Guide to Big Data Applications by S. Srinivasan
Author:S. Srinivasan
Language: eng
Format: epub
Publisher: Springer International Publishing, Cham
11.2 Searchable Encryption Models
Since Google popularized MapReduce in the early 2000s, search has been recognized as a central function of many big data systems. Similarly, research into encrypted data processing also began with search. Searchable encryption schemes generally involve up to three parties: Data Owner
Users
Storage Provider
The Data Owner has access to the secret/private key to decrypt the data set and is considered to be trusted. Users are parties other than the data owner that add material to the encrypted data set or that search over it. Users do not have the ability to decrypt or obtain information without obtaining Data Owner’s authorization.
The encrypted data set is stored in an untrusted storage server, such as a cloud service provider (e.g. Amazon EC2, Microsoft Azure). While it is accepted that legitimate service providers will perform the required protocols and encryptions without fault to ensure their business operation, it is also conceivable that they may wish to perform analysis on the information available to them, such as the search patterns, to acquire additional knowledge on their clients that may benefit them. This is termed the honest but curious model, where a non-malicious entity follows the required protocols but desires to learn more on the protected data set. In addition to the storage provider, users are also generally considered to be honest but curious. More complicated schemes have also been proposed which consider the malicious settings where the storage provider or users may deliberately manipulate the protocols and data to compromise the data security. Other models also exist where researchers propose solutions to mitigate information leakage resulting from colluding users and cloud operators. For our discussion, we will restrict to the honest but curious model for cloud storage providers and users.
Searchable encryption schemes can be classified into four categories, denoted by contributors/searchers: Private/Private: A private keyword search scheme that allows the data owner possessing the secret key to search over an encrypted data set placed by the data owner without compromising or decrypting the data.
Download
This site does not store any files on its server. We only index and link to content provided by other sites. Please contact the content providers to delete copyright contents if any and email us, we'll remove relevant links or contents immediately.
The Brazilian Economy since the Great Financial Crisis of 20072008 by Philip Arestis Carolina Troncoso Baltar & Daniela Magalhães Prates(131995)
International Integration of the Brazilian Economy by Elias C. Grivoyannis(106925)
The Art of Coaching by Elena Aguilar(53130)
Flexible Working by Dale Gemma;(23282)
How to Stop Living Paycheck to Paycheck by Avery Breyer(19681)
The Acquirer's Multiple: How the Billionaire Contrarians of Deep Value Beat the Market by Tobias Carlisle(12297)
Thinking, Fast and Slow by Kahneman Daniel(12205)
The Radium Girls by Kate Moore(12000)
The Art of Thinking Clearly by Rolf Dobelli(10376)
Hit Refresh by Satya Nadella(9101)
The Compound Effect by Darren Hardy(8903)
Tools of Titans by Timothy Ferriss(8345)
Atomic Habits: Tiny Changes, Remarkable Results by James Clear(8304)
Turbulence by E. J. Noyes(8001)
A Court of Wings and Ruin by Sarah J. Maas(7778)
Change Your Questions, Change Your Life by Marilee Adams(7715)
Nudge - Improving Decisions about Health, Wealth, and Happiness by Thaler Sunstein(7676)
How to Be a Bawse: A Guide to Conquering Life by Lilly Singh(7455)
Win Bigly by Scott Adams(7164)