Loading [MathJax]/extensions/TeX/ietmacros.js
Fogging the cloud — Implementing and evaluating searchable encryption schemes in practice | IEEE Conference Publication | IEEE Xplore

Fogging the cloud — Implementing and evaluating searchable encryption schemes in practice


Abstract:

With the rise of cloud computing new ways to secure outsourced data have to be devised. Traditional approaches like simply encrypting all data before it is transferred on...Show More

Abstract:

With the rise of cloud computing new ways to secure outsourced data have to be devised. Traditional approaches like simply encrypting all data before it is transferred only partially alleviate this problem. Searchable Encryption (SE) schemes enable the cloud provider to search for user supplied strings in the encrypted documents, while neither learning anything about the content of the documents nor about the search terms. Currently there are many different SE schemes defined in the literature, with their number steadily growing. But experimental results of real world performance, or direct comparisons between different schemes, are severely lacking. In this work we propose a simple Java client-server framework to efficiently implement different SE algorithms and compare their efficiency in practice. In addition, we demonstrate the possibilities of such a framework by implementing two different existing SE schemes from slightly different domains and compare their behavior in a real-world setting.
Date of Conference: 11-15 May 2015
Date Added to IEEE Xplore: 02 July 2015
Electronic ISBN:978-1-4799-8241-7
Print ISSN: 1573-0077
Conference Location: Ottawa, ON, Canada

References

References is not available for this document.