Toward Privacy-Assured and Searchable Cloud Data Storage Services

被引:25
|
作者
Li, Ming [1 ]
Yu, Shucheng [2 ]
Ren, Kui [3 ]
Lou, Wenjing [4 ]
Hou, Y. Thomas [4 ]
机构
[1] Utah State Univ, Dept Comp Sci, Logan, UT 84322 USA
[2] Univ Arkansas, Dept Comp Sci, Little Rock, AR 72204 USA
[3] SUNY Buffalo, Dept Comp Sci & Engn, Buffalo, NY 14260 USA
[4] Virginia Polytech Inst & State Univ, Blacksburg, VA 24061 USA
来源
IEEE NETWORK | 2013年 / 27卷 / 04期
基金
美国国家科学基金会;
关键词
Search engines - Privacy-preserving techniques;
D O I
10.1109/MNET.2013.6574666
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Cloud computing is envisioned as the next generation architecture of IT enterprises, providing convenient remote access to massively scalable data storage and application services. While this outsourced storage and computing paradigm can potentially bring great economical savings for data owners and users, its benefits may not be fully realized due to wide concerns of data owners that their private data may be involuntarily exposed or handled by cloud providers. Although end-to-end encryption techniques have been proposed as promising solutions for secure cloud data storage, a primary challenge toward building a full-fledged cloud data service remains: how to effectively support flexible data utilization services such as search over the data in a privacy-preserving manner. In this article, we identify the system requirements and challenges toward achieving privacy-assured searchable outsourced cloud data services, especially, how to design usable and practically efficient search schemes for encrypted cloud storage. We present a general methodology for this using searchable encryption techniques, which allows encrypted data to be searched by users without leaking information about the data itself and users' queries. In particular, we discuss three desirable functionalities of usable search operations: supporting result ranking, similarity search, and search over structured data. For each of them, we describe approaches to design efficient privacy-assured searchable encryption schemes, which are based on several recent symmetric-key encryption primitives. We analyze their advantages and limitations, and outline the future challenges that need to be solved to make such secure searchable cloud data service a reality.
引用
收藏
页码:56 / 62
页数:7
相关论文
共 50 条
  • [1] Practical and Privacy-assured Data Indexes for Outsourced Cloud Data
    Zhang, Hongli
    Zhou, Zhigang
    Du, Xiaojiang
    Li, Panpan
    Yu, Xiangzhan
    [J]. 2013 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM), 2013, : 671 - 676
  • [2] Toward Privacy-Assured Health Insurance Claims
    He, Xinchi
    Alqahtani, Sarra
    Gamble, Rose
    [J]. IEEE 2018 INTERNATIONAL CONGRESS ON CYBERMATICS / 2018 IEEE CONFERENCES ON INTERNET OF THINGS, GREEN COMPUTING AND COMMUNICATIONS, CYBER, PHYSICAL AND SOCIAL COMPUTING, SMART DATA, BLOCKCHAIN, COMPUTER AND INFORMATION TECHNOLOGY, 2018, : 1634 - 1641
  • [3] Privacy-Assured Outsourcing of Image Reconstruction Service in Cloud
    Wang, Cong
    Zhang, Bingsheng
    Ren, Kui
    Roveda, Janet M.
    [J]. IEEE TRANSACTIONS ON EMERGING TOPICS IN COMPUTING, 2013, 1 (01) : 166 - 177
  • [4] Achieving Usable and Privacy-assured Similarity Search over Outsourced Cloud Data
    Wang, Cong
    Ren, Kui
    Yu, Shucheng
    Urs, Karthik Mahendra Raje
    [J]. 2012 PROCEEDINGS IEEE INFOCOM, 2012, : 451 - 459
  • [5] Toward Assured Data Deletion in Cloud Storage
    Zheng, Dong
    Xue, Liang
    Yu, Chao
    Li, Yannan
    Yu, Yong
    [J]. IEEE NETWORK, 2020, 34 (03): : 101 - 107
  • [6] Privacy-Assured Similarity Query over Graph-Structured Data in Mobile Cloud
    Zhang, Yingguang
    Su, Sen
    Chen, Weifeng
    Wang, Yulong
    Xu, Peng
    Yang, Fangchun
    [J]. 2013 33RD IEEE INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS WORKSHOPS (ICDCSW 2013), 2013, : 398 - 403
  • [7] Prior-based privacy-assured compressed sensing scheme in cloud
    Hui Huang
    Di Xiao
    Jia Liang
    Min Li
    [J]. The Visual Computer, 2024, 40 : 2103 - 2117
  • [8] Privacy-assured Boolean Adjacent Vertex Search over Encrypted Graph Data in Cloud Computing
    Zhu, Hong
    Wu, Bin
    Xie, Meiyi
    Cui, Zongmin
    [J]. KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2016, 10 (10): : 5171 - 5189
  • [9] Privacy-assured substructure similarity query over encrypted graph-structured data in cloud
    Zhang, Yingguang
    Su, Sen
    Wang, Yulong
    Chen, Weifeng
    Yang, Fangchun
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2014, 7 (11) : 1933 - 1944
  • [10] Prior-based privacy-assured compressed sensing scheme in cloud
    Huang, Hui
    Xiao, Di
    Liang, Jia
    Li, Min
    [J]. VISUAL COMPUTER, 2024, 40 (03): : 2103 - 2117