z-logo
open-access-imgOpen Access
A study on searchable encryption schemes
Author(s) -
Sunitha Buchade,
Prakash R. Devale
Publication year - 2018
Publication title -
international journal of engineering and technology
Language(s) - English
Resource type - Journals
ISSN - 2227-524X
DOI - 10.14419/ijet.v7i2.10995
Subject(s) - computer science , encryption , ciphertext , server , overhead (engineering) , outsourcing , cloud computing , client side encryption , task (project management) , computer security , database , information retrieval , on the fly encryption , computer network , operating system , management , political science , law , economics
To manage large volume of data, most of the organizations and data owners outsource their data to remote cloud storage servers. Since the remote servers are untrusted party, the data has to be encrypted to achieve security and privacy. But encryption and decryption causes communication overhead for many data utilization operations like searching and updating. To overcome this contradiction, searchable encryption notion was introduced. Searchable encryption (SE) is an ability of a server to search upon the ciphertext and retrieve the data without decrypting it. By searching on the ciphertext it protects the user’s tactful data. This article concentrates on study of various resil-ient keyword search schemes in area of Cloud SE. The main basis for SE evolution is attaining the challenging task of efficient enci-phered data utilization with privacy check. Thus schemes are developed considering their search capability, efficiency and security. In this paper we summarize and analyze various available keyword searchable schemes based on query expressiveness and query correct-ness. We review articles which have extensively researched in the field of SE with various keyword search schemes.

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here