A Survey on Searchable Symmetric Encryption

被引:1
|
作者
Li, Feng [1 ]
Ma, Jianfeng [1 ]
Miao, Yinbin [1 ]
Liu, Ximeng [2 ,5 ]
Ning, Jianting [3 ,6 ]
Deng, Robert H. [4 ,7 ]
机构
[1] Xidian Univ, Sch Cyber Engn, 2 South Taibai Rd, Xian 710071, Shaanxi, Peoples R China
[2] Fuzhou Univ, Sch Math & Comp Sci, Fuzhou, Peoples R China
[3] Fujian Normal Univ, Sch Math & Informat, Fujian Prov Key Lab Network Secur & Cryptol, Fujian, Peoples R China
[4] Singapore Management Univ, Sch Informat Syst, Singapore, Singapore
[5] Fuzhou Univ, Coll Software, Coll Comp & Data Sci, 2 Wulongjiang North Ave, Fuzhou 350108, Fujian, Peoples R China
[6] Fujian Normal Univ, Coll Comp & Cyber Secur, 8 Xuefu South Rd, Fuzhou 350117, Fujian, Peoples R China
[7] Singapore Management Univ, Sch Comp & Informat Syst, 80 Stamford Rd, Singapore 178902, Singapore
基金
中国国家自然科学基金;
关键词
Searchable encryption; privacy-preserving; cloud security; KEYWORD RANKED SEARCH; CLOUD DATA; ENABLING EFFICIENT; SECURE; EXTENSION; QUERIES; ATTACKS; SCHEME;
D O I
10.1145/3617991
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Outsourcing data to the cloud has become prevalent, so Searchable Symmetric Encryption (SSE), one of the methods for protecting outsourced data, has arisen widespread interest. Moreover, many novel technologies and theories have emerged, especially for the attacks on SSE and privacy-preserving. But most surveys related to SSE concentrate on one aspect (e.g., single keyword search, fuzzy keyword search) or lack in-depth analysis. Therefore, we revisit the existing work and conduct a comprehensive analysis and summary. We provide an overview of state-of-the-art in SSE and focus on the privacy it can protect. Generally, (1) we study the work of the past few decades and classify SSE based on query expressiveness. Meanwhile, we summarize the existing schemes and analyze their performance on efficiency, storage space, index structures, and so on.; (2) we complement the gap in the privacy of SSE and introduce in detail the attacks and the related defenses; (3) we discuss the open issues and challenges in existing schemes and future research directions. We desire that our work will help novices to grasp and understand SSE comprehensively. We expect it can inspire the SSE community to discover more crucial leakages and design more efficient and secure constructions.
引用
收藏
页数:42
相关论文
共 50 条
  • [1] A Survey of Symmetric Searchable Encryption in Cloud Environment
    Huang, Yicai
    Li, Sensen
    Yu, Bin
    [J]. JOURNAL OF ELECTRONICS & INFORMATION TECHNOLOGY, 2023, 45 (03) : 1134 - 1146
  • [2] Dynamic Searchable Symmetric Encryption with Forward and Backward Privacy: A Survey
    Gan, Qingqing
    Zuo, Cong
    Wang, Jianfeng
    Sun, Shi-Feng
    Wang, Xiaoming
    [J]. NETWORK AND SYSTEM SECURITY, NSS 2019, 2019, 11928 : 37 - 52
  • [3] Distributed Searchable Symmetric Encryption
    Bosch, Christoph
    Peter, Andreas
    Leenders, Bram
    Lim, Hoon Wei
    Tang, Qiang
    Wang, Huaxiong
    Hartel, Pieter
    Jonker, Willem
    [J]. 2014 TWELFTH ANNUAL INTERNATIONAL CONFERENCE ON PRIVACY, SECURITY AND TRUST (PST), 2014, : 330 - 337
  • [4] Research on Searchable Symmetric Encryption
    Wang, Yunling
    Chen, Xiaofeng
    [J]. Dianzi Yu Xinxi Xuebao/Journal of Electronics and Information Technology, 2020, 42 (10): : 2374 - 2385
  • [5] Research on Searchable Symmetric Encryption
    Wang Yunling
    Chen Xiaofeng
    [J]. JOURNAL OF ELECTRONICS & INFORMATION TECHNOLOGY, 2020, 42 (10) : 2374 - 2385
  • [6] Deniable Searchable Symmetric Encryption
    Li, Huige
    Zhang, Fangguo
    Fan, Chun-I
    [J]. INFORMATION SCIENCES, 2017, 402 : 233 - 243
  • [7] Rethinking Searchable Symmetric Encryption
    Gui, Zichen
    Paterson, Kenneth G.
    Patranabis, Sikhar
    [J]. 2023 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, SP, 2023, : 1401 - 1418
  • [8] The Locality of Searchable Symmetric Encryption
    Cash, David
    Tessaro, Stefano
    [J]. ADVANCES IN CRYPTOLOGY - EUROCRYPT 2014, 2014, 8441 : 351 - 368
  • [9] Garbled Searchable Symmetric Encryption
    Kurosawa, Kaoru
    [J]. FINANCIAL CRYPTOGRAPHY AND DATA SECURITY, FC 2014, 2014, 8437 : 234 - 251
  • [10] Searchable encryption : A survey
    Sharma, Dhruti
    [J]. INFORMATION SECURITY JOURNAL, 2023, 32 (02): : 76 - 119