Secure Index for Resource-Constraint Mobile Devices in Cloud Computing

With the rapid development of network technology and cloud computing, more and more organizations and users outsource their data into the cloud server. In order to protect data privacy, the sensitive data have to be encrypted, which increases the heavy computational overhead and brings great challenges to resource-constraint devices. In this paper, we propose secure index based on counting Bloom filter (CBF) for ranked multiple keywords search. In the proposed scheme, several algorithms are designed to maintain and lookup CBF, while a pruning algorithm is used to delete the repeated items for saving the space. Besides, the relevance scores are encrypted by the Paillier cryptosystem. It ensures that the same relevance scores are encrypted into different bits, which can resist the statistical analyses on the ciphertext of the relevance scores. Moreover, since the Paillier cryptosystem supports the homomorphic addition of ciphertext without the knowledge of the private key, the major computing work in ranking could be moved from user side to the cloud server side. Therefore, the proposed scheme has huge potentials in resource-constraint mobile devices such as 5G mobile terminals. Security analyses prove that the proposed scheme can prevent the information leakage. Experiment results guarantee that computation overhead of the proposed scheme in user side is low.

[1]  Hao Wang,et al.  Wearable Sensor Localization Considering Mixed Distributed Sources in Health Monitoring Systems , 2016, Sensors.

[2]  Ha T. Lam,et al.  Encryption Performance Improvements of the Paillier Cryptosystem , 2015, IACR Cryptol. ePrint Arch..

[3]  Vincent Rijmen,et al.  The Design of Rijndael: AES - The Advanced Encryption Standard , 2002 .

[4]  Minglu Li,et al.  Toward Secure Multikeyword Top-k Retrieval over Encrypted Cloud Data , 2013, IEEE Transactions on Dependable and Secure Computing.

[5]  Cong Wang,et al.  Enabling Secure and Efficient Ranked Keyword Search over Outsourced Cloud Data , 2012, IEEE Transactions on Parallel and Distributed Systems.

[6]  Guangjie Han,et al.  PD Source Diagnosis and Localization in Industrial High-Voltage Insulation System via Multimodal Joint Sparse Representation , 2016, IEEE Transactions on Industrial Electronics.

[7]  Sasu Tarkoma,et al.  Theory and Practice of Bloom Filters for Distributed Systems , 2012, IEEE Communications Surveys & Tutorials.

[8]  Tao Xiang,et al.  Secure cloud storage meets with secure network coding , 2016, IEEE INFOCOM 2014 - IEEE Conference on Computer Communications.

[9]  Hugh E. Williams,et al.  In-Place versus Re-Build versus Re-Merge: Index Maintenance Strategies for Text Retrieval Systems , 2004, ACSC.

[10]  Eu-Jin Goh,et al.  Secure Indexes , 2003, IACR Cryptol. ePrint Arch..

[11]  Quan Yuan,et al.  A framework for protecting personal information and privacy , 2015, Secur. Commun. Networks.

[12]  Yue Zhang,et al.  Efficient Attribute-Based Encryption Schemes for Secure Communications in Cyber Defense , 2016, Intell. Autom. Soft Comput..

[13]  JUSTIN ZOBEL,et al.  Inverted files for text search engines , 2006, CSUR.

[14]  Weixin Xie,et al.  An Efficient File Hierarchy Attribute-Based Encryption Scheme in Cloud Computing , 2016, IEEE Transactions on Information Forensics and Security.

[15]  Kirit J. Modi,et al.  Cloud computing - concepts, architecture and challenges , 2012, 2012 International Conference on Computing, Electronics and Electrical Technologies (ICCEET).

[16]  Guan-Ming Su,et al.  Confidentiality-preserving rank-ordered search , 2007, StorageSS '07.

[17]  Wolfgang Nejdl,et al.  Zerber+R: top-k retrieval from a confidential index , 2009, EDBT '09.

[18]  Pascal Paillier,et al.  Public-Key Cryptosystems Based on Composite Degree Residuosity Classes , 1999, EUROCRYPT.

[19]  Xingming Sun,et al.  Achieving Efficient Cloud Search Services: Multi-Keyword Ranked Search over Encrypted Cloud Data Supporting Parallel Computing , 2015, IEICE Trans. Commun..

[20]  Ning Sun,et al.  Secure communication for underwater acoustic sensor networks , 2015, IEEE Communications Magazine.

[21]  Guangjie Han,et al.  The Application of DOA Estimation Approach in Patient Tracking Systems with High Patient Density , 2016, IEEE Transactions on Industrial Informatics.

[22]  Mohsen Guizani,et al.  An Attack-Resistant Trust Model Based on Multidimensional Trust Metrics in Underwater Acoustic Sensor Network , 2015, IEEE Transactions on Mobile Computing.

[23]  R. Kalaiselvi,et al.  SCALABLE AND SECURE SHARING OF PERSONAL HEALTH RECORDS IN CLOUD COMPUTING , 2016 .

[24]  Jin Li,et al.  Fully secure fuzzy identity-based encryption for secure IoT communications , 2016, Comput. Stand. Interfaces.

[25]  Guangjie Han,et al.  An Efficient Virtual Machine Consolidation Scheme for Multimedia Cloud Computing , 2016, Sensors.

[26]  Weixin Xie,et al.  Attribute-Based Data Sharing Scheme Revisited in Cloud Computing , 2016, IEEE Transactions on Information Forensics and Security.

[27]  Andrei Broder,et al.  Network Applications of Bloom Filters: A Survey , 2004, Internet Math..

[28]  Oscar Reparaz A note on the security of Higher-Order Threshold Implementations , 2015, IACR Cryptol. ePrint Arch..

[29]  Yao Zheng,et al.  Scalable and Secure Sharing of Personal Health Records in Cloud Computing Using Attribute-Based Encryption , 2019, IEEE Transactions on Parallel and Distributed Systems.

[30]  Guy Gogniat,et al.  Recent Advances in Homomorphic Encryption , 2013 .

[31]  George Varghese,et al.  An Improved Construction for Counting Bloom Filters , 2006, ESA.

[32]  V. Sridhar Reddy,et al.  An Efficient Privacy-Preserving Ranked Keyword Search Method , 2018 .

[33]  Guangjie Han,et al.  Distributed Parameter Estimation for Mobile Wireless Sensor Network Based on Cloud Computing in Battlefield Surveillance System , 2015, IEEE Access.

[34]  Michael Mitzenmacher,et al.  Privacy Preserving Keyword Searches on Remote Encrypted Data , 2005, ACNS.

[35]  Cong Wang,et al.  Privacy-Preserving Multi-Keyword Ranked Search over Encrypted Cloud Data , 2014 .