, C.1    Zhu, L.2    Wang, M.3    Tan, Y.A.4
  • 16
    • 0003691180 scopus 로고    scopus 로고
    • Foundations of Cryptography: Volume 2, Basic Applications
    • Cambridge University Press
    • [16] Goldreich, O., Foundations of Cryptography: Volume 2, Basic Applications. 2009, Cambridge University Press.
    • (2009)
    • Goldreich, O.1
  • 19
    • 71549153479 scopus 로고    scopus 로고
    • A secure channel free public key encryption with keyword search scheme without random oracle
    • Springer Berlin, Heidelberg
    • [19] Fang, L., Susilo, W., Ge, C., Wang, J., A secure channel free public key encryption with keyword search scheme without random oracle. Cryptology and Network Security, 2009, Springer, Berlin, Heidelberg, 248–258.
    • (2009) Cryptology and Network Security , pp. 248-258
    • Fang, L.1    Susilo, W.2    Ge, C.3    Wang, J.4
  • 20
    • 84876842378 scopus 로고    scopus 로고
    • Public key encryption with keyword search secure against keyword guessing attacks without random oracle
    • [20] Fang, L., Susilo, W., Ge, C., Wang, J., Public key encryption with keyword search secure against keyword guessing attacks without random oracle. Inform. Sci. 238 (2013), 221–241.
    • (2013) Inform. Sci. , vol.238 , pp. 221-241
    • Fang, L.1    Susilo, W.2    Ge, C.3    Wang, J.4
  • 21
    • 77649179760 scopus 로고    scopus 로고
    • Trapdoor security in a searchable public-key encryption scheme with a designated tester
    • [21] Rhee, H.S., Park, J.H., Susilo, W., Lee, D.H., Trapdoor security in a searchable public-key encryption scheme with a designated tester. J. Syst. Softw. 83:5 (2010), 763–771.
    • (2010) J. Syst. Softw. , vol.83 , Issue.5 , pp. 763-771
    • Rhee, H.S.1    Park, J.H.2    Susilo, W.3    Lee, D.H.4
  • 23
    • 80052365107 scopus 로고    scopus 로고
    • A secure searchable public key encryption scheme with a designated tester against keyword guessing attacks and its extension
    • Springer Berlin, Heidelberg
    • [23] Hu, C., Liu, P., A secure searchable public key encryption scheme with a designated tester against keyword guessing attacks and its extension. Advances in Computer Science, Environment, Ecoinformatics, and Education, 2011, Springer, Berlin, Heidelberg, 131–136.
    • (2011) Advances in Computer Science, Environment, Ecoinformatics, and Education , pp. 131-136
    • Hu, C.1    Liu, P.2
  • 24
    • 84884892085 scopus 로고    scopus 로고
    • Public-key encryption with fuzzy keyword search: A provably secure scheme under keyword guessing attack
    • [24] Xu, P., Jin, H., Wu, Q., Wang, W., Public-key encryption with fuzzy keyword search: A provably secure scheme under keyword guessing attack. IEEE Trans. Comput. 62:11 (2012), 2266–2277.
    • (2012) IEEE Trans. Comput. , vol.62 , Issue.11 , pp. 2266-2277
    • Xu, P.1    Jin, H.2    Wu, Q.3    Wang, W.4
  • 25
    • 84893869941 scopus 로고    scopus 로고
    • A function private attribute-based encryption
    • [25] Han, F., Qin, J., A function private attribute-based encryption. Int. J. Distrib. Sens. Netw. 2014 (2014), 1–5.
    • (2014) Int. J. Distrib. Sens. Netw. , vol.2014 , pp. 1-5
    • Han, F.1    Qin, J.2
  • 26
    • 84884473483 scopus 로고    scopus 로고
    • Function-private identity-based encryption: Hiding the function in functional encryption,
    • [26] D. Boneh, A. Raghunathan, G. Segev, Function-private identity-based encryption: Hiding the function in functional encryption, in: Advances in Cryptology, CRYPTO, 2013, vol. 13, pp. 461–478.
