SESOS: A Verifiable Searchable Outsourcing Scheme for Ordered Structured Data in Cloud Computing
Authors
Abstract:
While cloud computing is growing at a remarkable speed, privacy issues are far from being solved. One way to diminish privacy concerns is to store data on the cloud in encrypted form. However, encryption often hinders useful computation cloud services. A theoretical approach is to employ the so-called fully homomorphic encryption, yet the overhead is so high that it is not considered a viable solution for practical purposes. The next best thing is to craft special-purpose cryptosystems which support the set of operations required to be addressed by cloud services. In this paper, we put forward one such cryptosystem, which supports efficient search over structured data types, such as timestamps or network addresses, which are comprised of several segments with well-known values. The new cryptosystem, called SESOS, provides the ability to execute LIKE queries, along with the search for exact matches, as well as comparison. In addition, the extended version, called XSESOS, allows for verifying the integrity of ciphertexts. At its heart, SESOS combines any order-preserving encryption (OPE) scheme with a novel encryption scheme called Multi-map Perfectly Secure Cryptosystem(MuPS). We prove that MuPS is perfectly secure, and hence SESOS enjoys the same security properties of the underlying OPE scheme. The overhead of executing equality and comparison operations is negligible. The performance of LIKE queries is significantly improved by up to 1370X and the performance of result decryption improved by 520X compared to existing solutions on a database with merely 100K records (the improvement is even more significant in larger databases).
similar resources
Privacy-Preserving Data Outsourcing in Cloud Computing
In cloud computing, data owners are motivated to outsource their complex data management systems from local sites to the commercial public cloud for great flexibility and economic savings. But for protecting data privacy, sensitive data has to be encrypted before outsourcing, which obsoletes traditional data utilization based on plaintext keyword search. Thus, enabling an encrypted cloud data s...
full textEfficient Data Mining with Evolutionary Algorithms for Cloud Computing Application
With the rapid development of the internet, the amount of information and data which are produced, are extremely massive. Hence, client will be confused with huge amount of data, and it is difficult to understand which ones are useful. Data mining can overcome this problem. While data mining is using on cloud computing, it is reducing time of processing, energy usage and costs. As the speed of ...
full textFault-tolerant Verifiable Keyword Symmetric Searchable Encryption in Hybrid Cloud
As cloud computing is increasingly expanding its application scenario, it is vital for cloud storage customers not to sacrifice the confidentiality of sensitive data while making fullest use of operational functionality of cloud secure systems. Although traditional searchable encryption can well solve exact keyword search on encrypted data with retrieving files by search interest, it does not w...
full textA Survey Report on Secured Data Outsourcing in Cloud Computing
Cloud computing allows for an economically promising paradigm of computation outsourcing. Nonetheless, the way to look after buyer’s exclusive data processed and generated for the period of the computation is becoming the foremost security quandary. Focusing on engineering computing and optimization duties, this paper investigates at ease outsourcing of commonly applicable linear programming (L...
full textAnalysis of One Scheme for Enabling Cloud Storage Auditing with Verifiable Outsourcing of Key Updates
Cloud computing supports a paradigm shift from local to network-centric computing and enables customers with limited computational resources to outsource large-scale computational tasks to the cloud, such as linear equations and linear programming. Recently, Yu et al. [IEEE TIFS, 11(6), 2016, 1362-1375] have proposed a scheme for cloud storage auditing with verifiable outsourcing of key updates...
full textMy Resources
Journal title
volume 11 issue 1
pages 15- 34
publication date 2019-01-30
By following a journal you will be notified via email when a new issue of this journal is published.
Hosted on Doprax cloud platform doprax.com
copyright © 2015-2023