Next Article in Journal
Performance Analysis of Secure and Private Billing Protocols for Smart Metering
Previous Article in Journal
Synchronization in Quantum Key Distribution Systems
Article Menu

Export Article

Open AccessArticle
Cryptography 2017, 1(3), 19; https://doi.org/10.3390/cryptography1030019

Practical Architectures for Deployment of Searchable Encryption in a Cloud Environment

Information Security Group, Royal Holloway, University of London, London TW20 0EX, UK
*
Author to whom correspondence should be addressed.
Received: 15 September 2017 / Revised: 20 October 2017 / Accepted: 2 November 2017 / Published: 15 November 2017
Full-Text   |   PDF [2008 KB, uploaded 15 November 2017]   |  

Abstract

Public cloud service providers provide an infrastructure that gives businesses and individuals access to computing power and storage space on a pay-as-you-go basis. This allows these entities to bypass the usual costs associated with having their own data centre such as: hardware, construction, air conditioning and security costs, for example, making this a cost-effective solution for data storage. If the data being stored is of a sensitive nature, encrypting it prior to outsourcing it to a public cloud is a good method of ensuring the confidentiality of the data. With the data being encrypted, however, searching over it becomes unfeasible. In this paper, we examine different architectures for supporting search over encrypted data and discuss some of the challenges that need to be overcome if these techniques are to be engineered into practical systems. View Full-Text
Keywords: searchable encryption; computing on encrypted data; functional encryption; cloud computing searchable encryption; computing on encrypted data; functional encryption; cloud computing
Figures

Figure 1

This is an open access article distributed under the Creative Commons Attribution License which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. (CC BY 4.0).
SciFeed

Share & Cite This Article

MDPI and ACS Style

Renwick, S.L.; Martin, K.M. Practical Architectures for Deployment of Searchable Encryption in a Cloud Environment. Cryptography 2017, 1, 19.

Show more citation formats Show less citations formats

Note that from the first issue of 2016, MDPI journals use article numbers instead of page numbers. See further details here.

Article Metrics

Article Access Statistics

1

Comments

[Return to top]
Cryptography EISSN 2410-387X Published by MDPI AG, Basel, Switzerland RSS E-Mail Table of Contents Alert
Back to Top