An efficient and secure privacy-preserving approach for outsourced data of resource constrained mobile devices in cloud computing

被引:87
作者
Pasupuleti, Syam Kumar [1 ]
Ramalingam, Subramanian [2 ]
Buyya, Rajkumar [3 ]
机构
[1] IDRBT, Hyderabad, Andhra Pradesh, India
[2] Pondicherry Univ, Dept Comp Sci, Pondicherry, India
[3] Univ Melbourne, Cloud Comp & Distributed Syst CLOUDS Lab, Dept Comp & Informat Syst, Melbourne, Vic 3010, Australia
关键词
Cloud computing; Privacy-preserving; Outsourced data; Probabilistic public-key encryption; Ranked keyword search; Mobile devices; SEARCH;
D O I
10.1016/j.jnca.2015.11.023
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Outsourcing of data into cloud has become an effective trend in modern day computing due to its ability to provide low-cost, pay-as-you-go IT services. Although cloud based services offer many advantages, privacy of the outsourced data is a big concern. To mitigate this concern, it is desirable to outsource sensitive data in an encrypted form but cost of encryption process would increase the heavy computational overhead on thin clients such as resource-constrained mobile devices. Recently, several keyword searchable encryption schemes have been described in the literature. However, these schemes are not effective for resource-constrained mobile devices, because the adopted encryption system should not only support keyword search over the encrypted data but also offer high performance. In this paper, we propose an efficient and secure privacy-preserving approach for outsourced data of resource-constrained mobile devices in the cloud computing. Our approach employs probabilistic public key encryption algorithm for encrypting the data and invoke ranked keyword search over the encrypted data to retrieve the files from the cloud. We aim to achieve an efficient system for data encryption without sacrificing the privacy of data. Further, our ranked keyword search greatly improves the system usability by enabling ranking based on relevance score for search result, sends top most relevant files instead of sending all files back, and ensures the file retrieval accuracy. As a result, data privacy ensures and computation, communication overheads in reduction. Thorough security and performance analysis, we prove that our approach is semantically secure and efficient. (C) 2016 Elsevier Ltd. All rights reserved.
引用
收藏
页码:12 / 22
页数:11
相关论文
共 32 条
[1]  
[Anonymous], 2012, RFC REQUEST COMMENTS
[2]  
[Anonymous], 1996, HDB APPL CRYPTOGRAPH
[3]  
[Anonymous], 2009, SEC GUID CRIT AR FOC
[4]  
Armbrust M., 2009, Technical Report No. UCB/EECS-2009-28, P1
[5]  
Attrapadung N, 2010, LECT NOTES COMPUT SC, V6056, P384
[6]  
Bao F, 2008, LECT NOTES COMPUT SC, V4991, P71
[7]  
Bellare M, 2007, LECT NOTES COMPUT SC, V4622, P535
[8]  
Boldyreva A, 2009, LECT NOTES COMPUT SC, V5479, P224, DOI 10.1007/978-3-642-01001-9_13
[9]  
Boneh D, 2004, LECT NOTES COMPUT SC, V3027, P506
[10]   Privacy-Preserving Multi-Keyword Ranked Search over Encrypted Cloud Data [J].
Cao, Ning ;
Wang, Cong ;
Li, Ming ;
Ren, Kui ;
Lou, Wenjing .
IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2014, 25 (01) :222-233