Guide to Big Data Applications by S. Srinivasan

Guide to Big Data Applications by S. Srinivasan

Author:S. Srinivasan
Language: eng
Format: epub
Publisher: Springer International Publishing, Cham


11.2 Searchable Encryption Models

Since Google popularized MapReduce in the early 2000s, search has been recognized as a central function of many big data systems. Similarly, research into encrypted data processing also began with search. Searchable encryption schemes generally involve up to three parties: Data Owner

Users

Storage Provider

The Data Owner has access to the secret/private key to decrypt the data set and is considered to be trusted. Users are parties other than the data owner that add material to the encrypted data set or that search over it. Users do not have the ability to decrypt or obtain information without obtaining Data Owner’s authorization.

The encrypted data set is stored in an untrusted storage server, such as a cloud service provider (e.g. Amazon EC2, Microsoft Azure). While it is accepted that legitimate service providers will perform the required protocols and encryptions without fault to ensure their business operation, it is also conceivable that they may wish to perform analysis on the information available to them, such as the search patterns, to acquire additional knowledge on their clients that may benefit them. This is termed the honest but curious model, where a non-malicious entity follows the required protocols but desires to learn more on the protected data set. In addition to the storage provider, users are also generally considered to be honest but curious. More complicated schemes have also been proposed which consider the malicious settings where the storage provider or users may deliberately manipulate the protocols and data to compromise the data security. Other models also exist where researchers propose solutions to mitigate information leakage resulting from colluding users and cloud operators. For our discussion, we will restrict to the honest but curious model for cloud storage providers and users.

Searchable encryption schemes can be classified into four categories, denoted by contributors/searchers: Private/Private: A private keyword search scheme that allows the data owner possessing the secret key to search over an encrypted data set placed by the data owner without compromising or decrypting the data.



Download



Copyright Disclaimer:
This site does not store any files on its server. We only index and link to content provided by other sites. Please contact the content providers to delete copyright contents if any and email us, we'll remove relevant links or contents immediately.