Abstract
With the development of information technology, more and more data information uploaded to the cloud server, cloud computing encryption storage technology for data security has become particularly important. This paper mainly studies and analyzes the searchable encryption technology in cloud computing. Firstly, the research status of domestic and foreign research is analyzed. Secondly, the classification of searchable encryption technology is introduced from different aspects, and the classification model of searchable encryption technology A detailed elaboration. Finally, some problems encountered in searchable confidentiality technology and the prospect of this technology are introduced.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsReferences
Dropbox. http://www.dropbox.com/.
Lu Y, Tsudik G. Enhancing data privacy in the cloud[J]. Trust Management V, 2011:117–132.
Song D, Wagner D, Perrig A. Practical techniques for searches on encrypted data[C]. Proceedings 2000 IEEE Symposium on Security and Privacy, S & P 2000. [S.1.]:[s.n.], 2000:44–55.
Goh EJ. Secure Indexes [EB/OL]. IACR ePrint Cryptography Archive, 20113-10-07 [2004-03-16]. http://eprint.iacr.org/2003/216.
Chang Y C, Mitzenmacher M. Privacy Preserving Keyword Searches on Remote Encrypted Data[C]. Applied Cryptography and Network Security, LNCS 3531, Berlin: Springer-Verlag, 2004:442–455.
Premasathian N, Choto S. Searchable encryption schemes: with multiplication and simultaneous congruences[C]. 9th international conference on information security and cryptology.[s.1.]: IEEE, 2012: 147–150.
Xue Li. Research on Searchable Encryption Mechanism[J]. Computer technology development: 2017, 27(1):97–102.
Popa R A, Zeldovich N. Multi-Key Searchable Encryption[J]. 2013.
Yang J, Liu Z, Li J, et al. Multi-key Searchable Encryption without Random Oracle[C]. International Conference on Intelligent NETWORKING and Collaborative Systems. IEEE Computer Society, 2014:79–84.
Bringer J, Chabanne H, Kindarji B. Error-tolerant searchable encryption[C]. IEEE International Conference on Communications. IEEE, 2009:1–6.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2019 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Cui, R., Zhang, Y., Li, N. (2019). The Study of Searchable Encryption Mechanism. In: Patnaik, S., Jain, V. (eds) Recent Developments in Intelligent Computing, Communication and Devices. Advances in Intelligent Systems and Computing, vol 752. Springer, Singapore. https://doi.org/10.1007/978-981-10-8944-2_29
Download citation
DOI: https://doi.org/10.1007/978-981-10-8944-2_29
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-10-8943-5
Online ISBN: 978-981-10-8944-2
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)