SlideShare a Scribd company logo
TEES: An Efficient Search Scheme over
Encrypted Data on Mobile Cloud
Abstract
Cloud storage provides a convenient, massive, and scalable storage at low cost, but data privacy is a major
concern that prevents users from storing files on the cloud trustingly. One way of enhancing privacy from
data owner point of view is to encrypt the files before outsourcing them onto the cloud and decrypt the
files after downloading them. However, data encryption is a heavy overhead for the mobile devices, and
data retrieval process incurs a complicated communication between the data user and cloud. Normally
with limited bandwidth capacity and limited battery life, these issues introduce heavy overhead to
computing and communication as well as a higher power consumption for mobile device users, which
makes the encrypted search over mobile cloud very challenging. In this paper, we propose TEES (Traffic and
Energy saving Encrypted Search), a bandwidth and energy efficient encrypted search architecture over
mobile cloud. The proposed architecture offloads the computation from mobile devices to the cloud, and
we further optimize the communication between the mobile clients and the cloud. It is demonstrated that
the data privacy does not degrade when the performance enhancement methods are applied. Our
experiments show that TEES reduces the computation time by 23% to 46% and save the energy
consumption by 35% to 55% per file retrieval, meanwhile the network traffics during the file retrievals are
also significantly reduced.
EXISTING SYSTEM:
The compatible is not existing file encryption schemes and it cannot deal with compressing data. After that
many methods of keyword search showed up such as. In Information Retrieval, TF-IDF (term frequency-
inverse document frequency) is a statistic which reflects how important a word is to a document in a
collection or corpus. It is often used as a weighting factor in keyword-based retrieval and text mining. The
TF-IDF algorithm proposed by Salton and McGill’s book is one of the most popular schemes, among other
schemes as.
Up to now, encrypted search includes Boolean keyword search and ranked keyword search. In Boolean
keyword search the server sends back files only based on the existence or absence of the keywords,
without looking at their relevance.
DISADVANTAGE:
• It’s not compatible with existing file encryption schemes and it cannot deal with compressing data. After
that many methods of keyword search showed up.Using Awesome Backgrounds.
PROPOSED SYSTEM:
In this project, Proposed a one-to-one mapping OPE which will lead to Statistics Information Leak Control
Wang et al. Proposed a one-to-many mapping OPE They implemented a complicate algorithm for security
protection. However, their performance and energy consumption would a problem since their algorithm
was complicate and need much computing resource. Proposed a confidentiality preserving rank ordered
search. This scheme displays low performances as the relevance scores are computed on the client side,
increasing its workload.
Proposed a one round trip search scheme which could search the encrypted data. It worth noticing that
multi keyword ranked search may incur more serious.
ADVANTAGE:
The advantages of the TEES design in terms of relevance score calculation offloading, and thus leads to
reduction of file search and retrieval process.
ALGORITHM:
• Ranked keyword procedure.
• TF/IDF.
ARCHITECTURE :
FUTURE WORK:
We would like to propose a multi-keyword search scheme to perform encrypted data
search over mobile cloud in future.
SYSTEM CONFIGURATION WORK:
HARDWARE CONFIGURATION
System : Pentium IV 2.4 GHz.
Hard Disk : 40 GB.
Monitor : 15 VGA Colour.
Mouse : Logitech.
Ram : 1 GB.
SOFTWARE CONFIGURATION
Operating system : Windows XP/7/8.
Coding Language : JAVA/J2EE
IDE : Eclipse
Database : MYSQL
REFERENCES:
[1] L. Vaquero, L. Rodero-Merino, J. Caceres, and M. Lindner, “A break in the clouds: towards a
cloud definition,” ACM SIGCOMM Computer Communication Review, vol. 39, no. 1, pp. 50–
55, 2008.
[2] X. Yu and Q. Wen, “Design of security solution to mobile cloud storage,” in Knowledge
Discovery and Data Mining. Springer, 2012, pp. 255–263.
[3] D. Huang, “Mobile cloud computing,” IEEE COMSOC Multimedia Communications Technical
Committee (MMTC) E-Letter, 2011.
[4] O. Mazhelis, G. Fazekas, and P. Tyrvainen, “Impact of storage acquisition intervals on the
cost-efficiency of the private vs. public storage,” in Cloud Computing (CLOUD), 2012 IEEE
5th International Conference on. IEEE, 2012, pp. 646–653.
[5] J. Oberheide, K. Veeraraghavan, E. Cooke, J. Flinn, and F. Jahanian, “Virtualized in-cloud
security services for mobile devices,” in Proceedings of the First Workshop on
Virtualization in Mobile Computing. ACM, 2008, pp. 31–35.
java project centers in chennai