    • (2013) Advances in Cryptology, CRYPTO
    • Boneh, D.1    Raghunathan, A.2    Segev, G.3
  • 27
    • 84893134547 scopus 로고    scopus 로고
    • Efficient public key encryption with revocable keyword search
    • [27] Yu, Y., Ni, J., Yang, H., Mu, Y., Susilo, W., Efficient public key encryption with revocable keyword search. Secur. Commun. Netw. 7:2 (2013), 466–472.
    • (2013) Secur. Commun. Netw. , vol.7 , Issue.2 , pp. 466-472
    • Yu, Y.1    Ni, J.2    Yang, H.3    Mu, Y.4    Susilo, W.5
  • 32
    • 26444507272 scopus 로고    scopus 로고
    • Privacy preserving keyword searches on remote encrypted data
    • Springer Berlin, Heidelberg
    • [32] Chang, Y.C., Mitzenmacher, M., Privacy preserving keyword searches on remote encrypted data. Applied Cryptography and Network Security, 2005, Springer, Berlin, Heidelberg, 442–455.
    • (2005) Applied Cryptography and Network Security , pp. 442-455
    • Chang, Y.C.1    Mitzenmacher, M.2
  • 34
    • 33745120364 scopus 로고    scopus 로고
    • Secure conjunctive keyword search over encrypted data
    • Springer Berlin, Heidelberg
    • [34] Golle, P., Staddon, J., Waters, B., Secure conjunctive keyword search over encrypted data. Applied Cryptography and Network Security, 2004, Springer, Berlin, Heidelberg, 31–45.
    • (2004) Applied Cryptography and Network Security , pp. 31-45
    • Golle, P.1    Staddon, J.2    Waters, B.3
  • 35
    • 79960850152 scopus 로고    scopus 로고
    • Privacy-preserving multi-keyword ranked search over encrypted cloud data
    • IEEE
    • [35] Cao, N., Wang, C., Li, M., Ren, K., Lou, W., Privacy-preserving multi-keyword ranked search over encrypted cloud data. INFOCOM, 2011 Proceedings IEEE, 2011, IEEE, 829–837.
    • (2011) INFOCOM, 2011 Proceedings IEEE , pp. 829-837
    • Cao, N.1    Wang, C.2    Li, M.3    Ren, K.4    Lou, W.5
  • 37
    • 84863511940 scopus 로고    scopus 로고
    • Enabling secure and efficient ranked keyword search over outsourced cloud data
    • [37] Wang, C., Cao, N., Ren, K., Lou, W., Enabling secure and efficient ranked keyword search over outsourced cloud data. IEEE Trans. Parallel Distrib. Syst. 23:8 (2012), 1467–1479.
    • (2012) IEEE Trans. Parallel Distrib. Syst. , vol.23 , Issue.8 , pp. 1467-1479
    • Wang, C.1    Cao, N.2    Ren, K.3    Lou, W.4
  • 38
    • 84908108453 scopus 로고    scopus 로고
    • Verifiable Privacy-preserving multi-keyword text search in the cloud supporting similarity-based ranking
    • [38] Sun, W., Cao, N., Li, M., Lou, W., Hou, Y.T., Li, H., Verifiable Privacy-preserving multi-keyword text search in the cloud supporting similarity-based ranking. IEEE Trans. Parallel Distrib. Syst. 25:11 (2014), 3025–3035.
    • (2014) IEEE Trans. Parallel Distrib. Syst. , vol.25 , Issue.11 , pp. 3025-3035
    • Sun, W.1    Cao, N.2    Li, M.3    Lou, W.4    Hou, Y.T.5    Li, H.6
  • 40
    • 84949627772 scopus 로고    scopus 로고
    • Parallel search over encrypted data under attribute based encryption on the cloud computing
    • [40] Bouabana-Tebibel, T., Kaci, A., Parallel search over encrypted data under attribute based encryption on the cloud computing. Comput. Secur., 2015, 10.1016/j.cose.2015.04.007.
    • (2015) Comput. Secur.
    • Bouabana-Tebibel, T.1    Kaci, A.2
  • 42
    • 38049045519 scopus 로고    scopus 로고
    • Conjunctive, subset, and range queries on encrypted data
    • Springer Berlin, Heidelberg
    • [42] Boneh, D., Waters, B., Conjunctive, subset, and range queries on encrypted data. Theory of Cryptography, 2007, Springer, Berlin, Heidelberg, 535–554.
