A Secure Search Scheme of Encrypted Data On Mobile Cloud: Abstract
A Secure Search Scheme of Encrypted Data On Mobile Cloud: Abstract
A Secure Search Scheme of Encrypted Data On Mobile Cloud: Abstract
Abstract:
As mobile cloud computing become more flexible & effective in terms of economy, data owners
are motivated to outsource their complex data systems from local sites to commercial public mobile cloud.
But for security of data, sensitive data has to be encrypted before outsourcing, which overcomes method of
traditional data utilization based on plaintext keyword search. Due to the increasing popularity of mobile
cloud computing, more and more data owners are motivated to outsource their datato mobile cloud servers
for great convenience and reduced cost in data management. However, sensitive data should be encrypted
beforeoutsourcing for privacy requirements, which obsoletes data utilization like keyword-based document
retrieval. In this paper, we present a secure multi-keyword ranked search scheme over encrypted mobile
cloud data, which simultaneously supports dynamic update operationslike deletion and insertion of
documents. Considering the large number of data users and documents in mobile cloud, it is necessary for
the search service to allow multi-keyword query and provide result similarity ranking to meet the effective
data retrieval need. Retrieving of all the files having queried keyword will not be affordable in pay as per
use mobile cloud paradigm. In this paper, we propose the problem of Efficient Mobile Multikeyword
search(EMMS) over encrypted mobile cloud data (ECD), and construct a group of privacy policies for
such a secure mobile cloud data utilization system. From number of multi-keyword semantics, we select
the highly efficient rule of coordinate matching, i.e., as many matches as possible, to identify the similarity
between search query and data, and for further matching we use inner data correspondence to
quantitatively formalize such principle for similarity measurement.Searchable encryption allows one to
upload encrypted documentson a remote honest-but-curiousserver and query that data at the server
itselfwithout requiring the documents to be decrypted prior to searching. Inthis work We first propose a
basic Secured multi keyword ranked search scheme using secure inner product computation, and then
improve it to meet different privacy requirements. The Ranked result provides top retrieval results. Due to
the use of our special structure, the proposed scheme can achieve sub-linear search time and deal with the
deletion and insertion of documents flexibly.Extensive experiments are conducted to demonstrate the
efficiency of the proposed scheme. Also we propose an alert system which will generate alerts when un-
authorized user tries to access the data from mobile cloud, the alert will generate in the form of mail and
message.
Keywords — Multikeyword, secure search, mobile cloud, encrypted data, encrypted mobile cloud,
mobile cloud privacy, data retrieval, outsourcing, server, mobile cloud connection .
Data user provides t keywords for the cloud server. the index stored in the cloud server needs to be
A corresponding trapdoor through search control encrypted;
mechanisms is generated. In this paper, we assume 2) Trapdoor Unlinkability. The cloud server
that the authorization between the data owner and could do some statistical analysis over
the data user is approximately done.
the search result. Meanwhile, the same query
Cloud Server should generate different trapdoors
Cloud server receivedfrom the authorized user. when searched twice. The cloud server should
Then, the cloud server calculatesand returns to the not be able to deduce relationship
corresponding set of encrypted documents.
Moreover, to reduce theTwcommunication cost, the between trapdoors.
data user may send an optional numberlalong with 3) Keyword Privacy. The cloud server could not
thetrapdoorTso that the cloud server only sends back discern the keyword in query, index
top-lfiles that are most relevant to the search query.
by analyzing the statistical information like term
D. Threat models and Design Goals frequency.
The cloud server is considered as “honest-but- B. Threat models and Design Goals
curious” in our model. Particularly, the cloud server The cloud server is considered as “honest-but-
both follows the designated protocol specification curious” in our model. Particularly, the cloud server
but at the same timeanalyzes data in its storage and both follows the designated protocol specification
message flows received during the protocol so as to but at the same time analyzes data in its storage and
learn additional information [12]. In this paper, we
message flows received during the protocol so as to
purpose to achieve security and ranked search under
learn additional information [12]. In this paper, we
the above model.The designed goals of our system
are following: purpose to achieve security and ranked search under
the above model. The designed goals of our system
are following: