Searchastore: Fast and secure searchable cloud services

作者: Wai-Kong Lee , Raphael C.-W. Phan , Geong-Sen Poh , Bok-Min Goi

DOI: 10.1007/S10586-017-0941-1

关键词:

摘要: The emergence of Cloud Computing is revolutionizing the way we store, query, analyze and consume data, which also bring forward other development that fundamentally changed our life style. For example, Industry 4.0 Internet Things (IoT) can improve quality manufacturing many aspects in daily life; both them rely heavily on cloud computing platform to develop. Central this paradigm shift need keep any common often held at remote outsourced locations usually be accessed by different authorized parties, secure from being leaked unauthorized entities. When using services, consumer may want encrypt sensitive data before uploading it cloud, but will eliminate possibility search efficiently storage. A more practical solution employ a searchable encryption scheme storage, so user query encrypted without revealing service provider. Besides security features, performance schemes very important when comes applications. In paper, propose several techniques accelerate stored cloud. Notably, include massively parallel file encryption, multi-array keyword red black tree (KRBT) implementation, batched enhanced KRBT. To best knowledge, SearchaStore first work attempts GPU technology.

参考文章(32)
Tarik Moataz, Benjamin Justus, Indrakshi Ray, Nora Cuppens-Boulahia, Frédéric Cuppens, Indrajit Ray, Privacy-Preserving Multiple Keyword Search on Outsourced Data in the Clouds Lecture Notes in Computer Science. pp. 66- 81 ,(2014) , 10.1007/978-3-662-43936-4_5
Yang Yang, Zhi Guan, Huiping Sun, Zhong Chen, Accelerating RSA with Fine-Grained Parallelism Using GPU Information Security Practice and Experience. pp. 454- 468 ,(2015) , 10.1007/978-3-319-17533-1_31
David Cash, Stanislaw Jarecki, Charanjit Jutla, Hugo Krawczyk, Marcel-Cătălin Roşu, Michael Steiner, Highly-Scalable Searchable Symmetric Encryption with Support for Boolean Queries international cryptology conference. ,vol. 2013, pp. 353- 373 ,(2013) , 10.1007/978-3-642-40041-4_20
Melissa Chase, Seny Kamara, Structured Encryption and Controlled Disclosure international conference on the theory and application of cryptology and information security. ,vol. 6477, pp. 577- 594 ,(2010) , 10.1007/978-3-642-17373-8_33
Admire Mhlaba, Muthoni Masinde, Implementation of middleware for Internet of Things in asset tracking applications: In-lining approach international conference on industrial informatics. pp. 460- 469 ,(2015) , 10.1109/INDIN.2015.7281778
Craig Gentry, Shai Halevi, Nigel P. Smart, Fully Homomorphic Encryption with Polylog Overhead Advances in Cryptology – EUROCRYPT 2012. pp. 465- 482 ,(2012) , 10.1007/978-3-642-29011-4_28
Krzysztof Kaczmarski, B + -Tree Optimized for GPGPU OTM Confederated International Conferences "On the Move to Meaningful Internet Systems". pp. 843- 854 ,(2012) , 10.1007/978-3-642-33615-7_27
Sunyoung Kang, TaeYeon Kim, Hongseok Jeon, Wonhyuk Lee, Seungae Kang, A healthcare information sharing scheme in distributed cloud networks Cluster Computing. ,vol. 18, pp. 1405- 1410 ,(2015) , 10.1007/S10586-015-0488-Y
Yoon Sang Kim, Junho Ko, Dong-Kwang Shin, Chul-Hwan Kim, Chul-Won Park, A frequency monitoring system development for wide-area power grid protection Cluster Computing. ,vol. 16, pp. 209- 217 ,(2013) , 10.1007/S10586-012-0221-Z
Shifeng Fang, Lida Xu, Huan Pei, Yongqiang Liu, Zhihui Liu, Yunqiang Zhu, Jianwu Yan, Huifang Zhang, An Integrated Approach to Snowmelt Flood Forecasting in Water Resource Management IEEE Transactions on Industrial Informatics. ,vol. 10, pp. 548- 558 ,(2014) , 10.1109/TII.2013.2257807