{"title":"可搜索加密方案的比较研究","authors":"Neha Pramanick, Syed Taqi Ali","doi":"10.1109/ICCCNT.2017.8204032","DOIUrl":null,"url":null,"abstract":"With the fastest technology of modern life we always have to deal with numerous data in various way. We simultaneously store and retrieve data in database of large organization, email server, cloud server etc. Due to this process both the owner and user need security of the data and therefore the data is encrypted before use. Because of this encryption process, some problem arises at the time of searching and retrieving of particular data. Searchable encryption is a scheme which assures the owner and user a secure and efficient searching operation. There has been growing interest in searchable encryption in both academics and industry. Over the years different type of construction of searchable encryption have been introduced. In some of them, researchers have emphasize on the efficiency of searchable encryption technique and somewhere security and privacy have got more attention. In this paper, a comparative survey has done on various technique of searchable encryption.","PeriodicalId":6581,"journal":{"name":"2017 8th International Conference on Computing, Communication and Networking Technologies (ICCCNT)","volume":"7 1","pages":"1-5"},"PeriodicalIF":0.0000,"publicationDate":"2017-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"5","resultStr":"{\"title\":\"A comparative survey of searchable encryption schemes\",\"authors\":\"Neha Pramanick, Syed Taqi Ali\",\"doi\":\"10.1109/ICCCNT.2017.8204032\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"With the fastest technology of modern life we always have to deal with numerous data in various way. We simultaneously store and retrieve data in database of large organization, email server, cloud server etc. Due to this process both the owner and user need security of the data and therefore the data is encrypted before use. Because of this encryption process, some problem arises at the time of searching and retrieving of particular data. Searchable encryption is a scheme which assures the owner and user a secure and efficient searching operation. There has been growing interest in searchable encryption in both academics and industry. Over the years different type of construction of searchable encryption have been introduced. In some of them, researchers have emphasize on the efficiency of searchable encryption technique and somewhere security and privacy have got more attention. In this paper, a comparative survey has done on various technique of searchable encryption.\",\"PeriodicalId\":6581,\"journal\":{\"name\":\"2017 8th International Conference on Computing, Communication and Networking Technologies (ICCCNT)\",\"volume\":\"7 1\",\"pages\":\"1-5\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2017-07-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"5\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2017 8th International Conference on Computing, Communication and Networking Technologies (ICCCNT)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICCCNT.2017.8204032\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2017 8th International Conference on Computing, Communication and Networking Technologies (ICCCNT)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICCCNT.2017.8204032","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
A comparative survey of searchable encryption schemes
With the fastest technology of modern life we always have to deal with numerous data in various way. We simultaneously store and retrieve data in database of large organization, email server, cloud server etc. Due to this process both the owner and user need security of the data and therefore the data is encrypted before use. Because of this encryption process, some problem arises at the time of searching and retrieving of particular data. Searchable encryption is a scheme which assures the owner and user a secure and efficient searching operation. There has been growing interest in searchable encryption in both academics and industry. Over the years different type of construction of searchable encryption have been introduced. In some of them, researchers have emphasize on the efficiency of searchable encryption technique and somewhere security and privacy have got more attention. In this paper, a comparative survey has done on various technique of searchable encryption.