An effective verifiable symmetric searchable encryption scheme in cloud computing

Kangle Wang, Xiaolei Dong, Jiachen Shen, Zhenfu Cao

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

7 Scopus citations

Abstract

With the booming Internet industry, users' demand for resources is also increasing. In order to meet the needs of users, cloud computing came into being. In today's era, cloud storage is already the most popular application in cloud computing, and users are increasingly inclined to store important and private information in the cloud. One of the most common methods is to encrypt the information before uploading it to the cloud, but searching the information it needs in the cloud server becomes an obstacle, and symmetric searchable encryption can help users achieve this. In this paper, we design a verifiable method based on an efficient symmetric searchable encryption scheme to verify the correctness of search results returned by the cloud server. Through safety analysis and performance evaluation tests, we demonstrate that our solutions are safe and effective.

Original languageEnglish
Title of host publicationICIT 2019 - Proceedings of the 7th International Conference on Information Technology
Subtitle of host publicationIoT and Smart City
PublisherAssociation for Computing Machinery
Pages98-102
Number of pages5
ISBN (Electronic)9781450376631
DOIs
StatePublished - 20 Dec 2019
Event7th International Conference on Information Technology: IoT and Smart City, ICIT 2019 - Shanghai, China
Duration: 20 Dec 201923 Dec 2019

Publication series

NameACM International Conference Proceeding Series

Conference

Conference7th International Conference on Information Technology: IoT and Smart City, ICIT 2019
Country/TerritoryChina
CityShanghai
Period20/12/1923/12/19

Keywords

  • Cloud computing
  • Symmetric searchable encryption
  • Verifiable search

Fingerprint

Dive into the research topics of 'An effective verifiable symmetric searchable encryption scheme in cloud computing'. Together they form a unique fingerprint.

Cite this