More Related Content

PPTX
Fog computing
PDF
Enabling efficient multi keyword ranked search over encrypted mobile cloud da...
PPTX
Final 1st
PPTX
Accurate and Efficient Secured Dynamic Multi-keyword Ranked Search
PDF
A Secure and Dynamic Multi-keyword Ranked Search Scheme over Encrypted Cloud ...
DOCX
A SECURE AND DYNAMIC MULTI-KEYWORD RANKED SEARCH SCHEME OVER ENCRYPTED CLOUD...
DOCX
A secure and dynamic multi keyword ranked
DOCX
privacy preserving multi keyword ranked search over encrypted cloud data
Fog computing
Enabling efficient multi keyword ranked search over encrypted mobile cloud da...
Final 1st
Accurate and Efficient Secured Dynamic Multi-keyword Ranked Search
A Secure and Dynamic Multi-keyword Ranked Search Scheme over Encrypted Cloud ...
A SECURE AND DYNAMIC MULTI-KEYWORD RANKED SEARCH SCHEME OVER ENCRYPTED CLOUD...
A secure and dynamic multi keyword ranked
privacy preserving multi keyword ranked search over encrypted cloud data

What's hot (18)

PPTX
Privacy preserving multi-keyword ranked search over encrypted cloud data
PDF
A secure and dynamic multi keyword ranked search scheme over encrypted cloud ...
PDF
Survey on Privacy- Preserving Multi keyword Ranked Search over Encrypted Clou...
PDF
A secure and dynamic multi keyword ranked search scheme over encrypted cloud ...
DOCX
Enabling Efficient and Geometric Range Query with Access Control over Encrypt...
PDF
Enabling efficient multi keyword ranked search over encrypted mobile cloud da...
PPTX
Privacy preservingmulti-keywordrankedsearchoverencryptedclouddata-14090213203...
PPTX
Privacy preserving multi-keyword ranked search over encrypted cloud data
DOCX
Enabling Efficient and Geometric Range Query with Access Control over Encrypt...
PPT
Privacy preserving multi-keyword ranked search over encrypted cloud data
DOC
A secure and dynamic multi keyword ranked search scheme over encrypted cloud ...
DOC
A secure and dynamic multi keyword ranked search scheme over encrypted cloud ...
PDF
IRJET- Proficient Recovery Over Records using Encryption in Cloud Computing
DOCX
ENABLING FINE-GRAINED MULTI-KEYWORD SEARCH SUPPORTING CLASSIFIED SUB-DICTIONA...
PDF
Privacy preserving multi-keyword ranked search over encrypted cloud data 2
DOCX
Privacy preserving multi-keyword ranked search over encrypted cloud data
PDF
Data Search in Cloud using the Encrypted Keywords
PPTX
Access Control & Encryption In Cloud Environments
Privacy preserving multi-keyword ranked search over encrypted cloud data
A secure and dynamic multi keyword ranked search scheme over encrypted cloud ...
Survey on Privacy- Preserving Multi keyword Ranked Search over Encrypted Clou...
A secure and dynamic multi keyword ranked search scheme over encrypted cloud ...
Enabling Efficient and Geometric Range Query with Access Control over Encrypt...
Enabling efficient multi keyword ranked search over encrypted mobile cloud da...
Privacy preservingmulti-keywordrankedsearchoverencryptedclouddata-14090213203...
Privacy preserving multi-keyword ranked search over encrypted cloud data
Enabling Efficient and Geometric Range Query with Access Control over Encrypt...
Privacy preserving multi-keyword ranked search over encrypted cloud data
A secure and dynamic multi keyword ranked search scheme over encrypted cloud ...
A secure and dynamic multi keyword ranked search scheme over encrypted cloud ...
IRJET- Proficient Recovery Over Records using Encryption in Cloud Computing
ENABLING FINE-GRAINED MULTI-KEYWORD SEARCH SUPPORTING CLASSIFIED SUB-DICTIONA...
Privacy preserving multi-keyword ranked search over encrypted cloud data 2
Privacy preserving multi-keyword ranked search over encrypted cloud data
Data Search in Cloud using the Encrypted Keywords
Access Control & Encryption In Cloud Environments
Ad

Similar to Tees an efficient search scheme over (20)

