Searchable symmetric encryption
The paper aims to study the various Searchable Symmetric Encryption (SSE) schemes available [1,2,3,4,5] to understand the feasibility and efficiency of the schemes in helping to keep our data secure, when a huge amount of data is stored in a third-party cloud server. Each scheme tends to have a diff...
Saved in:
Main Author: | |
---|---|
Other Authors: | |
Format: | Final Year Project |
Language: | English |
Published: |
Nanyang Technological University
2020
|
Subjects: | |
Online Access: | https://hdl.handle.net/10356/139347 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Nanyang Technological University |
Language: | English |
id |
sg-ntu-dr.10356-139347 |
---|---|
record_format |
dspace |
spelling |
sg-ntu-dr.10356-1393472023-02-28T23:17:15Z Searchable symmetric encryption Thio, Brian Yu Li Guo Jian School of Physical and Mathematical Sciences guojian@ntu.edu.sg Science::Mathematics The paper aims to study the various Searchable Symmetric Encryption (SSE) schemes available [1,2,3,4,5] to understand the feasibility and efficiency of the schemes in helping to keep our data secure, when a huge amount of data is stored in a third-party cloud server. Each scheme tends to have a different profile of security leakage and efficiency, which can be attributed to the way the scheme is constructed. We first study some basic constructions to understand their respective weaknesses and strengths. Then, we develop the motivation to study a specific construction and its extension in depth. Next, we implement the Dynamic 2lev scheme related to the specific construction and study its efficiency in handling large datasets. From our results, we can conclude that the scheme is practical and efficient for data retrievals that does not require frequent updates. For tasks which requires frequent updating of the database, the Dynamic 2lev scheme might not be efficient as updating requires linear time. Hence, we proposed a possible solution of using distributed computing to improve the setup protocol within the algorithm to improve the efficiency scheme. Bachelor of Science in Mathematical Sciences 2020-05-19T03:35:26Z 2020-05-19T03:35:26Z 2020 Final Year Project (FYP) https://hdl.handle.net/10356/139347 en application/pdf Nanyang Technological University |
institution |
Nanyang Technological University |
building |
NTU Library |
continent |
Asia |
country |
Singapore Singapore |
content_provider |
NTU Library |
collection |
DR-NTU |
language |
English |
topic |
Science::Mathematics |
spellingShingle |
Science::Mathematics Thio, Brian Yu Li Searchable symmetric encryption |
description |
The paper aims to study the various Searchable Symmetric Encryption (SSE) schemes available [1,2,3,4,5] to understand the feasibility and efficiency of the schemes in helping to keep our data secure, when a huge amount of data is stored in a third-party cloud server. Each scheme tends to have a different profile of security leakage and efficiency, which can be attributed to the way the scheme is constructed. We first study some basic constructions to understand their respective weaknesses and strengths. Then, we develop the motivation to study a specific construction and its extension in depth. Next, we implement the Dynamic 2lev scheme related to the specific construction and study its efficiency in handling large datasets. From our results, we can conclude that the scheme is practical and efficient for data retrievals that does not require frequent updates. For tasks which requires frequent updating of the database, the Dynamic 2lev scheme might not be efficient as updating requires linear time. Hence, we proposed a possible solution of using distributed computing to improve the setup protocol within the algorithm to improve the efficiency scheme. |
author2 |
Guo Jian |
author_facet |
Guo Jian Thio, Brian Yu Li |
format |
Final Year Project |
author |
Thio, Brian Yu Li |
author_sort |
Thio, Brian Yu Li |
title |
Searchable symmetric encryption |
title_short |
Searchable symmetric encryption |
title_full |
Searchable symmetric encryption |
title_fullStr |
Searchable symmetric encryption |
title_full_unstemmed |
Searchable symmetric encryption |
title_sort |
searchable symmetric encryption |
publisher |
Nanyang Technological University |
publishDate |
2020 |
url |
https://hdl.handle.net/10356/139347 |
_version_ |
1759857037205831680 |