Research Article

Revisiting the Practicality of Search on Encrypted Data: From the Security Broker’s Perspective

Figure 1

Architecture of typical SaaS applications and chokepoints for data encryption.