PDF
scientific report journal
PDF
Tees an efficient search scheme over
PDF
A Secure and Dynamic Multi-keyword Ranked Search Scheme over Encrypted Cloud ...
PPTX
Privacy preserving multi-keyword ranked search over encrypted cloud data
PPTX
Privacy preserving multi-keyword ranked search over encrypted cloud data
PDF
J017547478
PDF
IRJET - K-Gram based Composite Secret Sign Search Over Encrypted Cloud In...
PDF
Titles with Abstracts_2023-2024_Cloud Computing.pdf
PDF
Secure Multi-Keyword Top-K Retrieval Over Encrypted Cloud Data Using Homomorp...
PDF
O01761103112
PDF
IRJET - Privacy Preserving Keyword Search over Encrypted Data in the Cloud
DOCX
IEEE 2014 DOTNET CLOUD COMPUTING PROJECTS Fuzzy keyword search over
PDF
IRJET- An EFficiency and Privacy-Preserving Biometric Identification Scheme i...
PDF
Enabling efficient multi keyword ranked search over encrypted mobile cloud da...
PDF
Seed block algorithm
PDF
Cloud java titles adrit solutions
PDF
Improving Data Storage Security in Cloud using Hadoop
PDF
Ijarcet vol-2-issue-3-951-956
DOCX
2014 IEEE DOTNET CLOUD COMPUTING PROJECT Fuzzy keyword search over
PDF
Enabling efficient multi keyword ranked
scientific report journal
Tees an efficient search scheme over
A Secure and Dynamic Multi-keyword Ranked Search Scheme over Encrypted Cloud ...
Privacy preserving multi-keyword ranked search over encrypted cloud data
Privacy preserving multi-keyword ranked search over encrypted cloud data
J017547478
IRJET - K-Gram based Composite Secret Sign Search Over Encrypted Cloud In...
Titles with Abstracts_2023-2024_Cloud Computing.pdf
Secure Multi-Keyword Top-K Retrieval Over Encrypted Cloud Data Using Homomorp...
O01761103112
IRJET - Privacy Preserving Keyword Search over Encrypted Data in the Cloud
IEEE 2014 DOTNET CLOUD COMPUTING PROJECTS Fuzzy keyword search over
IRJET- An EFficiency and Privacy-Preserving Biometric Identification Scheme i...
Enabling efficient multi keyword ranked search over encrypted mobile cloud da...
Seed block algorithm
Cloud java titles adrit solutions
Improving Data Storage Security in Cloud using Hadoop
Ijarcet vol-2-issue-3-951-956
2014 IEEE DOTNET CLOUD COMPUTING PROJECT Fuzzy keyword search over
Enabling efficient multi keyword ranked
Ad

Recently uploaded (20)

PDF
RMMM.pdf make it easy to upload and study
PDF
3rd Neelam Sanjeevareddy Memorial Lecture.pdf
PDF
Trump Administration's workforce development strategy
DOC
Soft-furnishing-By-Architect-A.F.M.Mohiuddin-Akhand.doc
PPTX
Lesson notes of climatology university.
PDF
2.FourierTransform-ShortQuestionswithAnswers.pdf
PPTX
Microbial diseases, their pathogenesis and prophylaxis
PDF
01-Introduction-to-Information-Management.pdf
PPTX
202450812 BayCHI UCSC-SV 20250812 v17.pptx
PDF
A GUIDE TO GENETICS FOR UNDERGRADUATE MEDICAL STUDENTS
PDF
Computing-Curriculum for Schools in Ghana
PDF
Black Hat USA 2025 - Micro ICS Summit - ICS/OT Threat Landscape
PPTX
Final Presentation General Medicine 03-08-2024.pptx
PPTX
Tissue processing ( HISTOPATHOLOGICAL TECHNIQUE
PDF
FourierSeries-QuestionsWithAnswers(Part-A).pdf
PDF
VCE English Exam - Section C Student Revision Booklet
PPTX
Pharmacology of Heart Failure /Pharmacotherapy of CHF
PPTX
Orientation - ARALprogram of Deped to the Parents.pptx
PDF
grade 11-chemistry_fetena_net_5883.pdf teacher guide for all student
PDF
O5-L3 Freight Transport Ops (International) V1.pdf
RMMM.pdf make it easy to upload and study
3rd Neelam Sanjeevareddy Memorial Lecture.pdf
Trump Administration's workforce development strategy
Soft-furnishing-By-Architect-A.F.M.Mohiuddin-Akhand.doc
Lesson notes of climatology university.
2.FourierTransform-ShortQuestionswithAnswers.pdf
Microbial diseases, their pathogenesis and prophylaxis
01-Introduction-to-Information-Management.pdf
202450812 BayCHI UCSC-SV 20250812 v17.pptx
A GUIDE TO GENETICS FOR UNDERGRADUATE MEDICAL STUDENTS
Computing-Curriculum for Schools in Ghana
Black Hat USA 2025 - Micro ICS Summit - ICS/OT Threat Landscape
Final Presentation General Medicine 03-08-2024.pptx
Tissue processing ( HISTOPATHOLOGICAL TECHNIQUE
FourierSeries-QuestionsWithAnswers(Part-A).pdf
VCE English Exam - Section C Student Revision Booklet
Pharmacology of Heart Failure /Pharmacotherapy of CHF
Orientation - ARALprogram of Deped to the Parents.pptx
grade 11-chemistry_fetena_net_5883.pdf teacher guide for all student
O5-L3 Freight Transport Ops (International) V1.pdf

