Efficiency enhancements for practical techniques for searches on encrypted data
dc.contributor.advisor | Gamage CD | |
dc.contributor.author | Pitigalaarachchi PAPMB | |
dc.date.accept | 2020 | |
dc.date.accessioned | 2020 | |
dc.date.available | 2020 | |
dc.date.issued | 2020 | |
dc.description.abstract | Information security has become one of the major focus areas for any organization. More often, organizations see the need of outsourcing their data storages in meeting the operational and security objectives. This gives rise to a new problem of privacy protection of the data stored with a third party. As a solution the data is encrypted before storing with a third party data service provider. Thus when the users need to process the data, the safer option is to download the data into a secure user machine and perform the operations on the decrypted data. This creates an additional overhead of having to download a large amount of data and decrypt them even to perform a simple calculation on the data stored in the encrypted form. Therefore the possibility of secure data processing at the remote third party storage has become an interesting problem to solve. In order to preserve the privacy the data cannot be allowed to be decrypted at the third party storage. One form of the solution is to facilitate computations on the data stored in encrypted form. The users can make requests from the data service provider and if the service provider can perform operations on the encrypted data itself and provide the answer the above mentioned overhead can be avoided. This brings the focus of this research on to the studying of computing on encrypted data with specific focus on searchable encryption. As pert of the research, the current literature of computing on encrypted data is studied to identify a suitable searchable encryption scheme for practical use. Followed by the literature study, an existing symmetric searchable encryption scheme is selected for a detailed study. Here a complete implementation of the scheme is proposed and the test results are analyzed. Based on the results, a keyword extraction mechanism is proposed to improve the performance of the scheme. Finally significant performance improvements, 89.83% reduction in extra space usage due to searchable encryption and 92.11% improvement in single key word search time has been achieved. In addition to that, use cases in capital markets are studied to understand the possibilities of practical use and challenges. | en_US |
dc.identifier.accno | TH4296 | en_US |
dc.identifier.degree | MSc in Computer Science and Engineering | en_US |
dc.identifier.department | Department of Computer Science and Engineering | en_US |
dc.identifier.faculty | Engineering | en_US |
dc.identifier.uri | http://dl.lib.uom.lk/handle/123/16495 | |
dc.language.iso | en | en_US |
dc.subject | COMPUTER SCIENCE – Dissertations | en_US |
dc.subject | COMPUTER SCIENCE AND ENGINEERING - Dissertations | en_US |
dc.subject | ENCRIPTION | en_US |
dc.subject | HOMOMORPHIC ENCRIPTION | en_US |
dc.subject | SECURE DATA PROCESSING | en_US |
dc.subject | INFORMATION SECURITY | en_US |
dc.title | Efficiency enhancements for practical techniques for searches on encrypted data | en_US |
dc.type | Thesis-Full-text | en_US |
Files
Original bundle
1 - 3 of 3
Loading...
- Name:
- TH4296-1.pdf
- Size:
- 84.64 KB
- Format:
- Adobe Portable Document Format
- Description:
- Pre- text
Loading...
- Name:
- TH4296-2.pdf
- Size:
- 66.9 KB
- Format:
- Adobe Portable Document Format
- Description:
- Post-text
Loading...
- Name:
- TH4296.pdf
- Size:
- 1.22 MB
- Format:
- Adobe Portable Document Format
- Description:
- Full-thesis