SlideShare a Scribd company logo
O Cryptography, derived from Greek words
krptos- secret and graphy- writing
O It is the science of using mathematics to hide
information.
O With the help of Cryptography we can store
sensitive information, or transmit it over insecure
networks (such as the internet) so that it can only
be read by the intended recipient.
O Cryptography is the study or science of secret
communication, while encryption is simply a
component of that science. Encryption is the
process of hiding information, through the use of
ciphers, from everybody except for the one who
has the key.
O Encryption is a direct application of cryptography
O In today's digital world, there are two major types
of ciphers--one based on symmetric and one
based on asymmetric key algorithms.
O Plaintext: message to be sent, in readable
form
O Ciphertext: message in coded form,
unreadable without special information such
as a key
O cryptanalysis: cracking a code - attempting
to decrypt without the required special
information
O Key: A key in cryptography is a long
sequence of bits used by encryption and
decryption algorithms.
O Encryption is the process of converting
readable data (called the plaintext) into a
form which hides its content, called the
ciphertext.
O Decryption is the reverse process, with a
ciphertext converted back into the
corresponding plaintext.
O A given encryption algorithm takes the
plaintext , and a key, and alters the original
message mathematically based on the key's
bits to create a new encrypted message.
O Likewise, a decryption algorithm takes an
encrypted message and restores it to its
original form using one or more keys
O When a user encodes a file, another user
cannot decode and read the file without the
decryption key
O To decode cipher, a user must possess the
appropriate decryption key.
O A decryption key consists of a random string of
numbers, from 40 through 2,000 bits in length.
The key imposes a decryption algorithm onto the
data.
O This decryption algorithm reverses the
encryption algorithm, returning the data to
plaintext.
O The longer the encryption key is, the more
difficult it is to decode. For a 40-bit encryption
key, over one trillion possible decryption keys
exist.
O SYMMETRIC ENCRYPTION: This is the most
common type of encryption and uses the
same key for encoding and decoding data.
This key is known as a session key.
O ASYMMETRIC ENCRYPTION(Public-key
encryption): uses two different keys, a
public key and a private key. One key
encodes the message and the other
decodes it. The public key is widely
distributed while the private key is secret.
O Searchable encryption is a cryptography primitive
that enables users to search through outsourced
encrypted data without exposing keywords to the
untrusted server [song et al[2]]
O Having the ability of secure search through
outsourced encrypted data should be the core
feature of any searchable encryption
O Secure search through outsourced encrypted data
means authorized user is the only one can search
for any keywords within outsourced data and
unauthorized parties should not learn anything
during search procedure.
O The immediate application for searchable
encryption is cloud storage where the client
outsources its storage, but encrypts its ļ¬les for
conļ¬dentiality beforehand and retains the key.
O The advantage compared to standard encryption
is that the cloud can perform the search operation
without the key and only return a matching subset
for a query.
O Hence, the client does not have to download the
entire data set and search himself.
O In many cases this is an enormous eļ¬ƒciency gain.
O SE consists of three operations.
O ENCRYPTION: Encryption transforms a keyword/file pair
using a secret key into a ciphertext.
O TOKEN GENERATION: Using the secret key one can
generate a search token for a specific keyword. Using this
token,
O SEARCH: one can then search in a set of ciphertexts for
those that match the keyword. Hence, one can encrypt, but
still search without decryption.
O searchable encryption is composed of two steps
O Storing a special encryption of data on the untrusted third
party (Store phase),
O Make an encrypted search query to retrieve the desired
information (Search phase).
O Searchable encryption can be categorized in
two fields according to number of involved
key:
O Symmetric searchable encryption (SSE)
O Asymmetric searchable encryption (ASE)
O The main feature of this model of private
search is that the user, who encrypts data, is
the only user who can perform a search or
an update.
O This fact is due to the use of a private key
that belongs only to the user and who
cannot share with others.
O The symmetric scheme was introduced by
GOLDREICH AND R. OSTROVSKY [1] and
supposes that the user encrypts his data
with a secret key, stores it in the untrusted
server, can retrieve his encrypted data then
decrypts it with the same key.
O The first searchable symmetric encryption
scheme proposed by Song et al[2]. In the
Songā€™s scheme, all the words within every
document have to be encrypted in a double
layer ciphertext form called inner layer and
outer layer.
O Server strips the outer layer by using the
trapdoor and checks the inner layer. In order
to make the same verifiable inner layer
structure trapdoor and ciphertext have to be
generated by using the same keyword.
O The first index-based SSE proposed by Goh
[3]. Gohā€™s scheme is based on making a
secure index of all the words in a document,
which uses multiple different hash
functions.
O The method of making that index and
searching within that is called bloom filter,
which is used in spread spectrum of
applications in various areas.
O Then Curtmola [8] proposed another two
inverted index-based SSEs, where its search
time cost is O(1).
O SSE Consists of four (4) algorithms:
1. Keygen (k): This algorithm takes a security
parameter k and generates a secret key K.
2. BuildIndex (K, D): The index I is produced by
using the secret key K and the document
collection D.
3. Trapdoor(K, w): The trapdoor Tw of the word
w is produced from w and the secret key K.
4. Search(I, T w): Search documents in the
collection D that contain the keyword w
using the trapdoor Tw.
1. Fuzzy Keyword Search over Encrypted Data
in Cloud Computing (FKSEDCC) proposed by
Jin Li. et al. [7]
2. Phrase Search over Encrypted Data with
Symmetric Encryption Scheme proposed by
