A survey on searchable symmetric encryption

Outsourcing data to the cloud has become prevalent, so Searchable Symmetric Encryption (SSE), one of the methods for protecting outsourced data, has arisen widespread interest. Moreover, many novel technologies and theories have emerged, especially for the attacks on SSE and privacy-preserving. But...

Full description

Saved in:
Bibliographic Details
Main Authors: LI, Feng, MA, Jianfeng, MIAO, Yinbin, LIU, Ximeng, NING, Jianting, DENG, Robert H.
Format: text
Language:English
Published: Institutional Knowledge at Singapore Management University 2024
Subjects:
Online Access:https://ink.library.smu.edu.sg/sis_research/9534
https://ink.library.smu.edu.sg/context/sis_research/article/10534/viewcontent/SurveySearchableSynEncryption_av.pdf
Tags: Add Tag
No Tags, Be the first to tag this record!
Institution: Singapore Management University
Language: English
id sg-smu-ink.sis_research-10534
record_format dspace
spelling sg-smu-ink.sis_research-105342024-11-15T07:32:21Z A survey on searchable symmetric encryption LI, Feng MA, Jianfeng MIAO, Yinbin LIU, Ximeng NING, Jianting DENG, Robert H. Outsourcing data to the cloud has become prevalent, so Searchable Symmetric Encryption (SSE), one of the methods for protecting outsourced data, has arisen widespread interest. Moreover, many novel technologies and theories have emerged, especially for the attacks on SSE and privacy-preserving. But most surveys related to SSE concentrate on one aspect (e.g., single keyword search, fuzzy keyword search) or lack in-depth analysis. Therefore, we revisit the existing work and conduct a comprehensive analysis and summary. We provide an overview of state-of-the-art in SSE and focus on the privacy it can protect. Generally, (1) we study the work of the past few decades and classify SSE based on query expressiveness. Meanwhile, we summarize the existing schemes and analyze their performance on efficiency, storage space, index structures, and so on.; (2) we complement the gap in the privacy of SSE and introduce in detail the attacks and the related defenses; (3) we discuss the open issues and challenges in existing schemes and future research directions. We desire that our work will help novices to grasp and understand SSE comprehensively. We expect it can inspire the SSE community to discover more crucial leakages and design more efficient and secure constructions. 2024-05-01T07:00:00Z text application/pdf https://ink.library.smu.edu.sg/sis_research/9534 info:doi/10.1145/3617991 https://ink.library.smu.edu.sg/context/sis_research/article/10534/viewcontent/SurveySearchableSynEncryption_av.pdf http://creativecommons.org/licenses/by-nc-nd/4.0/ Research Collection School Of Computing and Information Systems eng Institutional Knowledge at Singapore Management University Searchable encryption privacy-preserving cloud security Information Security
institution Singapore Management University
building SMU Libraries
continent Asia
country Singapore
Singapore
content_provider SMU Libraries
collection InK@SMU
language English
topic Searchable encryption
privacy-preserving
cloud security
Information Security
spellingShingle Searchable encryption
privacy-preserving
cloud security
Information Security
LI, Feng
MA, Jianfeng
MIAO, Yinbin
LIU, Ximeng
NING, Jianting
DENG, Robert H.
A survey on searchable symmetric encryption
description Outsourcing data to the cloud has become prevalent, so Searchable Symmetric Encryption (SSE), one of the methods for protecting outsourced data, has arisen widespread interest. Moreover, many novel technologies and theories have emerged, especially for the attacks on SSE and privacy-preserving. But most surveys related to SSE concentrate on one aspect (e.g., single keyword search, fuzzy keyword search) or lack in-depth analysis. Therefore, we revisit the existing work and conduct a comprehensive analysis and summary. We provide an overview of state-of-the-art in SSE and focus on the privacy it can protect. Generally, (1) we study the work of the past few decades and classify SSE based on query expressiveness. Meanwhile, we summarize the existing schemes and analyze their performance on efficiency, storage space, index structures, and so on.; (2) we complement the gap in the privacy of SSE and introduce in detail the attacks and the related defenses; (3) we discuss the open issues and challenges in existing schemes and future research directions. We desire that our work will help novices to grasp and understand SSE comprehensively. We expect it can inspire the SSE community to discover more crucial leakages and design more efficient and secure constructions.
format text
author LI, Feng
MA, Jianfeng
MIAO, Yinbin
LIU, Ximeng
NING, Jianting
DENG, Robert H.
author_facet LI, Feng
MA, Jianfeng
MIAO, Yinbin
LIU, Ximeng
NING, Jianting
DENG, Robert H.
author_sort LI, Feng
title A survey on searchable symmetric encryption
title_short A survey on searchable symmetric encryption
title_full A survey on searchable symmetric encryption
title_fullStr A survey on searchable symmetric encryption
title_full_unstemmed A survey on searchable symmetric encryption
title_sort survey on searchable symmetric encryption
publisher Institutional Knowledge at Singapore Management University
publishDate 2024
url https://ink.library.smu.edu.sg/sis_research/9534
https://ink.library.smu.edu.sg/context/sis_research/article/10534/viewcontent/SurveySearchableSynEncryption_av.pdf
_version_ 1816859125287485440