    • (2007) Theory of Cryptography , pp. 535-554
    • Boneh, D.1    Waters, B.2
  • 44
    • 80052002672 scopus 로고    scopus 로고
    • Order-preserving encryption revisited: Improved security analysis and alternative solutions
    • Springer Berlin, Heidelberg
    • [44] Boldyreva, A., Chenette, N., O'Neill, A., Order-preserving encryption revisited: Improved security analysis and alternative solutions. Advances in Cryptology, CRYPTO 2011, 2011, Springer, Berlin, Heidelberg, 578–595.
    • (2011) Advances in Cryptology, CRYPTO 2011 , pp. 578-595
    • Boldyreva, A.1    Chenette, N.2    O'Neill, A.3
  • 48
    • 84878119000 scopus 로고    scopus 로고
    • Efficient verifiable fuzzy keyword search over encrypted data in cloud computing
    • [48] Wang, J., Ma, H., Tang, Q., Li, J., Zhu, H., Ma, S., Chen, X., Efficient verifiable fuzzy keyword search over encrypted data in cloud computing. Comput. Sci. Inf. Syst. 10:2 (2013), 667–684.
    • (2013) Comput. Sci. Inf. Syst. , vol.10 , Issue.2 , pp. 667-684
    • Wang, J.1    Ma, H.2    Tang, Q.3    Li, J.4    Zhu, H.5    Ma, S.6    Chen, X.7
  • 49
    • 84904421834 scopus 로고    scopus 로고
    • Privacy-preserving multi-keyword fuzzy search over encrypted data in the cloud
    • IEEE
    • [49] Wang, B., Yu, S., Lou, W., Hou, Y.T., Privacy-preserving multi-keyword fuzzy search over encrypted data in the cloud. INFOCOM, 2014 Proceedings IEEE, 2014, IEEE, 2112–2120.
    • (2014) INFOCOM, 2014 Proceedings IEEE , pp. 2112-2120
    • Wang, B.1    Yu, S.2    Lou, W.3    Hou, Y.T.4
  • 50
    • 78649836731 scopus 로고    scopus 로고
    • Computationally efficient searchable symmetric encryption
    • Springer Berlin, Heidelberg
    • [50] Van Liesdonk, P., Sedghi, S., Doumen, J., Hartel, P., Jonker, W., Computationally efficient searchable symmetric encryption. Secure Data Management, 2010, Springer, Berlin, Heidelberg, 87–100.
    • (2010) Secure Data Management , pp. 87-100
    • Van Liesdonk, P.1    Sedghi, S.2    Doumen, J.3    Hartel, P.4    Jonker, W.5
  • 52
    • 84883285558 scopus 로고    scopus 로고
    • Parallel and dynamic searchable symmetric encryption
    • Springer Berlin, Heidelberg
    • [52] Kamara, S., Papamanthou, C., Parallel and dynamic searchable symmetric encryption. Financial Cryptography and Data Security, 2013, Springer, Berlin, Heidelberg, 258–274.
    • (2013) Financial Cryptography and Data Security , pp. 258-274
    • Kamara, S.1    Papamanthou, C.2
  • 54
    • 84871978542 scopus 로고    scopus 로고
    • Verifiable symmetric searchable encryption for semi-honest-but-curious cloud servers
    • IEEE
    • [54] Chai, Q., Gong, G., Verifiable symmetric searchable encryption for semi-honest-but-curious cloud servers. 2012 IEEE International Conference on Communications, ICC, 2012, IEEE, 917–922.
    • (2012) 2012 IEEE International Conference on Communications, ICC , pp. 917-922
    • Chai, Q.1    Gong, G.2
  • 55
    • 84865817216 scopus 로고    scopus 로고
    • UC-secure searchable symmetric encryption
    • Springer Berlin, Heidelberg
    • [55] Kurosawa, K., Ohtaki, Y., UC-secure searchable symmetric encryption. Financial Cryptography and Data Security, 2012, Springer, Berlin, Heidelberg, 285–298.
