Towards Secure and Effective Utilization over Encrypted Cloud Data

Cong Wang, Qian Wang, K. Ren
{"title":"Towards Secure and Effective Utilization over Encrypted Cloud Data","authors":"Cong Wang, Qian Wang, K. Ren","doi":"10.1109/ICDCSW.2011.16","DOIUrl":null,"url":null,"abstract":"Cloud computing enables an economic paradigm of data service outsourcing, where individuals and enterprise customers can avoid committing large capital outlays in the purchase and management of both software and hardware and the operational overhead therein. Despite the tremendous benefits, outsourcing data management to the commercial public cloud is also depriving customers' direct control over the systems that manage their data, raising security and privacy as the primary obstacles to the adoption of cloud. Although data encryption helps protecting data confidentiality, it also obsoletes the traditional data utilization service based on plain text keyword search. Thus, enabling an encrypted cloud data search service with privacy-assurance is of paramount importance. Considering the large number of data users and huge amount of outsourced data files in cloud, this problem is particularly challenging as it is extremely difficult to meet also the practical requirements of performance, system usability, and high-level user searching experiences. This paper investigates these challenges and defines the problem of fuzzy keyword search over encrypted cloud data, which should be explored for effective data utilization in Cloud Computing. Fuzzy keyword search aims at accommodating various typos and representation inconsistencies in different user searching input for acceptable system usability and overall user searching experience, while protecting keyword privacy. In order to further enrich the spectrum of secure cloud data utilization services, we also study how the notion of fuzzy search naturally supports similarity search, a fundamental and powerful tool that is widely used in information retrieval. We describe the challenges that are not yet met by existing searchable encryption techniques and discuss the research directions and possible technical approaches for these new search functionalities to become a reality. The investigation of the proposed research can become the key for cloud service providers to securely and effectively deliver value from the cloud infrastructure to their enterprise and individual customers, and thus significantly encourage the adoption of Cloud Computing in a large scale.","PeriodicalId":133514,"journal":{"name":"2011 31st International Conference on Distributed Computing Systems Workshops","volume":"60 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2011-06-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"35","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2011 31st International Conference on Distributed Computing Systems Workshops","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICDCSW.2011.16","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 35

Abstract

Cloud computing enables an economic paradigm of data service outsourcing, where individuals and enterprise customers can avoid committing large capital outlays in the purchase and management of both software and hardware and the operational overhead therein. Despite the tremendous benefits, outsourcing data management to the commercial public cloud is also depriving customers' direct control over the systems that manage their data, raising security and privacy as the primary obstacles to the adoption of cloud. Although data encryption helps protecting data confidentiality, it also obsoletes the traditional data utilization service based on plain text keyword search. Thus, enabling an encrypted cloud data search service with privacy-assurance is of paramount importance. Considering the large number of data users and huge amount of outsourced data files in cloud, this problem is particularly challenging as it is extremely difficult to meet also the practical requirements of performance, system usability, and high-level user searching experiences. This paper investigates these challenges and defines the problem of fuzzy keyword search over encrypted cloud data, which should be explored for effective data utilization in Cloud Computing. Fuzzy keyword search aims at accommodating various typos and representation inconsistencies in different user searching input for acceptable system usability and overall user searching experience, while protecting keyword privacy. In order to further enrich the spectrum of secure cloud data utilization services, we also study how the notion of fuzzy search naturally supports similarity search, a fundamental and powerful tool that is widely used in information retrieval. We describe the challenges that are not yet met by existing searchable encryption techniques and discuss the research directions and possible technical approaches for these new search functionalities to become a reality. The investigation of the proposed research can become the key for cloud service providers to securely and effectively deliver value from the cloud infrastructure to their enterprise and individual customers, and thus significantly encourage the adoption of Cloud Computing in a large scale.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
对加密云数据的安全有效利用
云计算实现了数据服务外包的经济范例,个人和企业客户可以避免在购买和管理软件和硬件以及其中的运营开销方面投入大量资本支出。尽管有巨大的好处,但将数据管理外包给商业公共云也剥夺了客户对管理其数据的系统的直接控制,从而提高了安全性和隐私性,成为采用云的主要障碍。虽然数据加密有助于保护数据的机密性,但它也淘汰了传统的基于纯文本关键字搜索的数据利用服务。因此,启用具有隐私保证的加密云数据搜索服务至关重要。考虑到云中的大量数据用户和大量的外包数据文件,这个问题尤其具有挑战性,因为它极难满足性能、系统可用性和高水平用户搜索体验的实际要求。本文研究了这些挑战,并定义了加密云数据的模糊关键字搜索问题,这是云计算中有效利用数据需要探索的问题。模糊关键字搜索的目的是在保护关键字隐私的同时,容纳不同用户搜索输入中的各种错别字和表示不一致,以获得可接受的系统可用性和整体用户搜索体验。为了进一步丰富安全云数据利用服务的范围,我们还研究了模糊搜索的概念如何自然地支持相似搜索,这是一种广泛应用于信息检索的基础和强大工具。我们描述了现有可搜索加密技术尚未遇到的挑战,并讨论了这些新搜索功能成为现实的研究方向和可能的技术方法。对拟议研究的调查可以成为云服务提供商安全有效地从云基础设施向其企业和个人客户提供价值的关键,从而大大鼓励大规模采用云计算。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
PARSE 2.0: A Tool for Parallel Application Run Time Behavior Evaluation Localized Energy-Aware Fault Management in Relay Based Sensor Networks Performance Analysis of DSR Protocol under the Influence of RPGM Model in Mobile Ad-hoc Networks A Quantitative Comparison of Energy Consumption and WSN Lifetime for LEACH and LEACH-SM Cooperative File Sharing in Hybrid Delay Tolerant Networks
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1