Escolar Documentos
Profissional Documentos
Cultura Documentos
1Professor in CSE Department. Bharath College of Engg & Tech for Women Kadapa,
dr.albertdwgtl@gmail.com
2Associate Professor-IT, KL University,Vijayawada, iNurture Education Solutions Private
Limited, Bangalore, veerabhadra.b@inurture.co.in
Abstract
Mobile cloud storage (MCS) denotes a family of increasingly popular on-line services, and
even acts as the primary file storage for the mobile devices. MCS enables the mobile devices
users to store and retrieve files or data on the cloud through wireless communication, which
improves the data availability and facilitates the file sharing process without draining the
local mobile device resources. MCS system incurs new challenges over the traditional
encrypted search schemes, in consideration of the limited computing and battery capacities of
mobile devices, as well as data sharing accessing approaches through wireless
communication. Therefore, a suitable and efficient encrypted search scheme is necessary for
MCS. In this research we propose a new architecture framework that facilitates security to the
cloud storage besides supporting multi-keyword search on the encrypted cloud data. We
proposed an algorithm known as Multi-Keyword Ranked Search Algorithm to achieve this.
We built a prototype application that demonstrates proof of the concept. Our empirical results
are compared with the state of the art algorithms. The proposed framework is found to be
more effective than existing systems.
Index Terms – Mobile cloud storage, searchable data encryption, energy efficiency, traffic
efficiency
1. INTRODUCTION
CLOUD storage system is a service model in which data are maintained, managed and
backup remotely on the cloud side, and meanwhile data keeps available to the users over a
network. Mobile Cloud Storage (MCS) [1] [2] denotes a family of increasingly popular on-
line services, and even acts as the primary file storage for the mobile devices [3]. MCS
enables the mobile device users to store and retrieve files or data on the cloud through
wireless communication, which improves the data availability and facilitates the file sharing
process without draining the local mobile device resources [4].
The data privacy issue is paramount in cloud storage system, so the sensitive data is
encrypted by the owner before outsourcing onto the cloud, and data users retrieve the
interested data by encrypted search scheme. In MCS, the modern mobile devices are
confronted with many of the same security threats as PCs, and various traditional data
encryption methods are imported in MCS [5], [6]. However, mobile cloud storage system
incurs new challenges over the traditional encrypted search schemes, in consideration of the
limited computing and battery capacities of mobile device, as well as data sharing and
accessing approaches through wireless communication. Therefore, a suitable and efficient
encrypted search scheme is necessary for MCS.
Generally speaking, the mobile cloud storage is in great need of the bandwidth and energy
efficiency for data encrypted search scheme, due to the limited battery life and payable traffic
fee. Therefore, we focus on the design of a mobile cloud scheme that is efficient in terms of
both energy consumption and the network traffic, while keep meeting the data security
requirements through wireless communication channels. Our contributions in this paper
include proposal of a framework that enables user-friendly multi-keyword ranked search over
encrypted data. Emperical study is madde with a prototype and the results showed better
performance over the state of the art. The remainder of this paper is structured as follows.
Section 2 reviews literature on keyword based search over outsourced encrypted data. Section
3 presents the proposed multi-keyword ranked search mechanism. Section 4 provides
implementation details. Section 5 presents experimental results. Section 6 gives conclusions
and the scope of future work.
2. RELATED WORK
Encrypted Search (TEES) architecture for mobile cloud storage applications. TEES achieves
the efficiencies through employing and modifying the ranked keyword search as the
encrypted search platform basis, which has been widely employed in cloud storage systems.
Traditionally, two categories of encrypted search methods exit that can enable the cloud
server to perform the search over the encrypted data: ranked keyword search and Boolean
keyword search. The ranked keyword search adopts the relevance scores [7] to represent the
relevance of a file to the searched keyword and sends the top-k relevant files to the client. It
is more suitable for cloud storage than the Boolean keyword search approaches (e.g., [8], [9],
[10], and [11]), since Boolean keyword search approaches need to send all the matching files
to the clients, and therefore incur a larger amount of network traffic and a heavier post-
processing overhead for the mobile devices.
By careful redesign of ranked keyword search procedure, TEES offloads the security
calculation to the cloud side to save the energy consumption of mobile devices, and TEES
also simplify the encrypted search procedure to reduce the traffic amount for retrieving data
from encrypted cloud storage. Besides the energy and traffic efficiencies, TEES is
implemented with security enhancement in consideration of the modified encrypted search
procedure in order to mitigate statistics information leak and keywords-files association leak
[12], [13] for MCS, by adding noise in Term Frequency (TF) distribution function and
keeping the Order Preserving Encryption (OPE) attributes.
3. PROPOSED METHODOLOGY
Out Sourcing
Encrypted
Index
Cloud
Storage Server
Data Files
Nodes
Owner
Encrypted
Files
Out Sourcing
Relevant Files
Encrypted
Keywords
Figure 1: Proposed framework for multi-keyword ranked search on encrypted cloud data
The framework has provision for secure cloud storage and retrieval. The retrieval efficiency
is increased with multi-keyword ranked search due to the algorithm proposed. The flow of
the security activities is presented in Figure 2 while making multi-keyword search.
