{"title":"使用可搜索对称加密的安全,高效和动态数据搜索","authors":"M. S. Shaikh, Jatna Bavishi, Reema Patel","doi":"10.1109/CloudTech49835.2020.9365907","DOIUrl":null,"url":null,"abstract":"Fog computing, which works complementary to cloud computing, is being developed to overcome the issue of cloud computing such as latency in the cases where the data is to be retrieved immediately. But, along with solving the problem of latency, fog computing brings along with it different set of security issues than cloud computing. The storage and processing capabilities of fog computing is limited and hence, the security issues must be solved with these constrained resources. One of the problems faced when the data is stored outside the internal network is loss of confidentiality. For this, the data must be encrypted. But, whenever document needs to be searched, all the related documents must be decrypted first and later the required document is to be fetched. Within this time frame, the document data can be accessed by an unauthorized person. So, in this paper, a searchable symmetric encryption scheme is proposed wherein the authorized members of an organization can search over the encrypted data and retrieve the required document in order to preserve the security and privacy of the data. Also, the searching complexity of the algorithm is much less so that it suitable to fog computing environment.","PeriodicalId":272860,"journal":{"name":"2020 5th International Conference on Cloud Computing and Artificial Intelligence: Technologies and Applications (CloudTech)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2020-11-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Secure, Efficient and Dynamic Data Search using Searchable Symmetric Encryption\",\"authors\":\"M. S. Shaikh, Jatna Bavishi, Reema Patel\",\"doi\":\"10.1109/CloudTech49835.2020.9365907\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Fog computing, which works complementary to cloud computing, is being developed to overcome the issue of cloud computing such as latency in the cases where the data is to be retrieved immediately. But, along with solving the problem of latency, fog computing brings along with it different set of security issues than cloud computing. The storage and processing capabilities of fog computing is limited and hence, the security issues must be solved with these constrained resources. One of the problems faced when the data is stored outside the internal network is loss of confidentiality. For this, the data must be encrypted. But, whenever document needs to be searched, all the related documents must be decrypted first and later the required document is to be fetched. Within this time frame, the document data can be accessed by an unauthorized person. So, in this paper, a searchable symmetric encryption scheme is proposed wherein the authorized members of an organization can search over the encrypted data and retrieve the required document in order to preserve the security and privacy of the data. Also, the searching complexity of the algorithm is much less so that it suitable to fog computing environment.\",\"PeriodicalId\":272860,\"journal\":{\"name\":\"2020 5th International Conference on Cloud Computing and Artificial Intelligence: Technologies and Applications (CloudTech)\",\"volume\":\"2 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2020-11-24\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2020 5th International Conference on Cloud Computing and Artificial Intelligence: Technologies and Applications (CloudTech)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/CloudTech49835.2020.9365907\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2020 5th International Conference on Cloud Computing and Artificial Intelligence: Technologies and Applications (CloudTech)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CloudTech49835.2020.9365907","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Secure, Efficient and Dynamic Data Search using Searchable Symmetric Encryption
Fog computing, which works complementary to cloud computing, is being developed to overcome the issue of cloud computing such as latency in the cases where the data is to be retrieved immediately. But, along with solving the problem of latency, fog computing brings along with it different set of security issues than cloud computing. The storage and processing capabilities of fog computing is limited and hence, the security issues must be solved with these constrained resources. One of the problems faced when the data is stored outside the internal network is loss of confidentiality. For this, the data must be encrypted. But, whenever document needs to be searched, all the related documents must be decrypted first and later the required document is to be fetched. Within this time frame, the document data can be accessed by an unauthorized person. So, in this paper, a searchable symmetric encryption scheme is proposed wherein the authorized members of an organization can search over the encrypted data and retrieve the required document in order to preserve the security and privacy of the data. Also, the searching complexity of the algorithm is much less so that it suitable to fog computing environment.