Tang et al.[9]
O The multiuser search allows the owner of the
encrypted data to share with other users the
right to search over these encrypted data.
O In the M-SSE, the data owner can grant or revoke a
user from the group of privileged users.
O To add a user, the owner has to give him a key Ku
O The server manages the user revocation by
checking for each search queries whether the user
has his privilege or not.
O Indeed, each time the owner adds or deletes a user,
he generates a new value R, and then he sends it to
the server. Using this information, the server may
verify the permission of the user.
the group of revoked users changes
dynamically, and thus even if a user has a key he
cannot retrieve the documents using his trapdoor.
O ASE is a scheme that enables other parties
besides the data owner to make queries to
the server, as long as having access to the
ownerā€™s public key
O Public key Encryption with Keyword Search
(PEKS) is a primitive with such functionality
that provides delegation of exact-match
searches. Boneh et al. in 2004 and Baek et
al
O ASE schemes are appropriate in an setting
where the party searching over the data is
diļ¬€erent from the party that generates it.
O ASE allows searches to be carried over
cipher-texts, through delegation, and by
means of trapdoors issued by the owner of
the data.
O As it is important that cipher-texts preserve
data privacy, it is also important that
trapdoors do not expose the user's search
criteria.
O The main advantage of ASE is functionality
while the main disadvantages are
ineļ¬ƒciency and weaker security guarantees.
O ESE schemes are appropriate in any setting where the
party that searches over the data is diļ¬€erent from the
party that generates it and where the keywords are
hard to guess
O The main advantage of eļ¬ƒcient ASE is that search is
more eļ¬ƒcient than (plain) ASE.
O The main disadvantage, however,is that ESE schemes
are also vulnerable to dictionary attacks.
O mSSE schemes are appropriate in any setting where
many parties wish to search over data that is
generated
O In a mSSE scheme, in addition to being able to
encrypt indexes and generate tokens, the owner of the
data can also add and revoke usersā€™ search privileges
over his data.
O The concept of a PEKS scheme was proposed by
Boneh et al.[10] and Baek et al[11]. who extended
PEKS scheme into a secure channel free PEKS
scheme (SCF-PEKS) which removes the assumption,
a secure channel between users and a server.
O Public Key Encryption with Keyword Search (PEKS in
short) scheme, which is also name searchable public-
key encryption scheme, enables one to search
encrypted documents on the untrusted server without
revealing any information.
O To construct a secure PEKS or SCF-PEKS scheme with
privacy protection, there are some security
requirements needed to achieve as follows:
O Trapdoor indistinguishability
O Ciphertext indistinguishability
O Authorized identity protection (Anonymity)
O User authentication
O Each user may have access to a different set of
documents stored on the server; this can be achieved
by ensuring that each document is encrypted with a
separate per-document key, and arranging for each
userā€™s client machine to have access to the keys of
the documents that the corresponding user has
access to. Popa et al [15]
O Many applications, such as document sharing, chat,
forums, and calendars, support search over
documents shared by different users.
O This cryptographic scheme that allows a client to
provide a single search token to the server, but still
allows the server to search for that tokenā€™s word in
documents encrypted with different keys
O The scheme hides the content of the document and
the words one searches for, and the only information
the server learns is whether some word being
searched for matches a word in a document.
1. O. Goldreich and R. Ostrovsky. Software protection and
simulation on Oblivious RAMs.Journal of the ACM,
43(3):431ā€“473, May 1996.
2. D. Song, D. Wagner and A. Perrig. Practical Techniques
for Searches on Encrypted Data, IEEE Symposium on
Security and Privacy (S&P), 2000, pp.44-55
3. Euā€“Jin Goh. Secure indexes. In the Cryptology ePrint
Archive, Report 2003/216, March 2004.
4. Reza Curtmola, Juan Garay, Seny Kamara, and Rafail
Ostrovsky. Searchable Symmetric Encryption:
Improved Definitions and Efficient Constructions,
2006.
5. Y. C. Chang and M. Mitzenmacher. Privacy preserving
keyword searches on remote encrypted data. In
Applied Cryptography and Network Security
Conference (ACNS), 2005.
6. P. Golle, J. Staddon, and B. Waters. Secure conjunctive
keyword search over encrypted data. In M.
Jakobsson,M. Yung, and J. Zhou, editors, Applied
Cryptography and Network Security Conference
(ACNS), volume 3089 of LNCS, pages 31ā€“45.
Springer-Verlag, 2004.
7. Li, H.,Wang, C., Cao, N., Ren, K., and Lou, W. (2010),
ā€œFuzzy Keyword search over encrypted data in cloud
computingā€in Proceedings of IEEE INFOCOM 10 Mini-
Conference, pp 1-5,doi:10.1109/INFCOM.
2010.5462196
8. R. Curtmola, J. Garay, S. Kamara, and R. Ostrovsky.
"Searchable symmetric encryption: improved
definitions and efficient constructions," in Proceedings
of the 13th ACM conference on Computer and
communications security, pp. 79-88.
9. Y. Tang, D. Gu, N. Ding, and H. Lu. "Phrase Search
over Encrypted Data with Symmetric Encryption
Scheme," in Distributed Computing Systems
Workshops (ICDCSW), 2012 32nd International
Conference on, pp. 471-480.
10. D. Boneh, G. D. Crescenzom, R. Ostrovsky, and G.
Rersiano, ā€œPublic key encryption with keyword
search,ā€ in Advances in Cryptology ā€“ EUROCRYPT
2004, Lecture Notes in Computer Science, vol.
3027,pp. 506{522, Interlaken, Switzerland,
2004. Springer Berlin/Heidelberg.
11. J. Baek, R. Safavi-Naini, and W. Susilo, ā€œPublic key
encryption with keyword search revisited,ā€ in
ICCSA 2008, vol. 5072 of Lecture Notes in
Computer Science, pp. 1249{1259, Perugia, Italy,
2008 Springer Berlin/Heidelberg.
12. Karilyn Lao, Richman Lo, & Robert Mastronardi
ā€œENCRYPTIONā€. Presentation
13. Bellare, M., Boldyreva, A., Oā€™Neill, A.:Deterministic
and eļ¬ƒciently searchable encryption. In:
Menezes, A. (ed.) CRYPTO 2007. LNCS, vol. 4622,
pp. 535ā€“552.Springer, Heidelberg (2007)
14. Moataz Tarik.ā€Searcheable Encryptionā€, Alcatel-
Lucent Bell Labs (2012)
15. R. Popa and N. Zeldovich, ā€œMulti-Key Searchable
Encryptionā€. MIT CSAIL