    • (2012) Financial Cryptography and Data Security , pp. 285-298
    • Kurosawa, K.1    Ohtaki, Y.2
  • 56
    • 0020277962 scopus 로고
    • Multidimensional B-trees for associative searching in database systems
    • [56] Scheuermann, P., Ouksel, M., Multidimensional B-trees for associative searching in database systems. Inform. Syst. 7:2 (1982), 123–137.
    • (1982) Inform. Syst. , vol.7 , Issue.2 , pp. 123-137
    • Scheuermann, P.1    Ouksel, M.2
  • 57
    • 70350407157 scopus 로고    scopus 로고
    • Privacy-aware attribute-based encryption with user accountability
    • Springer Berlin, Heidelberg
    • [57] Li, J., Ren, K., Zhu, B., Wan, Z., Privacy-aware attribute-based encryption with user accountability. Information Security, 2009, Springer, Berlin, Heidelberg, 347–362.
    • (2009) Information Security , pp. 347-362
    • Li, J.1    Ren, K.2    Zhu, B.3    Wan, Z.4
  • 59
    • 84958846385 scopus 로고    scopus 로고
    • Oblivious fuzzy keyword search based on blind GDH signature
    • [59] Han, F., Qin, J., Oblivious fuzzy keyword search based on blind GDH signature. Comput. Sci. Appl. 3 (2013), 127–133.
    • (2013) Comput. Sci. Appl. , vol.3 , pp. 127-133
    • Han, F.1    Qin, J.2
  • 61
    • 33750199090 scopus 로고    scopus 로고
    • Oblivious polynomial evaluation
    • [61] Naor, M., Pinkas, B., Oblivious polynomial evaluation. SIAM J. Comput. 35:5 (2006), 1254–1281.
    • (2006) SIAM J. Comput. , vol.35 , Issue.5 , pp. 1254-1281
    • Naor, M.1    Pinkas, B.2
  • 62
    • 24144488603 scopus 로고    scopus 로고
    • Keyword search and oblivious pseudorandom functions
    • Springer Berlin, Heidelberg
    • [62] Freedman, M.J., Ishai, Y., Pinkas, B., Reingold, O., Keyword search and oblivious pseudorandom functions. Theory of Cryptography, 2005, Springer, Berlin, Heidelberg, 303–324.
    • (2005) Theory of Cryptography , pp. 303-324
    • Freedman, M.J.1    Ishai, Y.2    Pinkas, B.3    Reingold, O.4
  • 63
    • 78449236216 scopus 로고    scopus 로고
    • Public-key encryption with registered keyword search
    • Springer Berlin, Heidelberg
    • [63] Tang, Q., Chen, L., Public-key encryption with registered keyword search. Public Key Infrastructures, Services and Applications, 2010, Springer, Berlin, Heidelberg, 163–178.
    • (2010) Public Key Infrastructures, Services and Applications , pp. 163-178
    • Tang, Q.1    Chen, L.2
  • 65
    • 84957718934 scopus 로고    scopus 로고
    • Divertible protocols and atomic proxy cryptography
    • Springer Berlin, Heidelberg
    • [65] Blaze, M., Bleumer, G., Strauss, M., Divertible protocols and atomic proxy cryptography. Advances in Cryptology, EUROCRYPT’98, 1998, Springer, Berlin, Heidelberg, 127–144.
    • (1998) Advances in Cryptology, EUROCRYPT’98 , pp. 127-144
    • Blaze, M.1    Bleumer, G.2    Strauss, M.3
  • 66
    • 77950864045 scopus 로고    scopus 로고
    • Proxy re-encryption with keyword search
    • [66] Shao, J., Cao, Z., Liang, X., Lin, H., Proxy re-encryption with keyword search. Inform. Sci. 180:13 (2010), 2576–2587.
    • (2010) Inform. Sci. , vol.180 , Issue.13 , pp. 2576-2587
    • Shao, J.1    Cao, Z.2    Liang, X.3    Lin, H.4
  • 67
    • 50249137692 scopus 로고    scopus 로고
    • Shared and searchable encrypted data for untrusted servers
    • Springer Berlin, Heidelberg
    • [67] Dong, C., Russello, G., Dulay, N., Shared and searchable encrypted data for untrusted servers. Data and Applications Security XXII, 2008, Springer, Berlin, Heidelberg, 127–143.
