logo

SECURE SEARCHABLE ENCRYPTION SECURE SEARCHABLE ENCRYPTION Name

   

Added on  2023-01-19

5 Pages1158 Words61 Views
Running head: SECURE SEARCHABLE ENCRYPTION
SECURE SEARCHABLE ENCRYPTION
Name of the Student
Name of the Organization
Author Note

1SECURE SEARCHABLE ENCRYPTION
Computing of cloud is seen to have been facilitating both on-demand as well as
convenient access of network for a resource pool which will be centralised. Recently, it has been
observed that users are preferring a lot on the outsourcing of data to the cloud for mitigating the
huge of burden which mostly arises due to the local storage [4]. However, storage of data which
is very much sensitive upon the servers which are mostly remote are seen to be posing several
challenges related to privacy. This particular problem is recently considered as a source of huge
concern. In such a case or condition, it can be thought that SE or more elaborately Searchable
Encryption is considered as a way which will be positive and this can result in the protection of
sensitive data of several users. This can be done properly by preserving the ability of searching
on the side of the server [5]. Searchable Encryption is also seen to have been searching data
which are encrypted with having the leaked the information in the data which is mainly in the
form of plain text. It has been known that there are mainly two branches of searchable
encryption. They are named as SSE or Searchable Symmetric Encryption and PEKS or Public
key Encryption with Keyword Search. Searchable Symmetric Encryption allows only the key
holders who are private for producing or generating some ciphertexts and also in creating search
trapdoors. On the other hand, Public key Encryption with Keyword Search allows huge number
of users who most probably knows about the key which is public, capable for the production of
ciphertexts [3]. But here it only gives allowance to the key holders who are private during the
creation of trapdoors. Therefore, it has been finally come to know that there are two main
techniques of Searchable Encryption which includes SSE as well as PEKS. Several schemes of
Searchable Encryption are categorized well as well as compared in terms of several points which
mainly involves efficiency, security as well as functionality. Since the work of Song, Wagner
and Perrig is a pioneering one, it has been come to know that the main field of secure Search

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Disadvantages of Cloud Services and Outsourcing Sensitive Data
|2
|636
|80

Research on Cloud Computing and Data Encryption
|13
|653
|95

Internet of Things in Healthcare: Literature Review and Annotated Bibliography
|9
|2470
|133

ITC595 - Information Security
|3
|3044
|93