More Related Content

What's hot

Steganoghraphy
 Steganoghraphy Steganoghraphy
Steganoghraphy
Abhishek Singh
Ā 
Intro to modern cryptography
Intro to modern cryptographyIntro to modern cryptography
Intro to modern cryptography
zahid-mian
Ā 
Introduction to Cryptography
Introduction to CryptographyIntroduction to Cryptography
Introduction to Cryptography
Md. Afif Al Mamun
Ā 
Steganography
SteganographySteganography
Steganography
Madhani Harsh
Ā 
Cryptography and Network Security
Cryptography and Network SecurityCryptography and Network Security
Cryptography and Network Security
Pa Van Tanku
Ā 
Steganography
Steganography Steganography
Steganography
Humajabeen31
Ā 
RSA Algorithm - Public Key Cryptography
RSA Algorithm - Public Key CryptographyRSA Algorithm - Public Key Cryptography
RSA Algorithm - Public Key Cryptography
Md. Shafiul Alam Sagor
Ā 
Diffie-hellman algorithm
Diffie-hellman algorithmDiffie-hellman algorithm
Diffie-hellman algorithm
Computer_ at_home
Ā 
CNS - Unit - 1 - Introduction
CNS - Unit - 1 - IntroductionCNS - Unit - 1 - Introduction
CNS - Unit - 1 - Introduction
Gyanmanjari Institute Of Technology
Ā 
Cryptographic Hashing Functions
Cryptographic Hashing FunctionsCryptographic Hashing Functions
Cryptographic Hashing FunctionsYusuf Uzun
Ā 
Steganography
SteganographySteganography
Steganography
Jaykrishna Thakkar
Ā 
Cryptography
CryptographyCryptography
Forensic imaging tools
Forensic imaging tools Forensic imaging tools
Forensic imaging tools
Dr. Richard Adams
Ā 
Explain in detail about a model for network security
Explain in detail about a model for network securityExplain in detail about a model for network security
Explain in detail about a model for network security
PVSaiGanesh
Ā 
CNS - Unit - 5 - Cryptographic Hash Functions
CNS - Unit - 5 - Cryptographic Hash FunctionsCNS - Unit - 5 - Cryptographic Hash Functions
CNS - Unit - 5 - Cryptographic Hash Functions
Gyanmanjari Institute Of Technology
Ā 
Types of Hacker
 Types of Hacker Types of Hacker
Types of Hacker
Mukund Kumar Bharti
Ā 
File Carving
File CarvingFile Carving
File Carving
Aakarsh Raj
Ā 
Cryptographic algorithms
Cryptographic algorithmsCryptographic algorithms
Cryptographic algorithms
Anamika Singh
Ā 

What's hot (20)

Steganoghraphy
 Steganoghraphy Steganoghraphy
Steganoghraphy
Ā 
Intro to modern cryptography
Intro to modern cryptographyIntro to modern cryptography
Intro to modern cryptography
Ā 
Introduction to Cryptography
Introduction to CryptographyIntroduction to Cryptography
Introduction to Cryptography
Ā 
Steganography
SteganographySteganography
Steganography
Ā 
Cryptography and Network Security
Cryptography and Network SecurityCryptography and Network Security
Cryptography and Network Security
Ā 
Steganography
Steganography Steganography
Steganography
Ā 
RSA Algorithm - Public Key Cryptography
RSA Algorithm - Public Key CryptographyRSA Algorithm - Public Key Cryptography
RSA Algorithm - Public Key Cryptography
Ā 
Diffie-hellman algorithm
Diffie-hellman algorithmDiffie-hellman algorithm
Diffie-hellman algorithm
Ā 
cryptography
cryptographycryptography
cryptography
Ā 
CNS - Unit - 1 - Introduction
CNS - Unit - 1 - IntroductionCNS - Unit - 1 - Introduction
CNS - Unit - 1 - Introduction
Ā 
Cryptographic Hashing Functions
Cryptographic Hashing FunctionsCryptographic Hashing Functions
Cryptographic Hashing Functions
Ā 
Steganography
SteganographySteganography
Steganography
Ā 
Cryptography
CryptographyCryptography
Cryptography
Ā 
Forensic imaging tools
Forensic imaging tools Forensic imaging tools
Forensic imaging tools
Ā 
Explain in detail about a model for network security
Explain in detail about a model for network securityExplain in detail about a model for network security
Explain in detail about a model for network security
Ā 
CNS - Unit - 5 - Cryptographic Hash Functions
CNS - Unit - 5 - Cryptographic Hash FunctionsCNS - Unit - 5 - Cryptographic Hash Functions
CNS - Unit - 5 - Cryptographic Hash Functions
Ā 
Types of Hacker
 Types of Hacker Types of Hacker
Types of Hacker
Ā 
File Carving
File CarvingFile Carving
File Carving
Ā 
Cryptographic algorithms
Cryptographic algorithmsCryptographic algorithms
Cryptographic algorithms
Ā 
Steganography ppt
Steganography pptSteganography ppt
Steganography ppt
Ā 

