Title of article :
Revisiting the Practicality of Search on Encrypted Data: From the Security Broker’s Perspective
Author/Authors :
Han, Peiyi Harbin Institute of Technology (Shenzhen), Shenzhen China , Liu, Chuanyi Harbin Institute of Technology (Shenzhen), Shenzhen China , Fang, Binxing Institute of Electronic and Information Engineering in Dongguan - University of Electronic Science and Technology of China , Wang, Guofeng Harbin Institute of Technology (Shenzhen), Shenzhen China , Song, Xiaobao Shenzhen Yunanbao Technology Co , Ltd , China , Wan. Lei Shenzhen Yunanbao Technology Co , Ltd , China
Abstract :
The primary business challenge for the customers to use outsourced computation and storage is the loss of data control and security. So encryption will become a commodity in the near future. There is big diffusion with the above scenario: take advantage of current application’s full functionalities at the same time ensuring their sensitive data remains protected and under customers’ control.
Prior works have achieved effective progress towards satisfying both sides. But there are still some technical challenges, such as supporting file or data-stream based applications and supporting full-text and advanced searches. In this paper, a novel security broker based encrypted data search scheme, called Enc-YUN, is proposed, which transparently builds a reverse index at the security
broker when the data flow is transmitted to the cloud. and search firstly takes place on the index, in which the mapping structure corresponds to and retrieves the very encrypted data in the cloud on behalf of the client. With this scheme, updated-to-date full-text
search techniques can be easily integrated to carry out the most advanced search functionalities, at the same time, maintaining the strongest levels of data protection from curious providers or third parties. Experimental results show that Enc-YUN is effective with broad categories of cloud applications, and the performance overhead induced is minor and acceptable according to user’s perceptual experience.
Keywords :
Security Broker’s , The primary business challenge , customers , Revisiting the Practicality , Encrypted Data
Journal title :
Scientific Programming