[Home ] [Archive]   [ فارسی ]  
:: Main :: About :: Current Issue :: Archive :: Search :: Submit :: Contact ::
:: Volume 9, Issue 2 (2-2021) ::
3 2021, 9(2): 43-68 Back to browse issues page
Browse searchable encryption schemes: Classification, methods and recent developments
Mohammad Hossein Noorallahzadeh, Ahmad Gholami, Reza Alimoradi
Qom univ.
Abstract:   (306 Views)
With the advent of cloud computing, data owners tend to submit their data to cloud servers and allow users to access data when needed. However, outsourcing sensitive data will lead to privacy issues. Encrypting data before outsourcing solves privacy issues, but in this case, we will lose the ability to search the data. Searchable encryption (SE) schemes have been proposed to achieve this feature of searching encrypted data without compromising privacy. This method will protect both the user's sensitive information and the ability to search for encrypted data. In this article, we review the various SE designs. In this review, we present the classification of SE designs: symmetric searchable encryption, public key searchable encryption, and search attribute-based encryption schemes, and then a detailed discussion of SE designs in terms of index structure. And provide search functionality. There is also a comparison of SE design analysis in terms of security, performance and security. In addition, we talked about the challenges, leading directions and applications of SE schemes.
Keywords: Cloud storagei· Searchable encryptioni· Privacy preservingi· Search  functionalityi· Security
Full-Text [PDF 947 kb]   (83 Downloads)    
Type of Study: Scientific extension | Subject: Special
Received: 2021/05/13 | Accepted: 2021/12/21 | Published: 2022/02/21
Add your comments about this article
Your username or Email:

CAPTCHA


XML   Persian Abstract   Print


Download citation:
BibTeX | RIS | EndNote | Medlars | ProCite | Reference Manager | RefWorks
Send citation to:

Noorallahzadeh M H, Gholami A, Alimoradi R. Browse searchable encryption schemes: Classification, methods and recent developments. 3. 2021; 9 (2) :43-68
URL: http://monadi.isc.org.ir/article-1-184-en.html


Rights and permissions
Creative Commons License This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.
Volume 9, Issue 2 (2-2021) Back to browse issues page
دوفصل نامه علمی ترویجی منادی امنیت فضای تولید و تبادل اطلاعات( افتا) Biannual Journal Monadi for Cyberspace Security (AFTA)
Persian site map - English site map - Created in 0.05 seconds with 30 queries by YEKTAWEB 4422