Viewers also liked

Searchable Encryption
Searchable EncryptionSearchable Encryption
Searchable Encryption
Nagendra Posani
Ā 
Searchable Encryption Systems
Searchable Encryption SystemsSearchable Encryption Systems
Searchable Encryption Systems
Christopher Frenz
Ā 
A Searchable Symmetric Key Cipher System
A Searchable Symmetric Key Cipher SystemA Searchable Symmetric Key Cipher System
A Searchable Symmetric Key Cipher System
Kelum Senanayake
Ā 
Attacking Turkish Texts Encrypted by Homophonic Cipher
Attacking Turkish Texts Encrypted by Homophonic CipherAttacking Turkish Texts Encrypted by Homophonic Cipher
Attacking Turkish Texts Encrypted by Homophonic Cipher
Sefik Ilkin Serengil
Ā 
DUAL-SERVER PUBLIC-KEY ENCRYPTION WITH KEYWORD SEARCH FOR SECURE CLOUD STORAGE
DUAL-SERVER PUBLIC-KEY ENCRYPTION WITH KEYWORD SEARCH FOR SECURE CLOUD STORAGEDUAL-SERVER PUBLIC-KEY ENCRYPTION WITH KEYWORD SEARCH FOR SECURE CLOUD STORAGE
DUAL-SERVER PUBLIC-KEY ENCRYPTION WITH KEYWORD SEARCH FOR SECURE CLOUD STORAGE
Nexgen Technology
Ā 
Secure Data Sharing in Cloud (SDSC)
Secure Data Sharing in Cloud (SDSC)Secure Data Sharing in Cloud (SDSC)
Secure Data Sharing in Cloud (SDSC)
Jishnu Pradeep
Ā 
Analysis of Searchable Encryption
Analysis of Searchable EncryptionAnalysis of Searchable Encryption
Analysis of Searchable Encryption
Nagendra Posani
Ā 
Security Risks & Vulnerabilities in Skype
Security Risks & Vulnerabilities in SkypeSecurity Risks & Vulnerabilities in Skype
Security Risks & Vulnerabilities in Skype
Kelum Senanayake
Ā 
Node.js Introduction
Node.js IntroductionNode.js Introduction
Node.js Introduction
Kelum Senanayake
Ā 
Discrete Logarithmic Problem- Basis of Elliptic Curve Cryptosystems
Discrete Logarithmic Problem- Basis of Elliptic Curve CryptosystemsDiscrete Logarithmic Problem- Basis of Elliptic Curve Cryptosystems
Discrete Logarithmic Problem- Basis of Elliptic Curve Cryptosystems
NIT Sikkim
Ā 
PaaSword - Distributed Searchable Encryption Engine
PaaSword - Distributed Searchable Encryption EnginePaaSword - Distributed Searchable Encryption Engine
PaaSword - Distributed Searchable Encryption Engine
PaaSword EU Project
Ā 
Yoga for glowing skin
Yoga for glowing skinYoga for glowing skin
Yoga for glowing skin
Build My Fitness
Ā 
Top 10 Tips for Getting a Good Night's Sleep
Top 10 Tips for Getting a Good Night's SleepTop 10 Tips for Getting a Good Night's Sleep
Top 10 Tips for Getting a Good Night's Sleep
Dana-Farber Cancer Institute
Ā 
Cloud security ppt
Cloud security pptCloud security ppt
Cloud security ppt
Venkatesh Chary
Ā 
Steve Rice: Travel Big in a Small Island - Puerto Rico
Steve Rice: Travel Big in a Small Island - Puerto RicoSteve Rice: Travel Big in a Small Island - Puerto Rico
Steve Rice: Travel Big in a Small Island - Puerto Rico
Steve Rice Los Gatos
Ā 
Though The Lens of an iPhone: Alaska
Though The Lens of an iPhone: AlaskaThough The Lens of an iPhone: Alaska
Though The Lens of an iPhone: Alaska
Paul Brown
Ā 
CSS Grid Layout for Topconf, Linz
CSS Grid Layout for Topconf, LinzCSS Grid Layout for Topconf, Linz
CSS Grid Layout for Topconf, Linz
Rachel Andrew
Ā 
Mobile Is Eating the World (2016)
Mobile Is Eating the World (2016)Mobile Is Eating the World (2016)
Mobile Is Eating the World (2016)
a16z
Ā 
Mobile-First SEO - The Marketers Edition #3XEDigital
Mobile-First SEO - The Marketers Edition #3XEDigitalMobile-First SEO - The Marketers Edition #3XEDigital
Mobile-First SEO - The Marketers Edition #3XEDigital
Aleyda SolĆ­s
Ā 

Viewers also liked (20)

Searchable Encryption
Searchable EncryptionSearchable Encryption
Searchable Encryption
Ā 
Searchable Encryption Systems
Searchable Encryption SystemsSearchable Encryption Systems
Searchable Encryption Systems
Ā 
A Searchable Symmetric Key Cipher System
A Searchable Symmetric Key Cipher SystemA Searchable Symmetric Key Cipher System
A Searchable Symmetric Key Cipher System
Ā 
Attacking Turkish Texts Encrypted by Homophonic Cipher
Attacking Turkish Texts Encrypted by Homophonic CipherAttacking Turkish Texts Encrypted by Homophonic Cipher
Attacking Turkish Texts Encrypted by Homophonic Cipher
Ā 
DUAL-SERVER PUBLIC-KEY ENCRYPTION WITH KEYWORD SEARCH FOR SECURE CLOUD STORAGE
DUAL-SERVER PUBLIC-KEY ENCRYPTION WITH KEYWORD SEARCH FOR SECURE CLOUD STORAGEDUAL-SERVER PUBLIC-KEY ENCRYPTION WITH KEYWORD SEARCH FOR SECURE CLOUD STORAGE
DUAL-SERVER PUBLIC-KEY ENCRYPTION WITH KEYWORD SEARCH FOR SECURE CLOUD STORAGE
Ā 
Gırgır sunum
Gırgır sunum Gırgır sunum
Gırgır sunum
Ā 
Secure Data Sharing in Cloud (SDSC)
Secure Data Sharing in Cloud (SDSC)Secure Data Sharing in Cloud (SDSC)
Secure Data Sharing in Cloud (SDSC)
Ā 
Analysis of Searchable Encryption
Analysis of Searchable EncryptionAnalysis of Searchable Encryption
Analysis of Searchable Encryption
Ā 
Security Risks & Vulnerabilities in Skype
Security Risks & Vulnerabilities in SkypeSecurity Risks & Vulnerabilities in Skype
Security Risks & Vulnerabilities in Skype
Ā 
Node.js Introduction
Node.js IntroductionNode.js Introduction
Node.js Introduction
Ā 
Discrete Logarithmic Problem- Basis of Elliptic Curve Cryptosystems
Discrete Logarithmic Problem- Basis of Elliptic Curve CryptosystemsDiscrete Logarithmic Problem- Basis of Elliptic Curve Cryptosystems
Discrete Logarithmic Problem- Basis of Elliptic Curve Cryptosystems
Ā 
PaaSword - Distributed Searchable Encryption Engine
PaaSword - Distributed Searchable Encryption EnginePaaSword - Distributed Searchable Encryption Engine
PaaSword - Distributed Searchable Encryption Engine
Ā 
Yoga for glowing skin
Yoga for glowing skinYoga for glowing skin
Yoga for glowing skin
Ā 
Top 10 Tips for Getting a Good Night's Sleep
Top 10 Tips for Getting a Good Night's SleepTop 10 Tips for Getting a Good Night's Sleep
Top 10 Tips for Getting a Good Night's Sleep
Ā 
Cloud security ppt
Cloud security pptCloud security ppt
Cloud security ppt
Ā 
Steve Rice: Travel Big in a Small Island - Puerto Rico
Steve Rice: Travel Big in a Small Island - Puerto RicoSteve Rice: Travel Big in a Small Island - Puerto Rico
Steve Rice: Travel Big in a Small Island - Puerto Rico
Ā 
Though The Lens of an iPhone: Alaska
Though The Lens of an iPhone: AlaskaThough The Lens of an iPhone: Alaska
Though The Lens of an iPhone: Alaska
Ā 
CSS Grid Layout for Topconf, Linz
CSS Grid Layout for Topconf, LinzCSS Grid Layout for Topconf, Linz
CSS Grid Layout for Topconf, Linz
Ā 
Mobile Is Eating the World (2016)
Mobile Is Eating the World (2016)Mobile Is Eating the World (2016)
Mobile Is Eating the World (2016)
Ā 
Mobile-First SEO - The Marketers Edition #3XEDigital
Mobile-First SEO - The Marketers Edition #3XEDigitalMobile-First SEO - The Marketers Edition #3XEDigital
Mobile-First SEO - The Marketers Edition #3XEDigital
Ā 