Relevance
Score
Calculation
Send Files
Decrypt
Back(top-k)
Data User
Cloud
Server
As shown in Figure 2, the multi-keyword ranked search is made using multi-keywords given
by end user. Then it performs activities like stem, encrypt, hash, wrap and send to server. It
does mean that the multi-keyword search text is encrypted and sends to cloud server. In the
cloud server, it is unwrapped, search is performed, relevance score is computed and top-k
files that satisfy user query are returned to end user. Now the end user is able to decrypt the
files.
The algorithm takes multi-keyword search string as input and performs search operation on
the cloud server to return requested files in encrypted format. The algorithm has two phases
known as computing relevance score and rank search results before presenting final results to
end users.
4. IMPLEMENTATION DETAILS
As shown in Figure 3, the roles involved in the system allow users to perform specific
activities. For instance the data owner can perform encryption and send data to public cloud.
He can also perform verification for data integrity and perform search operations on
encrypted outsourced cloud data. The server side data flow is presented in Figure 3.
There are many operations carried out at the server. Once user logs in and makes search
operation, the server needs to perform operations like decrypting search string and execute
the proposed algorithm in order to provide multi-keyword ranked search results to end users
in encrypted format. Then the end users will decrypt the files.
5. EXPERIMENTAL RESULTS
Experiments are made with the different a prototype application built using Java
programming language with an intuitive user interface.
As shown in Table 1, the file size and retrieval time for proposed and existing schemes is
presented.
2000
1800
1600
1400
Time(ms)
1200
PTS
1000
800 TRS
600 ORS
400
Proposed
200
0
File Size(kb)
As shown in Figure 5, the results revealed that the file size has its impact on the execution
time. Another observation is that the proposed system took less time when compared with
TRS scheme. It has overhead due to its multi-keyword search operation.
As shown in Table 2, the throughput of different schemes is presented against different size
of files used in experiments.
800
700
600
Throughput(Kb/s)
500
PTS
400
TRS
300
ORS
200 Proposed
100
0
100 200 300 400 500 600 700 800 900 1000
File Size(kb)
As presented in Figure 6, the throughput of the proposed system is better than other systems.
The size of file has its impact on the throughput. As file size is increased, the throughput is
also increased. Another observation is that the proposed system performed well as it is multi-
keyword search.
References
[1] J. Zhang, B. Deng, and X. Li, “Additive order preserving encryption based encrypted
documents ranking in secure cloud storage,” in Proc. 3rd Int. Conf. Adv. Swarm Intell., 2012,
pp. 58–65.
[2] S. Kamara and K. Lauter, “Cryptographic cloud storage,” in Proc. 14th Int. Conf.
Financial Cryptography Data Security, 2010, pp. 136– 149.
[3] C. Orencik and E. Sava € s, “Efficient and secure ranked multi-key- ¸ word search on
encrypted cloud data,” in Proc. Joint EDBT/ICDT Workshops, 2012, pp. 186–195.
[4] J. Ramos, “Using tf-idf to determine word relevance in document queries,” in Proc. First
Instructional Conf. Machine Learning, Tech. Rep. 14th, 2003. [Online]. Available:
https://www.cs.rutgers. edu/mlittman/courses/ml03/iCML03/papers/ramos.pdf
[5] W. Sun, B. Wang, N. Cao, M. Li, W. Lou, Y. T. Hou, and H. Li, “Privacy-preserving
multi-keyword text search in the cloud supporting similarity-based ranking,” in Proc. 8th
ACM SIGSAC Symp. Inf., Comput. Commun. Security, 2013, pp. 71–82.
[6] K. Bowers, A. Juels, and A. Oprea, “Hail: A high-availability and integrity layer for cloud
storage,” in Proc. 16th ACM Conf. Comput. Commun. Security, 2009, pp. 187–198.
[7] D. Hiemstra, “A probabilistic justification for using tfidf term weighting in information
retrieval,” Int. J. Digital Libraries, vol. 3, no. 2, pp. 131–139, 2000.
[8] Q. Chai and G. Gong, “Verifiable symmetric searchable encryption for semi-honest-but-
curious cloud servers,” in Proc. IEEE Int. Conf. Commun., 2012, pp. 917–922.
[9] M. Li, S. Yu, K. Ren, W. Lou, and Y. T. Hou, “Toward privacyassured and searchable
cloud data storage services,” IEEE Netw., vol. 27, no. 4, pp. 56–62, Jul./Aug. 2013.
[11] K. Jones, “Index term weighting,” Inf. Storage Retrieval, vol. 9, no. 11, pp. 619–633,
1973.
[12] G. Salton and M. J. McGill, Introduction to Modern Information Retrieval. New York,
NY, USA: McGraw-Hill, 1986.
[13] S. Hou, T. Uehara, S. Yiu, L. C. Hui, and K. Chow, “Privacy preserving multiple
keyword search for confidential investigation of remote forensics,” in Proc. 3rd Int. Conf.
Multimedia Inf. Netw. Security, 2011, pp. 595–599.
[16] P. Golle, J. Staddon, and B. Waters, “Secure conjunctive keyword search over encrypted
data,” in Proc. Appl. Cryptography Netw. Security, 2004, pp. 31–45.
[17] L. Baker and A. McCallum, “Distributional clustering of words for text classification,”
in Proc. 21st Annu. Int. ACM SIGIR Conf. Res. Develop. Inf. Retrieval, 1998, pp. 96–103.