Leveraging Searchable Encryption through Homomorphic Encryption: A Comprehensive Analysis
The widespread adoption of cloud infrastructures has revolutionized data storage and access. However, it has also raised concerns regarding the privacy of sensitive data. To address these concerns, encryption techniques have been widely used. However, traditional encryption schemes limit the efficie...
Main Authors: | , |
---|---|
Format: | Article |
Language: | English |
Published: |
MDPI AG
2023-07-01
|
Series: | Mathematics |
Subjects: | |
Online Access: | https://www.mdpi.com/2227-7390/11/13/2948 |
_version_ | 1797591214040547328 |
---|---|
author | Ivone Amorim Ivan Costa |
author_facet | Ivone Amorim Ivan Costa |
author_sort | Ivone Amorim |
collection | DOAJ |
description | The widespread adoption of cloud infrastructures has revolutionized data storage and access. However, it has also raised concerns regarding the privacy of sensitive data. To address these concerns, encryption techniques have been widely used. However, traditional encryption schemes limit the efficient search and retrieval of encrypted data. To tackle this challenge, innovative approaches have emerged, such as the utilization of Homomorphic Encryption (HE) in Searchable Encryption (SE) schemes. This paper provides a comprehensive analysis of the advancements in HE-based privacy-preserving techniques, focusing on their application in SE. The main contributions of this work include the identification and classification of existing SE schemes that utilize HE, a comprehensive analysis of the types of HE used in SE, an examination of how HE shapes the search process structure and enables additional functionalities, and the identification of promising directions for future research in HE-based SE. The findings reveal the increasing usage of HE in SE schemes, particularly Partially Homomorphic Encryption. The popularity of this type of HE schemes, especially Paillier’s cryptosystem, can be attributed to its simplicity, proven security properties, and widespread availability in open-source libraries. The analysis also highlights the prevalence of index-based SE schemes using HE, the support for ranked search and multi-keyword queries, and the need for further exploration in functionalities such as verifiability and the ability to authorize and revoke users. Future research directions include exploring the usage of other encryption schemes alongside HE, addressing omissions in functionalities like fuzzy keyword search, and leveraging recent advancements in Fully Homomorphic Encryption schemes. |
first_indexed | 2024-03-11T01:35:18Z |
format | Article |
id | doaj.art-7ffa36ea4b7c4b4aaf772f323618d8e5 |
institution | Directory Open Access Journal |
issn | 2227-7390 |
language | English |
last_indexed | 2024-03-11T01:35:18Z |
publishDate | 2023-07-01 |
publisher | MDPI AG |
record_format | Article |
series | Mathematics |
spelling | doaj.art-7ffa36ea4b7c4b4aaf772f323618d8e52023-11-18T17:03:39ZengMDPI AGMathematics2227-73902023-07-011113294810.3390/math11132948Leveraging Searchable Encryption through Homomorphic Encryption: A Comprehensive AnalysisIvone Amorim0Ivan Costa1PORTIC—Porto Research, Technology and Innovation Center, Polytechnic Institute of Porto (IPP), 4200-374 Porto, PortugalPORTIC—Porto Research, Technology and Innovation Center, Polytechnic Institute of Porto (IPP), 4200-374 Porto, PortugalThe widespread adoption of cloud infrastructures has revolutionized data storage and access. However, it has also raised concerns regarding the privacy of sensitive data. To address these concerns, encryption techniques have been widely used. However, traditional encryption schemes limit the efficient search and retrieval of encrypted data. To tackle this challenge, innovative approaches have emerged, such as the utilization of Homomorphic Encryption (HE) in Searchable Encryption (SE) schemes. This paper provides a comprehensive analysis of the advancements in HE-based privacy-preserving techniques, focusing on their application in SE. The main contributions of this work include the identification and classification of existing SE schemes that utilize HE, a comprehensive analysis of the types of HE used in SE, an examination of how HE shapes the search process structure and enables additional functionalities, and the identification of promising directions for future research in HE-based SE. The findings reveal the increasing usage of HE in SE schemes, particularly Partially Homomorphic Encryption. The popularity of this type of HE schemes, especially Paillier’s cryptosystem, can be attributed to its simplicity, proven security properties, and widespread availability in open-source libraries. The analysis also highlights the prevalence of index-based SE schemes using HE, the support for ranked search and multi-keyword queries, and the need for further exploration in functionalities such as verifiability and the ability to authorize and revoke users. Future research directions include exploring the usage of other encryption schemes alongside HE, addressing omissions in functionalities like fuzzy keyword search, and leveraging recent advancements in Fully Homomorphic Encryption schemes.https://www.mdpi.com/2227-7390/11/13/2948searchable encryptionhomomorphic encryptionsecure searchdata privacykeyword search |
spellingShingle | Ivone Amorim Ivan Costa Leveraging Searchable Encryption through Homomorphic Encryption: A Comprehensive Analysis Mathematics searchable encryption homomorphic encryption secure search data privacy keyword search |
title | Leveraging Searchable Encryption through Homomorphic Encryption: A Comprehensive Analysis |
title_full | Leveraging Searchable Encryption through Homomorphic Encryption: A Comprehensive Analysis |
title_fullStr | Leveraging Searchable Encryption through Homomorphic Encryption: A Comprehensive Analysis |
title_full_unstemmed | Leveraging Searchable Encryption through Homomorphic Encryption: A Comprehensive Analysis |
title_short | Leveraging Searchable Encryption through Homomorphic Encryption: A Comprehensive Analysis |
title_sort | leveraging searchable encryption through homomorphic encryption a comprehensive analysis |
topic | searchable encryption homomorphic encryption secure search data privacy keyword search |
url | https://www.mdpi.com/2227-7390/11/13/2948 |
work_keys_str_mv | AT ivoneamorim leveragingsearchableencryptionthroughhomomorphicencryptionacomprehensiveanalysis AT ivancosta leveragingsearchableencryptionthroughhomomorphicencryptionacomprehensiveanalysis |