Similar to Search on encrypted data

Key aggregate searchable encryption (kase) for group data sharing via cloud s...
Key aggregate searchable encryption (kase) for group data sharing via cloud s...Key aggregate searchable encryption (kase) for group data sharing via cloud s...
Key aggregate searchable encryption (kase) for group data sharing via cloud s...
CloudTechnologies
Ā 
Data encryption
Data encryptionData encryption
Data encryption
Balvant Biradar
Ā 
SPCHS Construction for Expeditious Keyword Search in Cipher Text
SPCHS Construction for Expeditious Keyword Search in Cipher TextSPCHS Construction for Expeditious Keyword Search in Cipher Text
SPCHS Construction for Expeditious Keyword Search in Cipher Text
IJMTST Journal
Ā 
A comparative study of symmetric key algorithm des, aes and blowfish for vide...
A comparative study of symmetric key algorithm des, aes and blowfish for vide...A comparative study of symmetric key algorithm des, aes and blowfish for vide...
A comparative study of symmetric key algorithm des, aes and blowfish for vide...
pankaj kumari
Ā 
Php text processing by softroniics
Php text processing by softroniicsPhp text processing by softroniics
Php text processing by softroniics
aswin tbbc
Ā 
A Review Paper on Secure authentication and data sharing in cloud storage usi...
A Review Paper on Secure authentication and data sharing in cloud storage usi...A Review Paper on Secure authentication and data sharing in cloud storage usi...
A Review Paper on Secure authentication and data sharing in cloud storage usi...
ijsrd.com
Ā 
A Survey on Generation and Evolution of Various Cryptographic Techniques
A Survey on Generation and Evolution of Various Cryptographic TechniquesA Survey on Generation and Evolution of Various Cryptographic Techniques
A Survey on Generation and Evolution of Various Cryptographic Techniques
IRJET Journal
Ā 
Key aggregate searchable encryption (kase) for group data sharing via cloud s...
Key aggregate searchable encryption (kase) for group data sharing via cloud s...Key aggregate searchable encryption (kase) for group data sharing via cloud s...
Key aggregate searchable encryption (kase) for group data sharing via cloud s...
Pvrtechnologies Nellore
Ā 
A Study On Cryptographic Techniques
A Study On Cryptographic TechniquesA Study On Cryptographic Techniques
A Study On Cryptographic Techniques
Stacy Taylor
Ā 
privacy preserving forenciscs of encyrpted data.pptx
privacy preserving forenciscs of encyrpted data.pptxprivacy preserving forenciscs of encyrpted data.pptx
privacy preserving forenciscs of encyrpted data.pptx
GayathriSanthosh11
Ā 
L017136269
L017136269L017136269
L017136269
IOSR Journals
Ā 
Comparison of Various Encryption Algorithms and Techniques for improving secu...
Comparison of Various Encryption Algorithms and Techniques for improving secu...Comparison of Various Encryption Algorithms and Techniques for improving secu...
Comparison of Various Encryption Algorithms and Techniques for improving secu...
IOSR Journals
Ā 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
IJERD Editor
Ā 
A Survey on Cryptographic Techniques for Network Security.pdf
A Survey on Cryptographic Techniques for Network Security.pdfA Survey on Cryptographic Techniques for Network Security.pdf
A Survey on Cryptographic Techniques for Network Security.pdf
Yasmine Anino
Ā 
N45028390
N45028390N45028390
N45028390
IJERA Editor
Ā 
Iaetsd enhanced cryptography algorithm for providing
Iaetsd enhanced cryptography algorithm for providingIaetsd enhanced cryptography algorithm for providing
Iaetsd enhanced cryptography algorithm for providing
Iaetsd Iaetsd
Ā 
Caesar Cipher Method Design and Implementation Based on Java, C++, and Python...
Caesar Cipher Method Design and Implementation Based on Java, C++, and Python...Caesar Cipher Method Design and Implementation Based on Java, C++, and Python...
Caesar Cipher Method Design and Implementation Based on Java, C++, and Python...
IJCSIS Research Publications
Ā 
Different date block size using to evaluate the performance between different...
Different date block size using to evaluate the performance between different...Different date block size using to evaluate the performance between different...
Different date block size using to evaluate the performance between different...
IJCNCJournal
Ā 
A Review on Various Most Common Symmetric Encryptions Algorithms
A Review on Various Most Common Symmetric Encryptions AlgorithmsA Review on Various Most Common Symmetric Encryptions Algorithms
A Review on Various Most Common Symmetric Encryptions Algorithms
ijsrd.com
Ā 
ASCII Value Based Encryption System (AVB)
ASCII Value Based Encryption System (AVB)ASCII Value Based Encryption System (AVB)
ASCII Value Based Encryption System (AVB)
IJERA Editor
Ā 

