scispace - formally typeset
Journal ArticleDOI

Searchable Symmetric Encryption: Designs and Challenges

Reads0
Chats0
TLDR
This work seeks to address the gap in detail how SSE’s underlying structures are designed and how these result in the many properties of a SSE scheme, as well as presenting recent state-of-the-art advances on SSE.
Abstract
Searchable Symmetric Encryption (SSE) when deployed in the cloud allows one to query encrypted data without the risk of data leakage. Despite the widespread interest, existing surveys do not examine in detail how SSE’s underlying structures are designed and how these result in the many properties of a SSE scheme. This is the gap we seek to address, as well as presenting recent state-of-the-art advances on SSE. Specifically, we present a general framework and believe the discussions may lead to insights for potential new designs. We draw a few observations. First, most schemes use index table, where optimal index size and sublinear search can be achieved using an inverted index. Straightforward updating can only be achieved using direct index, but search time would be linear. A recent trend is the combinations of index table, and tree, deployed for efficient updating and storage. Secondly, mechanisms from related fields such as Oblivious RAM (ORAM) have been integrated to reduce leakages. However, using these mechanisms to minimise leakages in schemes with richer functionalities (e.g., ranked, range) is relatively unexplored. Thirdly, a new approach (e.g., multiple servers) is required to mitigate new and emerging attacks on leakage. Lastly, we observe that a proposed index may not be practically efficient when implemented, where I/O access must be taken into consideration.

read more

Citations
More filters
Journal ArticleDOI

Blockchain: A Panacea for Healthcare Cloud-Based Data Security and Privacy?

TL;DR: The potential to use the Blockchain technology to protect healthcare data hosted within the cloud and the practical challenges of such a proposition are described and further research is described.
Journal ArticleDOI

Blockchain based searchable encryption for electronic health record sharing

TL;DR: A blockchain based searchable encryption scheme for EHRs is proposed that ensures the integrity, anti-tampering, and traceability of EHR’s’ index as only the index is migrated to the blockchain to facilitate propagation.
Journal ArticleDOI

Blockchain Meets Cloud Computing: A Survey

TL;DR: This survey addresses the issue of how blockchain technology inserts into current deployed cloud solutions and enables the reengineering of cloud datacenter, and investigates recent efforts in the technical fusion of blockchain and clouds.
Journal ArticleDOI

Blend Arithmetic Operations on Tensor-Based Fully Homomorphic Encryption Over Real Numbers

TL;DR: This paper provides both theoretical proof and experimental evaluations in order to evince the adoptability of the proposed approach, called a FHE for blend operations model that uses tensor laws to carry the computations of blend arithmetic operations over real numbers.
Journal ArticleDOI

A Review of Secure and Privacy-Preserving Medical Data Sharing

TL;DR: This paper surveys the state-of-the-art schemes on secure and privacy-preserving medical data sharing of the past decade with a focus on blockchain-based approaches and classifies them into permissionlessblockchain-based approach and permissioned blockchain- based approaches and analyzes their advantages and disadvantages.
References
More filters
Journal ArticleDOI

Space/time trade-offs in hash coding with allowable errors

TL;DR: Analysis of the paradigm problem demonstrates that allowing a small number of test messages to be falsely identified as members of the given set will permit a much smaller hash area to be used without increasing reject time.
Proceedings ArticleDOI

Fully homomorphic encryption using ideal lattices

TL;DR: This work proposes a fully homomorphic encryption scheme that allows one to evaluate circuits over encrypted data without being able to decrypt, and describes a public key encryption scheme using ideal lattices that is almost bootstrappable.
Proceedings ArticleDOI

Approximate nearest neighbors: towards removing the curse of dimensionality

TL;DR: In this paper, the authors present two algorithms for the approximate nearest neighbor problem in high-dimensional spaces, for data sets of size n living in R d, which require space that is only polynomial in n and d.
Proceedings Article

Similarity Search in High Dimensions via Hashing

TL;DR: Experimental results indicate that the novel scheme for approximate similarity search based on hashing scales well even for a relatively large number of dimensions, and provides experimental evidence that the method gives improvement in running time over other methods for searching in highdimensional spaces based on hierarchical tree decomposition.
Proceedings ArticleDOI

Practical techniques for searches on encrypted data

TL;DR: This work describes the cryptographic schemes for the problem of searching on encrypted data and provides proofs of security for the resulting crypto systems, and presents simple, fast, and practical algorithms that are practical to use today.
Related Papers (5)