An Efficient Conjunctive Keyword Searchable Encryption Scheme for Mobile Cloud Computing

  • Conference paper
  • First Online:
Intelligent Computing Theories and Application (ICIC 2016)

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 9772))

Included in the following conference series:

Abstract

The integration of the cloud and mobile device enables users more convenient to access, retrieve the file, but due to the limitations of resources of mobile devices, how to shorten the search time and get more accurate target files, to avoid unnecessary consumption has become the focus of research. This paper presents an efficient searchable encryption scheme based on mobile cloud, the scheme combine with k nearest neighbor algorithm, design the initial trapdoor matching table (TMT), realizes the multi-keyword Boolean search, improve the query precision, shorten the searching time.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
EUR 32.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or Ebook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
GBP 19.95
Price includes VAT (United Kingdom)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
GBP 71.50
Price includes VAT (United Kingdom)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
GBP 89.99
Price includes VAT (United Kingdom)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free ship** worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Li, H., Liu, D., Dai, Y.: Engineering searchable encryption of mobile cloud networks: when QoE meets QoP. Wirel. Commun. 22(4), 74–80 (2015)

    Article  Google Scholar 

  2. Ma, R., Li, J., Guan, H., **a, M.: ESED: efficient encrypted data search as a mobile cloud service. Emerg. Top. Comput. 3(3), 372–383 (2015)

    Article  Google Scholar 

  3. Cao, N., Wang, C., Li, M., Ren, K.: Privacy-preserving multi-keyword ranked search over encrypted cloud data. Parallel Distrib. Syst. 25(1), 222–233 (2014)

    Article  Google Scholar 

  4. Wang, C., Cao, N., Ren, K., Lou, W.: Enabling secure and efficient ranked keyword search over outsourced cloud data. Parallel Distrib. 23(8), 146–1479 (2012)

    Google Scholar 

  5. Nyberg, K.: Fast accumulated hashing. In: Proceedings of the International Workshop on Fast Software Encryption (FSE), pp. 83–87(1996)

    Google Scholar 

  6. Nyberg, K.: Commutativity in cryptography. In: Proceedings of the International Workshop on Functional Analysis, pp. 331–342(1996)

    Google Scholar 

  7. Song, D.X., Wagner, D., Perrig, A.: Practical techniques for searches on encrypted data. In: Security and Privacy (S&P), PP. 44–55(2000)

    Google Scholar 

  8. Chang, Y.-C., Mitzenmacher, M.: Privacy preserving keyword searches on remote encrypted data. In: Ioannidis, J., Keromytis, A.D., Yung, M. (eds.) ACNS 2005. LNCS, vol. 3531, pp. 442–455. Springer, Heidelberg (2005)

    Chapter  Google Scholar 

  9. Boneh, D., Di Crescenzo, G., Ostrovsky, R., Persiano, G.: Public key encryption with keyword search. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol. 3027, pp. 506–522. Springer, Heidelberg (2004)

    Chapter  Google Scholar 

  10. Shen, Q.: Exploiting geodistributed clouds for e-Health monitoring system with minimum service delay and privacy preservation. Health Inform. 18(2), 30–39 (2014)

    Google Scholar 

  11. Dong, Ma.: Multi cloud-based evacuation services for emergency management. Cloud Comput. 1(4), 50–59 (2014)

    Article  Google Scholar 

  12. Liang, H.: An SMDP-based service model for interdomain resource allocation in mobile cloud networks. Veh. Technol. 61(5), 22–32 (2012)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Tao Lin .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2016 Springer International Publishing Switzerland

About this paper

Cite this paper

Lin, T., Sun, Z., Sun, H., Cao, B. (2016). An Efficient Conjunctive Keyword Searchable Encryption Scheme for Mobile Cloud Computing. In: Huang, DS., Jo, KH. (eds) Intelligent Computing Theories and Application. ICIC 2016. Lecture Notes in Computer Science(), vol 9772. Springer, Cham. https://doi.org/10.1007/978-3-319-42294-7_59

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-42294-7_59

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-42293-0

  • Online ISBN: 978-3-319-42294-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics

Navigation