Abstract
With the increasing popularity of social networks in the globalized environment, the process of sharing data and information from anywhere at anytime has become easier and faster. Furthermore, cloud based computing and storage services have become mainstream. Unfortunately, if the information is on the Internet, it is susceptible to attacks leading to leakage and hence needs to be encrypted. Searchable encryption is a way to obtain efficient access to a large encrypted database, improving the data security even when it is stored on untrusted servers. We present few applications which can use and benefit from searchable encryption and explain how secrecy of the data is maintained without compromising usability.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Playstation’s blog (2011), http://blog.eu.playstation.com/2011/04/28/playstation-network-and-qriocity-outage-faq/
Boneh, D., Di Crescenzo, G., Ostrovsky, R., Persiano, G.: Public Key Encryption with Keyword Search. In: Cachin, C., Camenisch, J. (eds.) EUROCRYPT 2004. LNCS, vol. 3027, pp. 506–522. Springer, Heidelberg (2004), http://dx.doi.org/10.1007/978-3-540-24676-3_30
Dong, C., Russello, G., Dulay, N.: Shared and searchable encrypted data for untrusted servers. Journal of Computer Security 19, 367–397 (2011), http://iospress.metapress.com/content/5400312680314865
Gu, C., Zhu, Y.: New efficient searchable encryption schemes from bilinear pairings. International Journal of Network Security 10, 25–31 (2010)
Irani, D., Webb, S., Pu, C., Li, K.: Modeling unintended personal-information leakage from multiple online social networks. IEEE Internet Computing 15(3), 13–19 (2011)
Quinn, B., Arthur, C.: Playstation network hackers access data of 77 million users (2011), http://www.guardian.co.uk/technology/2011/apr/26/playstation-network-hackers-data
Ristenpart, T., Tromer, E., Shacham, H., Savage, S.: Hey, you, get off of my cloud: exploring information leakage in third-party compute clouds. In: Proceedings of the 16th ACM Conference on Computer and Communications Security, CCS 2009, pp. 199–212. ACM, New York (2009), http://doi.acm.org/10.1145/1653662.1653687
Vijayan, J.: Two more organizations report data breaches (2006), http://www.computerworld.com/s/article/9000878/Two_more_organizations_report_data_breaches_?taxonomyId=17/
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2012 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Raso Mattos, L.R., Varadharajan, V., Nallusamy, R. (2012). Data Protection and Privacy Preservation Using Searchable Encryption on Outsourced Databases. In: Thampi, S.M., Zomaya, A.Y., Strufe, T., Alcaraz Calero, J.M., Thomas, T. (eds) Recent Trends in Computer Networks and Distributed Systems Security. SNDS 2012. Communications in Computer and Information Science, vol 335. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-34135-9_18
Download citation
DOI: https://doi.org/10.1007/978-3-642-34135-9_18
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-34134-2
Online ISBN: 978-3-642-34135-9
eBook Packages: Computer ScienceComputer Science (R0)