Similar to Search on encrypted data (20)

Key aggregate searchable encryption (kase) for group data sharing via cloud s...
Key aggregate searchable encryption (kase) for group data sharing via cloud s...Key aggregate searchable encryption (kase) for group data sharing via cloud s...
Key aggregate searchable encryption (kase) for group data sharing via cloud s...
Ā 
Data encryption
Data encryptionData encryption
Data encryption
Ā 
SPCHS Construction for Expeditious Keyword Search in Cipher Text
SPCHS Construction for Expeditious Keyword Search in Cipher TextSPCHS Construction for Expeditious Keyword Search in Cipher Text
SPCHS Construction for Expeditious Keyword Search in Cipher Text
Ā 
A comparative study of symmetric key algorithm des, aes and blowfish for vide...
A comparative study of symmetric key algorithm des, aes and blowfish for vide...A comparative study of symmetric key algorithm des, aes and blowfish for vide...
A comparative study of symmetric key algorithm des, aes and blowfish for vide...
Ā 
Php text processing by softroniics
Php text processing by softroniicsPhp text processing by softroniics
Php text processing by softroniics
Ā 
A Review Paper on Secure authentication and data sharing in cloud storage usi...
A Review Paper on Secure authentication and data sharing in cloud storage usi...A Review Paper on Secure authentication and data sharing in cloud storage usi...
A Review Paper on Secure authentication and data sharing in cloud storage usi...
Ā 
A Survey on Generation and Evolution of Various Cryptographic Techniques
A Survey on Generation and Evolution of Various Cryptographic TechniquesA Survey on Generation and Evolution of Various Cryptographic Techniques
A Survey on Generation and Evolution of Various Cryptographic Techniques
Ā 
Key aggregate searchable encryption (kase) for group data sharing via cloud s...
Key aggregate searchable encryption (kase) for group data sharing via cloud s...Key aggregate searchable encryption (kase) for group data sharing via cloud s...
Key aggregate searchable encryption (kase) for group data sharing via cloud s...
Ā 
A Study On Cryptographic Techniques
A Study On Cryptographic TechniquesA Study On Cryptographic Techniques
A Study On Cryptographic Techniques
Ā 
privacy preserving forenciscs of encyrpted data.pptx
privacy preserving forenciscs of encyrpted data.pptxprivacy preserving forenciscs of encyrpted data.pptx
privacy preserving forenciscs of encyrpted data.pptx
Ā 
L017136269
L017136269L017136269
L017136269
Ā 
Comparison of Various Encryption Algorithms and Techniques for improving secu...
Comparison of Various Encryption Algorithms and Techniques for improving secu...Comparison of Various Encryption Algorithms and Techniques for improving secu...
Comparison of Various Encryption Algorithms and Techniques for improving secu...
Ā 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
Ā 
A Survey on Cryptographic Techniques for Network Security.pdf
A Survey on Cryptographic Techniques for Network Security.pdfA Survey on Cryptographic Techniques for Network Security.pdf
A Survey on Cryptographic Techniques for Network Security.pdf
Ā 
N45028390
N45028390N45028390
N45028390
Ā 
Iaetsd enhanced cryptography algorithm for providing
Iaetsd enhanced cryptography algorithm for providingIaetsd enhanced cryptography algorithm for providing
Iaetsd enhanced cryptography algorithm for providing
Ā 
Caesar Cipher Method Design and Implementation Based on Java, C++, and Python...
Caesar Cipher Method Design and Implementation Based on Java, C++, and Python...Caesar Cipher Method Design and Implementation Based on Java, C++, and Python...
Caesar Cipher Method Design and Implementation Based on Java, C++, and Python...
Ā 
Different date block size using to evaluate the performance between different...
Different date block size using to evaluate the performance between different...Different date block size using to evaluate the performance between different...
Different date block size using to evaluate the performance between different...
Ā 
A Review on Various Most Common Symmetric Encryptions Algorithms
A Review on Various Most Common Symmetric Encryptions AlgorithmsA Review on Various Most Common Symmetric Encryptions Algorithms
A Review on Various Most Common Symmetric Encryptions Algorithms
Ā 
ASCII Value Based Encryption System (AVB)
ASCII Value Based Encryption System (AVB)ASCII Value Based Encryption System (AVB)
ASCII Value Based Encryption System (AVB)
Ā 

Recently uploaded

The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
Ā 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
Ā 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
Ā 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
Ā 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
Ā 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
Ā 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
nkrafacyberclub
Ā 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Sri Ambati
Ā 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
Ā 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
Product School
Ā 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
Ā 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
Ā 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
Ā 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
Ā 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
Ā 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
Ā 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Ramesh Iyer
Ā 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
Ā 
Dev Dives: Train smarter, not harder ā€“ active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder ā€“ active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder ā€“ active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder ā€“ active learning and UiPath LLMs for do...
UiPathCommunity
Ā 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
DianaGray10
Ā 

Recently uploaded (20)

The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Ā 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Ā 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
Ā 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
Ā 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
Ā 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
Ā 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Ā 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Ā 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
Ā 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
Ā 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Ā 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
Ā 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
Ā 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Ā 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
Ā 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Ā 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Ā 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Ā 
Dev Dives: Train smarter, not harder ā€“ active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder ā€“ active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder ā€“ active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder ā€“ active learning and UiPath LLMs for do...
Ā 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
Ā 

