Skip to main content

Encrypted Data Searching Techniques and Approaches for Cloud Computing: A Survey

  • Conference paper
  • First Online:
Proceedings of the First International Conference on Intelligent Computing and Communication

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 458))

Abstract

Today, Cloud Computing has paved the way for enormous computing and storage. Cloud servers are third party systems which could be rented on demand basis and paid on usage basis. More and more users are adopting cloud based applications but the only factory that hinders its development is security issue. Users have a fear of trusting a third party system like cloud and they show reluctance to outsource their sensitive information to cloud. Encryption seems to be a direct solution but it limits the computability on data. Hence encryption schemes should be chosen based on the application they need to implement. In this article we study the basic encryption schemes which are widely used in cloud scenario. We compare these schemes in terms of their computational complexity, security, performance etc.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. M. Armbrust, A. Fox, R. Griffith, A. Joseph, R. Katz, A.Konwinski, G. Lee, D. Patterson, A. Rabkin, and M. Zaharia, “A View of Cloud Computing,” Comm. ACM, vol. 53, no. 4, pp. 50–58, 2010.

    Google Scholar 

  2. Shashank Agrawal, Shweta Agrawal, Saikrishna Badrinarayanan, Abishek Kumarasubramanian, Manoj Prabhakaran, and Amit Sahai. Function Private Functional Encryption and Property Preserving Encryption: New Definitions and Positive Results. Cryptology ePrint Archive, Report 2013/744, 2013.

    Google Scholar 

  3. C. Leslie, “NSA Has Massive Database of Americans’ Phone Calls,” http://usatoday30.usatoday.com/news/washington/2006-05-10/, 2013.

  4. R. Curtmola, J.A. Garay, S. Kamara, and R. Ostrovsky, “Searchable Symmetric Encryption: Improved Definitions and Efficient Constructions,” Proc. ACM 13th Conf. Computer and Comm. Security (CCS), 2006.

    Google Scholar 

  5. C. Wang, N. Cao, J. Li, K. Ren, and W. Lou, “Secure Ranked Keyword Search over Encrypted Cloud Data,” Proc. IEEE 30th Int’l Conf. Distributed Computing Systems (ICDCS), 2010.

    Google Scholar 

  6. S. Zerr, D. Olmedilla, W. Nejdl, and W. Siberski, “Zerber+r: Top-k Retrieval from a Confidential Index,” Proc. 12th Int’l Conf. Extending Database Technology: Advances in Database Technology (EDBT), 2009.

    Google Scholar 

  7. M. van Dijk, C. Gentry, S. Halevi, and V. Vaikuntanathan, “Fully Homomorphic Encryption over the Integers,” Proc. 29th Ann. Int’l Conf. Theory and Applications of Cryptographic Techniques, H. Gilbert, pp. 24–43, 2010.

    Google Scholar 

  8. M. Perc, “Evolution of the Most Common English Words and Phrases over the Centuries,” J. Royal Soc. Interface, 2012.

    Google Scholar 

  9. O. Regev, “New Lattice-Based Cryptographic Constructions,” J. ACM, vol. 51, no. 6, pp. 899–942, 2004.

    Google Scholar 

  10. Mihir Bellare, Thomas Ristenpart, Phillip Rogaway, and Till Stegers. Format-preserving encryption. In Michael J. Jacobson Jr., Vincent Rijmen, and Reihaneh Safavi-Naini, editors, Selected Areas in Cryptography, volume 5867 of Lecture Notes in Computer Science, pages 295–312. Springer, 2009.

    Google Scholar 

  11. Alexandra Boldyreva, Nathan Chenette, Younho Lee, and Adam O’Neill. Order-preserving symmetric encryption. In Antoine Joux, editor, EUROCRYPT, volume 5479 of Lecture Notes in Computer Science, pages 224–241. Springer, 2009.

    Google Scholar 

  12. Alexandra Boldyreva, Nathan Chenette, Younho Lee, and Adam ONeill. Order-preserving symmetric encryption. Cryptology ePrint Archive, Report 2012/624, 2012. http://eprint.iacr.org/.

  13. Alexandra Boldyreva, Nathan Chenette, and Adam O’Neill. Order-preserving encryption revisited: Improved security analysis and alternative solutions. In Phillip Rogaway, editor, CRYPTO, volume 6841 of Lecture Notes in Computer Science, pages 578–595. Springer, 2011.

    Google Scholar 

  14. Alexandra Boldyreva, Nathan Chenette, and Adam ONeill. Order-preserving encryption revisited: Improved security analysis and alternative solutions. Cryptology ePrint Archive, Report 2012/625, 2012. http://eprint.iacr.org/.

  15. Dan Boneh and Xavier Boyen. Efficient selective identity-based encryption without random oracles. J. Cryptology, 24(4):659–693, 2011.

    Google Scholar 

  16. Dan Boneh, Xavier Boyen, and Eu-Jin Goh. Hierarchical identity based encryption with constant size ciphertext. In Ronald Cramer, editor, EUROCRYPT, volume 3494 of Lecture Notes in Computer Science, pages 440–456. Springer, 2005.

    Google Scholar 

  17. E. Bach and J.O. Shallit. Algorithmic Number Theory. Foundations of computing. MIT Press, 1996.

    Google Scholar 

  18. Goldreich, O. “Towards a Theory of Software Protection and simulation by Oblivious RAMs” STOC 87.

    Google Scholar 

  19. C. Gentry, “Fully Homomorphic Encryption Using Ideal Lattices,” Proc. 41st Ann. ACM Symp. Theory of computing (STOC), pp. 169–178, 2009.

    Google Scholar 

  20. Lija Mohan, Sudheep Elayidom, “Fine Grained Access Control and Revocation for secure cloud environment- a polynomial based approach”, International Conference on Information and Communication Technologies, to be published in Elsevier Procedia, December 2014.

    Google Scholar 

Download references

Acknowledgments

The authors sincerely thank Department of Science & Technology, India for supporting the research work by granting Inspire Fellowship.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Lija Mohan .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2017 Springer Science+Business Media Singapore

About this paper

Cite this paper

Lija Mohan, Sudheep Elayidom, M. (2017). Encrypted Data Searching Techniques and Approaches for Cloud Computing: A Survey. In: Mandal, J., Satapathy, S., Sanyal, M., Bhateja, V. (eds) Proceedings of the First International Conference on Intelligent Computing and Communication. Advances in Intelligent Systems and Computing, vol 458. Springer, Singapore. https://doi.org/10.1007/978-981-10-2035-3_11

Download citation

  • DOI: https://doi.org/10.1007/978-981-10-2035-3_11

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-10-2034-6

  • Online ISBN: 978-981-10-2035-3

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics