Please use this identifier to cite or link to this item: https://doi.org/10.1186/s13673-015-0039-9
DC FieldValue
dc.titleImplementation of searchable symmetric encryption for privacy-preserving keyword search on cloud storage
dc.contributor.authorSalam, M.I
dc.contributor.authorYau, W.-C
dc.contributor.authorChin, J.-J
dc.contributor.authorHeng, S.-H0
dc.contributor.authorLing, H.-C
dc.contributor.authorPhan, R.C.-W:
dc.contributor.authorPoh, G.S
dc.contributor.authorTan, S.-Y
dc.contributor.authorYap, W.-S
dc.date.accessioned2020-11-19T09:40:21Z
dc.date.available2020-11-19T09:40:21Z
dc.date.issued2015
dc.identifier.citationSalam, M.I, Yau, W.-C, Chin, J.-J, Heng, S.-H0, Ling, H.-C, Phan, R.C.-W:, Poh, G.S, Tan, S.-Y, Yap, W.-S (2015). Implementation of searchable symmetric encryption for privacy-preserving keyword search on cloud storage. Human-centric Computing and Information Sciences 5 (1) : 19. ScholarBank@NUS Repository. https://doi.org/10.1186/s13673-015-0039-9
dc.identifier.issn21921962
dc.identifier.urihttps://scholarbank.nus.edu.sg/handle/10635/183730
dc.description.abstractEnsuring the cloud data security is a major concern for corporate cloud subscribers and in some cases for the private cloud users. Confidentiality of the stored data can be managed by encrypting the data at the client side before outsourcing it to the remote cloud storage server. However, once the data is encrypted, it will limit server’s capability for keyword search since the data is encrypted and server simply cannot make a plaintext keyword search on encrypted data. But again we need the keyword search functionality for efficient retrieval of data. To maintain user’s data confidentiality, the keyword search functionality should be able to perform over encrypted cloud data and additionally it should not leak any information about the searched keyword or the retrieved document. This is known as privacy preserving keyword search. This paper aims to study privacy preserving keyword search over encrypted cloud data. Also, we present our implementation of a privacy preserving data storage and retrieval system in cloud computing. For our implementation, we have chosen one of the symmetric key primitives due to its efficiency in mobile environments. The implemented scheme enables a user to store data securely in the cloud by encrypting it before outsourcing and also provides user capability to search over the encrypted data without revealing any information about the data or the query. © 2015, Salam et al.
dc.rightsAttribution 4.0 International
dc.rights.urihttp://creativecommons.org/licenses/by/4.0/
dc.sourceUnpaywall 20201031
dc.typeArticle
dc.contributor.departmentDEAN'S OFFICE (MEDICINE)
dc.contributor.departmentDEPARTMENT OF COMPUTER SCIENCE
dc.description.doi10.1186/s13673-015-0039-9
dc.description.sourcetitleHuman-centric Computing and Information Sciences
dc.description.volume5
dc.description.issue1
dc.description.page19
dc.published.statePublished
Appears in Collections:Elements
Staff Publications

Show simple item record
Files in This Item:
File Description SizeFormatAccess SettingsVersion 
10_1186_s13673-015-0039-9.pdf1.64 MBAdobe PDF

OPEN

NoneView/Download

Google ScholarTM

Check

Altmetric


This item is licensed under a Creative Commons License Creative Commons