    • (2008) Data and Applications Security XXII , pp. 127-143
    • Dong, C.1    Russello, G.2    Dulay, N.3
  • 68
    • 38149068986 scopus 로고    scopus 로고
    • Deterministic and efficiently searchable encryption
    • Springer Berlin, Heidelberg
    • [68] Bellare, M., Boldyreva, A., O'Neill, A., Deterministic and efficiently searchable encryption. Advances in Cryptology, CRYPTO 2007, 2007, Springer, Berlin, Heidelberg, 535–552.
    • (2007) Advances in Cryptology, CRYPTO 2007 , pp. 535-552
    • Bellare, M.1    Boldyreva, A.2    O'Neill, A.3
  • 69
    • 24944554962 scopus 로고    scopus 로고
    • Fuzzy identity-based encryption
    • Springer Berlin, Heidelberg
    • [69] Sahai, A., Waters, B., Fuzzy identity-based encryption. Advances in Cryptology, EUROCRYPT 2005, 2005, Springer, Berlin, Heidelberg, 457–473.
    • (2005) Advances in Cryptology, EUROCRYPT 2005 , pp. 457-473
    • Sahai, A.1    Waters, B.2
  • 72
    • 79952521560 scopus 로고    scopus 로고
    • Ciphertext-policy attribute-based encryption: An expressive, efficient, and provably secure realization
    • Springer Berlin, Heidelberg
    • [72] Waters, B., Ciphertext-policy attribute-based encryption: An expressive, efficient, and provably secure realization. Public Key Cryptography, PKC 2011, 2011, Springer, Berlin, Heidelberg, 53–70.
    • (2011) Public Key Cryptography, PKC 2011 , pp. 53-70
    • Waters, B.1
  • 73
    • 84888344018 scopus 로고    scopus 로고
    • A general transformation from KP-ABE to searchable encryption
    • [73] Han, F., Qin, J., Zhao, H., Hu, J., A general transformation from KP-ABE to searchable encryption. Future Gener. Comput. Syst. 30 (2014), 107–115.
    • (2014) Future Gener. Comput. Syst. , vol.30 , pp. 107-115
    • Han, F.1    Qin, J.2    Zhao, H.3    Hu, J.4
  • 74
    • 84905743312 scopus 로고    scopus 로고
    • An efficient PHR service system supporting fuzzy keyword search and fine-grained access control
    • [74] Xhafa, F., Wang, J., Chen, X., Liu, J.K., Li, J., Krause, P., An efficient PHR service system supporting fuzzy keyword search and fine-grained access control. Soft Comput. 18:9 (2014), 1795–1802.
    • (2014) Soft Comput. , vol.18 , Issue.9 , pp. 1795-1802
    • Xhafa, F.1    Wang, J.2    Chen, X.3    Liu, J.K.4    Li, J.5    Krause, P.6
  • 75
    • 84894047012 scopus 로고    scopus 로고
    • Sesa: an efficient searchable encryption scheme for auction in emerging smart grid marketing
    • [75] Wen, M., Lu, R., Lei, J., Li, H., Liang, X., Shen, X.S., Sesa: an efficient searchable encryption scheme for auction in emerging smart grid marketing. Secur. Commun. Netw. 7:1 (2014), 234–244.
    • (2014) Secur. Commun. Netw. , vol.7 , Issue.1 , pp. 234-244
    • Wen, M.1    Lu, R.2    Lei, J.3    Li, H.4    Liang, X.5    Shen, X.S.6
  • 77
    • 80051914330 scopus 로고    scopus 로고
    • Privacy preserving query over encrypted graph structured data in cloud computing,
    • [77] N. Cao, Z. Yang, C. Wang, K. Ren, W. Lou, Privacy preserving query over encrypted graph structured data in cloud computing, in: ICDCS’11, 2011, pp. 393–402.
    • (2011) ICDCS’11 , pp. 393-402
    • Cao, N.1    Yang, Z.2    Wang, C.3    Ren, K.4    Lou, W.5


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.