Abstract
The integration of the cloud and mobile device enables users more convenient to access, retrieve the file, but due to the limitations of resources of mobile devices, how to shorten the search time and get more accurate target files, to avoid unnecessary consumption has become the focus of research. This paper presents an efficient searchable encryption scheme based on mobile cloud, the scheme combine with k nearest neighbor algorithm, design the initial trapdoor matching table (TMT), realizes the multi-keyword Boolean search, improve the query precision, shorten the searching time.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Li, H., Liu, D., Dai, Y.: Engineering searchable encryption of mobile cloud networks: when QoE meets QoP. Wirel. Commun. 22(4), 74–80 (2015)
Ma, R., Li, J., Guan, H., **a, M.: ESED: efficient encrypted data search as a mobile cloud service. Emerg. Top. Comput. 3(3), 372–383 (2015)
Cao, N., Wang, C., Li, M., Ren, K.: Privacy-preserving multi-keyword ranked search over encrypted cloud data. Parallel Distrib. Syst. 25(1), 222–233 (2014)
Wang, C., Cao, N., Ren, K., Lou, W.: Enabling secure and efficient ranked keyword search over outsourced cloud data. Parallel Distrib. 23(8), 146–1479 (2012)
Nyberg, K.: Fast accumulated hashing. In: Proceedings of the International Workshop on Fast Software Encryption (FSE), pp. 83–87(1996)
Nyberg, K.: Commutativity in cryptography. In: Proceedings of the International Workshop on Functional Analysis, pp. 331–342(1996)
Song, D.X., Wagner, D., Perrig, A.: Practical techniques for searches on encrypted data. In: Security and Privacy (S&P), PP. 44–55(2000)
Chang, Y.-C., Mitzenmacher, M.: Privacy preserving keyword searches on remote encrypted data. In: Ioannidis, J., Keromytis, A.D., Yung, M. (eds.) ACNS 2005. LNCS, vol. 3531, pp. 442–455. Springer, Heidelberg (2005)
Boneh, D., Di Crescenzo, G., Ostrovsky, R., Persiano, G.: Public key encryption with keyword search. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol. 3027, pp. 506–522. Springer, Heidelberg (2004)
Shen, Q.: Exploiting geodistributed clouds for e-Health monitoring system with minimum service delay and privacy preservation. Health Inform. 18(2), 30–39 (2014)
Dong, Ma.: Multi cloud-based evacuation services for emergency management. Cloud Comput. 1(4), 50–59 (2014)
Liang, H.: An SMDP-based service model for interdomain resource allocation in mobile cloud networks. Veh. Technol. 61(5), 22–32 (2012)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2016 Springer International Publishing Switzerland
About this paper
Cite this paper
Lin, T., Sun, Z., Sun, H., Cao, B. (2016). An Efficient Conjunctive Keyword Searchable Encryption Scheme for Mobile Cloud Computing. In: Huang, DS., Jo, KH. (eds) Intelligent Computing Theories and Application. ICIC 2016. Lecture Notes in Computer Science(), vol 9772. Springer, Cham. https://doi.org/10.1007/978-3-319-42294-7_59
Download citation
DOI: https://doi.org/10.1007/978-3-319-42294-7_59
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-42293-0
Online ISBN: 978-3-319-42294-7
eBook Packages: Computer ScienceComputer Science (R0)