A survey on searchable symmetric encryption
Outsourcing data to the cloud has become prevalent, so Searchable Symmetric Encryption (SSE), one of the methods for protecting outsourced data, has arisen widespread interest. Moreover, many novel technologies and theories have emerged, especially for the attacks on SSE and privacy-preserving. But...
Saved in:
Main Authors: | , , , , , |
---|---|
Format: | text |
Language: | English |
Published: |
Institutional Knowledge at Singapore Management University
2024
|
Subjects: | |
Online Access: | https://ink.library.smu.edu.sg/sis_research/9534 https://ink.library.smu.edu.sg/context/sis_research/article/10534/viewcontent/SurveySearchableSynEncryption_av.pdf |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Singapore Management University |
Language: | English |
id |
sg-smu-ink.sis_research-10534 |
---|---|
record_format |
dspace |
spelling |
sg-smu-ink.sis_research-105342024-11-15T07:32:21Z A survey on searchable symmetric encryption LI, Feng MA, Jianfeng MIAO, Yinbin LIU, Ximeng NING, Jianting DENG, Robert H. Outsourcing data to the cloud has become prevalent, so Searchable Symmetric Encryption (SSE), one of the methods for protecting outsourced data, has arisen widespread interest. Moreover, many novel technologies and theories have emerged, especially for the attacks on SSE and privacy-preserving. But most surveys related to SSE concentrate on one aspect (e.g., single keyword search, fuzzy keyword search) or lack in-depth analysis. Therefore, we revisit the existing work and conduct a comprehensive analysis and summary. We provide an overview of state-of-the-art in SSE and focus on the privacy it can protect. Generally, (1) we study the work of the past few decades and classify SSE based on query expressiveness. Meanwhile, we summarize the existing schemes and analyze their performance on efficiency, storage space, index structures, and so on.; (2) we complement the gap in the privacy of SSE and introduce in detail the attacks and the related defenses; (3) we discuss the open issues and challenges in existing schemes and future research directions. We desire that our work will help novices to grasp and understand SSE comprehensively. We expect it can inspire the SSE community to discover more crucial leakages and design more efficient and secure constructions. 2024-05-01T07:00:00Z text application/pdf https://ink.library.smu.edu.sg/sis_research/9534 info:doi/10.1145/3617991 https://ink.library.smu.edu.sg/context/sis_research/article/10534/viewcontent/SurveySearchableSynEncryption_av.pdf http://creativecommons.org/licenses/by-nc-nd/4.0/ Research Collection School Of Computing and Information Systems eng Institutional Knowledge at Singapore Management University Searchable encryption privacy-preserving cloud security Information Security |
institution |
Singapore Management University |
building |
SMU Libraries |
continent |
Asia |
country |
Singapore Singapore |
content_provider |
SMU Libraries |
collection |
InK@SMU |
language |
English |
topic |
Searchable encryption privacy-preserving cloud security Information Security |
spellingShingle |
Searchable encryption privacy-preserving cloud security Information Security LI, Feng MA, Jianfeng MIAO, Yinbin LIU, Ximeng NING, Jianting DENG, Robert H. A survey on searchable symmetric encryption |
description |
Outsourcing data to the cloud has become prevalent, so Searchable Symmetric Encryption (SSE), one of the methods for protecting outsourced data, has arisen widespread interest. Moreover, many novel technologies and theories have emerged, especially for the attacks on SSE and privacy-preserving. But most surveys related to SSE concentrate on one aspect (e.g., single keyword search, fuzzy keyword search) or lack in-depth analysis. Therefore, we revisit the existing work and conduct a comprehensive analysis and summary. We provide an overview of state-of-the-art in SSE and focus on the privacy it can protect. Generally, (1) we study the work of the past few decades and classify SSE based on query expressiveness. Meanwhile, we summarize the existing schemes and analyze their performance on efficiency, storage space, index structures, and so on.; (2) we complement the gap in the privacy of SSE and introduce in detail the attacks and the related defenses; (3) we discuss the open issues and challenges in existing schemes and future research directions. We desire that our work will help novices to grasp and understand SSE comprehensively. We expect it can inspire the SSE community to discover more crucial leakages and design more efficient and secure constructions. |
format |
text |
author |
LI, Feng MA, Jianfeng MIAO, Yinbin LIU, Ximeng NING, Jianting DENG, Robert H. |
author_facet |
LI, Feng MA, Jianfeng MIAO, Yinbin LIU, Ximeng NING, Jianting DENG, Robert H. |
author_sort |
LI, Feng |
title |
A survey on searchable symmetric encryption |
title_short |
A survey on searchable symmetric encryption |
title_full |
A survey on searchable symmetric encryption |
title_fullStr |
A survey on searchable symmetric encryption |
title_full_unstemmed |
A survey on searchable symmetric encryption |
title_sort |
survey on searchable symmetric encryption |
publisher |
Institutional Knowledge at Singapore Management University |
publishDate |
2024 |
url |
https://ink.library.smu.edu.sg/sis_research/9534 https://ink.library.smu.edu.sg/context/sis_research/article/10534/viewcontent/SurveySearchableSynEncryption_av.pdf |
_version_ |
1816859125287485440 |