Search on encrypted data

  • 1.
  • 2. O Cryptography, derived from Greek words krptos- secret and graphy- writing O It is the science of using mathematics to hide information. O With the help of Cryptography we can store sensitive information, or transmit it over insecure networks (such as the internet) so that it can only be read by the intended recipient.
  • 3. O Cryptography is the study or science of secret communication, while encryption is simply a component of that science. Encryption is the process of hiding information, through the use of ciphers, from everybody except for the one who has the key. O Encryption is a direct application of cryptography O In today's digital world, there are two major types of ciphers--one based on symmetric and one based on asymmetric key algorithms.
  • 4. O Plaintext: message to be sent, in readable form O Ciphertext: message in coded form, unreadable without special information such as a key O cryptanalysis: cracking a code - attempting to decrypt without the required special information O Key: A key in cryptography is a long sequence of bits used by encryption and decryption algorithms.
  • 5. O Encryption is the process of converting readable data (called the plaintext) into a form which hides its content, called the ciphertext. O Decryption is the reverse process, with a ciphertext converted back into the corresponding plaintext.
  • 6. O A given encryption algorithm takes the plaintext , and a key, and alters the original message mathematically based on the key's bits to create a new encrypted message. O Likewise, a decryption algorithm takes an encrypted message and restores it to its original form using one or more keys O When a user encodes a file, another user cannot decode and read the file without the decryption key
  • 7. O To decode cipher, a user must possess the appropriate decryption key. O A decryption key consists of a random string of numbers, from 40 through 2,000 bits in length. The key imposes a decryption algorithm onto the data. O This decryption algorithm reverses the encryption algorithm, returning the data to plaintext. O The longer the encryption key is, the more difficult it is to decode. For a 40-bit encryption key, over one trillion possible decryption keys exist.
  • 8. O SYMMETRIC ENCRYPTION: This is the most common type of encryption and uses the same key for encoding and decoding data. This key is known as a session key. O ASYMMETRIC ENCRYPTION(Public-key encryption): uses two different keys, a public key and a private key. One key encodes the message and the other decodes it. The public key is widely distributed while the private key is secret.
  • 9.
  • 10.
  • 11. O Searchable encryption is a cryptography primitive that enables users to search through outsourced encrypted data without exposing keywords to the untrusted server [song et al[2]] O Having the ability of secure search through outsourced encrypted data should be the core feature of any searchable encryption O Secure search through outsourced encrypted data means authorized user is the only one can search for any keywords within outsourced data and unauthorized parties should not learn anything during search procedure.
  • 12. O The immediate application for searchable encryption is cloud storage where the client outsources its storage, but encrypts its ļ¬les for conļ¬dentiality beforehand and retains the key. O The advantage compared to standard encryption is that the cloud can perform the search operation without the key and only return a matching subset for a query. O Hence, the client does not have to download the entire data set and search himself. O In many cases this is an enormous eļ¬ƒciency gain.
  • 13. O SE consists of three operations. O ENCRYPTION: Encryption transforms a keyword/file pair using a secret key into a ciphertext. O TOKEN GENERATION: Using the secret key one can generate a search token for a specific keyword. Using this token, O SEARCH: one can then search in a set of ciphertexts for those that match the keyword. Hence, one can encrypt, but still search without decryption. O searchable encryption is composed of two steps O Storing a special encryption of data on the untrusted third party (Store phase), O Make an encrypted search query to retrieve the desired information (Search phase).
  • 14.
  • 15. O Searchable encryption can be categorized in two fields according to number of involved key: O Symmetric searchable encryption (SSE) O Asymmetric searchable encryption (ASE)
  • 16. O The main feature of this model of private search is that the user, who encrypts data, is the only user who can perform a search or an update. O This fact is due to the use of a private key that belongs only to the user and who cannot share with others. O The symmetric scheme was introduced by GOLDREICH AND R. OSTROVSKY [1] and supposes that the user encrypts his data with a secret key, stores it in the untrusted server, can retrieve his encrypted data then decrypts it with the same key.
  • 17. O The first searchable symmetric encryption scheme proposed by Song et al[2]. In the Songā€™s scheme, all the words within every document have to be encrypted in a double layer ciphertext form called inner layer and outer layer. O Server strips the outer layer by using the trapdoor and checks the inner layer. In order to make the same verifiable inner layer structure trapdoor and ciphertext have to be generated by using the same keyword.
  • 18. O The first index-based SSE proposed by Goh [3]. Gohā€™s scheme is based on making a secure index of all the words in a document, which uses multiple different hash functions. O The method of making that index and searching within that is called bloom filter, which is used in spread spectrum of applications in various areas. O Then Curtmola [8] proposed another two inverted index-based SSEs, where its search time cost is O(1).
  • 19. O SSE Consists of four (4) algorithms: 1. Keygen (k): This algorithm takes a security parameter k and generates a secret key K. 2. BuildIndex (K, D): The index I is produced by using the secret key K and the document collection D. 3. Trapdoor(K, w): The trapdoor Tw of the word w is produced from w and the secret key K. 4. Search(I, T w): Search documents in the collection D that contain the keyword w using the trapdoor Tw.
  • 20. 1. Fuzzy Keyword Search over Encrypted Data in Cloud Computing (FKSEDCC) proposed by Jin Li. et al. [7] 2. Phrase Search over Encrypted Data with Symmetric Encryption Scheme proposed by Tang et al.[9]
