Abstract

With the popularization of cloud computing, many business and individuals prefer to outsource their data to cloud in encrypted form to protect data confidentiality. However, how to search over encrypted data becomes a concern for users. To address this issue, searchable encryption is a novel cryptographic primitive that enables user to search queries over encrypted data stored on an untrusted server while guaranteeing the privacy of the data. Public key encryption with keyword search (PEKS) has received a lot of attention as an important branch. In this paper, we focus on the development of PEKS in cloud by providing a comprehensive research survey. From a technological viewpoint, the existing PEKS schemes can be classified into several variants: PEKS based on public key infrastructure, PEKS based on identity-based encryption, PEKS based on attribute-based encryption, PEKS based on predicate encryption, PEKS based on certificateless encryption, and PEKS supporting proxy re-encryption. Moreover, we propose some potential applications and valuable future research directions in PEKS.

Highlights

  • In recent years, with the speedy development of computation and communication, cloud computing [1] is becoming more and more popular, and cloud storage services are becoming more and more mature, such as Baidu Cloud, Amazon simple storage service, Widows Azure, Google Cloud, etc. [2]

  • A user can outsource a set of encrypted data to the server provider while maintaining the ability to selectively search over them, most of the existing Public key encryption with keyword search (PEKS) schemes are vulnerable to the keyword guessing attack, in addition, there is file injection attack

  • In this paper, existing PEKS schemes mainly can be broadly classified into six variants from the technology view, such as PEKS on public key infrastructure, PEKS based on identity-based encryption, PEKS based on attribute-based encryption, PEKS based on predicate encryption, PEKS based on certificateless encryption, and PEKS supporting proxy re-encryption

Read more

Summary

Introduction

With the speedy development of computation and communication, cloud computing [1] is becoming more and more popular, and cloud storage services are becoming more and more mature, such as Baidu Cloud, Amazon simple storage service, Widows Azure, Google Cloud, etc. [2]. As a new type of network storage technology, cloud storage saves user data on the cloud server. One is to download all encrypted data to the local and decryption query This method needs to download a large number of files that are unneeded, which wastes network overhead and requires a lot of computational cost for decryption. This way is not feasible in practice. Searchable encryption (SE) is a new technology that a user has the capability to selectively search on encrypted data outsourced to the cloud server.

General Framework of PEKS
Algorithm Description
Security Model
Attack Model
Keyword Guessing Attack
File Injection Attack
Search Functionalities of PEKS
Taxonomy of Existing PEKS Schemes
PEKS-PKI Research and Progress
Summary
PEKS-IBE Research and Progress
PEKS-ABE Research and Progress
PEKS-PE Research and Progress
PEKS-CLE Research and Progress
PEKS-PRE Research and Progress
Application Area
E-mail Routing
Health Care
Smart Grid
Conclusions and Future Directions
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call