Skip to main content

The Study of Searchable Encryption Mechanism

  • Conference paper
  • First Online:
  • 1123 Accesses

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 752))

Abstract

With the development of information technology, more and more data information uploaded to the cloud server, cloud computing encryption storage technology for data security has become particularly important. This paper mainly studies and analyzes the searchable encryption technology in cloud computing. Firstly, the research status of domestic and foreign research is analyzed. Secondly, the classification of searchable encryption technology is introduced from different aspects, and the classification model of searchable encryption technology A detailed elaboration. Finally, some problems encountered in searchable confidentiality technology and the prospect of this technology are introduced.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Dropbox. http://www.dropbox.com/.

  2. Lu Y, Tsudik G. Enhancing data privacy in the cloud[J]. Trust Management V, 2011:117–132.

    Google Scholar 

  3. Song D, Wagner D, Perrig A. Practical techniques for searches on encrypted data[C]. Proceedings 2000 IEEE Symposium on Security and Privacy, S & P 2000. [S.1.]:[s.n.], 2000:44–55.

    Google Scholar 

  4. Goh EJ. Secure Indexes [EB/OL]. IACR ePrint Cryptography Archive, 20113-10-07 [2004-03-16]. http://eprint.iacr.org/2003/216.

  5. Chang Y C, Mitzenmacher M. Privacy Preserving Keyword Searches on Remote Encrypted Data[C]. Applied Cryptography and Network Security, LNCS 3531, Berlin: Springer-Verlag, 2004:442–455.

    Google Scholar 

  6. Premasathian N, Choto S. Searchable encryption schemes: with multiplication and simultaneous congruences[C]. 9th international conference on information security and cryptology.[s.1.]: IEEE, 2012: 147–150.

    Google Scholar 

  7. Xue Li. Research on Searchable Encryption Mechanism[J]. Computer technology development: 2017, 27(1):97–102.

    Google Scholar 

  8. Popa R A, Zeldovich N. Multi-Key Searchable Encryption[J]. 2013.

    Google Scholar 

  9. Yang J, Liu Z, Li J, et al. Multi-key Searchable Encryption without Random Oracle[C]. International Conference on Intelligent NETWORKING and Collaborative Systems. IEEE Computer Society, 2014:79–84.

    Google Scholar 

  10. Bringer J, Chabanne H, Kindarji B. Error-tolerant searchable encryption[C]. IEEE International Conference on Communications. IEEE, 2009:1–6.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Yongsheng Zhang .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Cui, R., Zhang, Y., Li, N. (2019). The Study of Searchable Encryption Mechanism. In: Patnaik, S., Jain, V. (eds) Recent Developments in Intelligent Computing, Communication and Devices. Advances in Intelligent Systems and Computing, vol 752. Springer, Singapore. https://doi.org/10.1007/978-981-10-8944-2_29

Download citation

Publish with us

Policies and ethics