  • 21. O The multiuser search allows the owner of the encrypted data to share with other users the right to search over these encrypted data.
  • 22. O In the M-SSE, the data owner can grant or revoke a user from the group of privileged users. O To add a user, the owner has to give him a key Ku O The server manages the user revocation by checking for each search queries whether the user has his privilege or not. O Indeed, each time the owner adds or deletes a user, he generates a new value R, and then he sends it to the server. Using this information, the server may verify the permission of the user. the group of revoked users changes dynamically, and thus even if a user has a key he cannot retrieve the documents using his trapdoor.
  • 23. O ASE is a scheme that enables other parties besides the data owner to make queries to the server, as long as having access to the ownerā€™s public key O Public key Encryption with Keyword Search (PEKS) is a primitive with such functionality that provides delegation of exact-match searches. Boneh et al. in 2004 and Baek et al O ASE schemes are appropriate in an setting where the party searching over the data is diļ¬€erent from the party that generates it.
  • 24. O ASE allows searches to be carried over cipher-texts, through delegation, and by means of trapdoors issued by the owner of the data. O As it is important that cipher-texts preserve data privacy, it is also important that trapdoors do not expose the user's search criteria. O The main advantage of ASE is functionality while the main disadvantages are ineļ¬ƒciency and weaker security guarantees.
  • 25. O ESE schemes are appropriate in any setting where the party that searches over the data is diļ¬€erent from the party that generates it and where the keywords are hard to guess O The main advantage of eļ¬ƒcient ASE is that search is more eļ¬ƒcient than (plain) ASE. O The main disadvantage, however,is that ESE schemes are also vulnerable to dictionary attacks. O mSSE schemes are appropriate in any setting where many parties wish to search over data that is generated
  • 26. O In a mSSE scheme, in addition to being able to encrypt indexes and generate tokens, the owner of the data can also add and revoke usersā€™ search privileges over his data.
  • 27. O The concept of a PEKS scheme was proposed by Boneh et al.[10] and Baek et al[11]. who extended PEKS scheme into a secure channel free PEKS scheme (SCF-PEKS) which removes the assumption, a secure channel between users and a server. O Public Key Encryption with Keyword Search (PEKS in short) scheme, which is also name searchable public- key encryption scheme, enables one to search encrypted documents on the untrusted server without revealing any information.
  • 28. O To construct a secure PEKS or SCF-PEKS scheme with privacy protection, there are some security requirements needed to achieve as follows: O Trapdoor indistinguishability O Ciphertext indistinguishability O Authorized identity protection (Anonymity) O User authentication
  • 29. O Each user may have access to a different set of documents stored on the server; this can be achieved by ensuring that each document is encrypted with a separate per-document key, and arranging for each userā€™s client machine to have access to the keys of the documents that the corresponding user has access to. Popa et al [15] O Many applications, such as document sharing, chat, forums, and calendars, support search over documents shared by different users.
  • 30. O This cryptographic scheme that allows a client to provide a single search token to the server, but still allows the server to search for that tokenā€™s word in documents encrypted with different keys O The scheme hides the content of the document and the words one searches for, and the only information the server learns is whether some word being searched for matches a word in a document.
  • 31. 1. O. Goldreich and R. Ostrovsky. Software protection and simulation on Oblivious RAMs.Journal of the ACM, 43(3):431ā€“473, May 1996. 2. D. Song, D. Wagner and A. Perrig. Practical Techniques for Searches on Encrypted Data, IEEE Symposium on Security and Privacy (S&P), 2000, pp.44-55 3. Euā€“Jin Goh. Secure indexes. In the Cryptology ePrint Archive, Report 2003/216, March 2004. 4. Reza Curtmola, Juan Garay, Seny Kamara, and Rafail Ostrovsky. Searchable Symmetric Encryption: Improved Definitions and Efficient Constructions, 2006. 5. Y. C. Chang and M. Mitzenmacher. Privacy preserving keyword searches on remote encrypted data. In Applied Cryptography and Network Security Conference (ACNS), 2005.
  • 32. 6. P. Golle, J. Staddon, and B. Waters. Secure conjunctive keyword search over encrypted data. In M. Jakobsson,M. Yung, and J. Zhou, editors, Applied Cryptography and Network Security Conference (ACNS), volume 3089 of LNCS, pages 31ā€“45. Springer-Verlag, 2004. 7. Li, H.,Wang, C., Cao, N., Ren, K., and Lou, W. (2010), ā€œFuzzy Keyword search over encrypted data in cloud computingā€in Proceedings of IEEE INFOCOM 10 Mini- Conference, pp 1-5,doi:10.1109/INFCOM. 2010.5462196 8. R. Curtmola, J. Garay, S. Kamara, and R. Ostrovsky. "Searchable symmetric encryption: improved definitions and efficient constructions," in Proceedings of the 13th ACM conference on Computer and communications security, pp. 79-88.
  • 33. 9. Y. Tang, D. Gu, N. Ding, and H. Lu. "Phrase Search over Encrypted Data with Symmetric Encryption Scheme," in Distributed Computing Systems Workshops (ICDCSW), 2012 32nd International Conference on, pp. 471-480. 10. D. Boneh, G. D. Crescenzom, R. Ostrovsky, and G. Rersiano, ā€œPublic key encryption with keyword search,ā€ in Advances in Cryptology ā€“ EUROCRYPT 2004, Lecture Notes in Computer Science, vol. 3027,pp. 506{522, Interlaken, Switzerland, 2004. Springer Berlin/Heidelberg.
  • 34. 11. J. Baek, R. Safavi-Naini, and W. Susilo, ā€œPublic key encryption with keyword search revisited,ā€ in ICCSA 2008, vol. 5072 of Lecture Notes in Computer Science, pp. 1249{1259, Perugia, Italy, 2008 Springer Berlin/Heidelberg. 12. Karilyn Lao, Richman Lo, & Robert Mastronardi ā€œENCRYPTIONā€. Presentation 13. Bellare, M., Boldyreva, A., Oā€™Neill, A.:Deterministic and eļ¬ƒciently searchable encryption. In: Menezes, A. (ed.) CRYPTO 2007. LNCS, vol. 4622, pp. 535ā€“552.Springer, Heidelberg (2007) 14. Moataz Tarik.ā€Searcheable Encryptionā€, Alcatel- Lucent Bell Labs (2012)
  • 35. 15. R. Popa and N. Zeldovich, ā€œMulti-Key Searchable Encryptionā€. MIT CSAIL