F 5P 5: Keyword search over encrypted data with five functions and five privacy assurances

0Citations
Citations of this article
17Readers
Mendeley users who have this article in their library.

This article is free to access.

Abstract

Breaches of data security and privacy have prompted concerns about data outsourcing. Encryption is an ideal solution, yet searching over encrypted data is a challenging task. Traditional data retrieval no longer hold, so searchable encryption (SE) techniques rise in response. Most of the related efforts are narrowly focused and problem-specific. None of them has simultaneously achieved the five keyword search functions (F 5): fuzzy , multi-keyword, and ranked search as well as keyword addition/removal and instantaneous search revocation, together with the five privacy preserving requirements (P 5): keyword privacy , index privacy , token privacy , search pattern privacy, and access pattern privacy. In this paper, a full-featured approach called F 5P 5 is presented, which achieves F 5 and P 5 simultaneously. Analysis and experiments show that F 5P 5 is secure and privacy preserving, and provides high-precision search results and is efficiency in terms of computation and storage. © 2012 Springer-Verlag.

Cite

CITATION STYLE

APA

Shuai, H., & Zhu, W. T. (2012). F 5P 5: Keyword search over encrypted data with five functions and five privacy assurances. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 7618 LNCS, pp. 416–426). https://doi.org/10.1007/978-3-642-34129-8_40

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free