2017
DOI: 10.1016/j.cosrev.2017.08.001
|View full text |Cite
|
Sign up to set email alerts
|

A survey on design and implementation of protected searchable data in the cloud

Abstract: While cloud computing has exploded in popularity in recent years thanks to the potential efficiency and cost savings of outsourcing the storage and management of data and applications, a number of vulnerabilities that led to multiple attacks have deterred many potential users.As a result, experts in the field argued that new mechanisms are needed in order to create trusted and secure cloud services. Such mechanisms would eradicate the suspicion of users towards cloud computing by providing the necessary securi… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
27
0

Year Published

2017
2017
2020
2020

Publication Types

Select...
4
3
2

Relationship

6
3

Authors

Journals

citations
Cited by 21 publications
(27 citation statements)
references
References 24 publications
0
27
0
Order By: Relevance
“…To this end, we describe the need for a context-aware security model which serves as the basis of a fine-grained access control scheme, one which allows the per-user management of access rights. In addition to that, we describe a physical distribution, encryption and query middleware that is based on a searchable encryption (SE) scheme [11] which allows legitimate users to directly search over encrypted data, thus ensuring the confidentiality and integrity of the stored data.…”
Section: Paasword Frameworkmentioning
confidence: 99%
“…To this end, we describe the need for a context-aware security model which serves as the basis of a fine-grained access control scheme, one which allows the per-user management of access rights. In addition to that, we describe a physical distribution, encryption and query middleware that is based on a searchable encryption (SE) scheme [11] which allows legitimate users to directly search over encrypted data, thus ensuring the confidentiality and integrity of the stored data.…”
Section: Paasword Frameworkmentioning
confidence: 99%
“…To achieve the first goal, we propose a protocol that is solely based on a Symmetric Searchable Encryption scheme [10] while for the second one we rely on standard techniques for secure upload of data on the cloud.…”
Section: A Our Contributionmentioning
confidence: 99%
“…Integrating storage protection mechanisms Related work on cloud storage protection [11,15,25] and secure virtual environment deployment [28] can be integrated with TruSDN in order to provide cloud infrastructure compute, storage and communication resources that are secure in the given adversarial model.…”
Section: Enabling Practical Deploymentsmentioning
confidence: 99%