Privacy Preserving Search Schemes over Encrypted Cloud Data: A Comparative Survey

Jian Shen, Dengzhi Liu, Jun Shen, Haowen Tan, Debiao He

Research output: Chapter in Book/Report/Conference proceedingConference contribution

4 Citations (Scopus)

Abstract

Due to the development of the network and the growth big data, data owner prefer to remotely outsource their data to cloud, which can avoid the local data management and decrease the local hardware cost. But some sensitive data, such as personal healthcare information and personal property information, must be encrypted firstly and then outsourced to the cloud. This can protect sensitive information. But the outsource encrypted data to cloud can increase the difficulty of the data retrieval, because data owner or unauthorized users can't search correctly the data they need, and also it is impractical to download all of the data to local side from the cloud, which will result in huge communication an computation overhead. Hence, some cloud data retrieval schemes has been proposed to solve this problem, these schemes not only can search the data they need correctly, but also can prevent sensitive data leaked out. In this paper, we survey the privacy preserving cloud data retrieval schemes and give a comparison of them with respect to the key principles of search and privacy assured.

Original languageEnglish
Title of host publicationProceedings - 2015 1st International Conference on Computational Intelligence Theory, Systems and Applications, CCITSA 2015
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages197-202
Number of pages6
ISBN (Electronic)9781467386005
DOIs
Publication statusPublished - May 18 2016
Externally publishedYes
Event1st International Conference on Computational Intelligence Theory, Systems and Applications, CCITSA 2015 - Ilan, Taiwan, Province of China
Duration: Dec 10 2015Dec 12 2015

Publication series

NameProceedings - 2015 1st International Conference on Computational Intelligence Theory, Systems and Applications, CCITSA 2015

Conference

Conference1st International Conference on Computational Intelligence Theory, Systems and Applications, CCITSA 2015
CountryTaiwan, Province of China
CityIlan
Period12/10/1512/12/15

All Science Journal Classification (ASJC) codes

  • Computational Theory and Mathematics
  • Computer Networks and Communications
  • Computer Science Applications

Fingerprint Dive into the research topics of 'Privacy Preserving Search Schemes over Encrypted Cloud Data: A Comparative Survey'. Together they form a unique fingerprint.

Cite this