Tees an efficient search scheme over

  • 1. TEES: An Efficient Search Scheme over Encrypted Data on Mobile Cloud
  • 2. Abstract Cloud storage provides a convenient, massive, and scalable storage at low cost, but data privacy is a major concern that prevents users from storing files on the cloud trustingly. One way of enhancing privacy from data owner point of view is to encrypt the files before outsourcing them onto the cloud and decrypt the files after downloading them. However, data encryption is a heavy overhead for the mobile devices, and data retrieval process incurs a complicated communication between the data user and cloud. Normally with limited bandwidth capacity and limited battery life, these issues introduce heavy overhead to computing and communication as well as a higher power consumption for mobile device users, which makes the encrypted search over mobile cloud very challenging. In this paper, we propose TEES (Traffic and Energy saving Encrypted Search), a bandwidth and energy efficient encrypted search architecture over mobile cloud. The proposed architecture offloads the computation from mobile devices to the cloud, and we further optimize the communication between the mobile clients and the cloud. It is demonstrated that the data privacy does not degrade when the performance enhancement methods are applied. Our experiments show that TEES reduces the computation time by 23% to 46% and save the energy consumption by 35% to 55% per file retrieval, meanwhile the network traffics during the file retrievals are also significantly reduced.
  • 3. EXISTING SYSTEM: The compatible is not existing file encryption schemes and it cannot deal with compressing data. After that many methods of keyword search showed up such as. In Information Retrieval, TF-IDF (term frequency- inverse document frequency) is a statistic which reflects how important a word is to a document in a collection or corpus. It is often used as a weighting factor in keyword-based retrieval and text mining. The TF-IDF algorithm proposed by Salton and McGill’s book is one of the most popular schemes, among other schemes as. Up to now, encrypted search includes Boolean keyword search and ranked keyword search. In Boolean keyword search the server sends back files only based on the existence or absence of the keywords, without looking at their relevance.
  • 4. DISADVANTAGE: • It’s not compatible with existing file encryption schemes and it cannot deal with compressing data. After that many methods of keyword search showed up.Using Awesome Backgrounds.
  • 5. PROPOSED SYSTEM: In this project, Proposed a one-to-one mapping OPE which will lead to Statistics Information Leak Control Wang et al. Proposed a one-to-many mapping OPE They implemented a complicate algorithm for security protection. However, their performance and energy consumption would a problem since their algorithm was complicate and need much computing resource. Proposed a confidentiality preserving rank ordered search. This scheme displays low performances as the relevance scores are computed on the client side, increasing its workload. Proposed a one round trip search scheme which could search the encrypted data. It worth noticing that multi keyword ranked search may incur more serious.
  • 6. ADVANTAGE: The advantages of the TEES design in terms of relevance score calculation offloading, and thus leads to reduction of file search and retrieval process.
  • 7. ALGORITHM: • Ranked keyword procedure. • TF/IDF.
  • 9. FUTURE WORK: We would like to propose a multi-keyword search scheme to perform encrypted data search over mobile cloud in future.
  • 10. SYSTEM CONFIGURATION WORK: HARDWARE CONFIGURATION System : Pentium IV 2.4 GHz. Hard Disk : 40 GB. Monitor : 15 VGA Colour. Mouse : Logitech. Ram : 1 GB. SOFTWARE CONFIGURATION Operating system : Windows XP/7/8. Coding Language : JAVA/J2EE IDE : Eclipse Database : MYSQL
  • 11. REFERENCES: [1] L. Vaquero, L. Rodero-Merino, J. Caceres, and M. Lindner, “A break in the clouds: towards a cloud definition,” ACM SIGCOMM Computer Communication Review, vol. 39, no. 1, pp. 50– 55, 2008. [2] X. Yu and Q. Wen, “Design of security solution to mobile cloud storage,” in Knowledge Discovery and Data Mining. Springer, 2012, pp. 255–263. [3] D. Huang, “Mobile cloud computing,” IEEE COMSOC Multimedia Communications Technical Committee (MMTC) E-Letter, 2011. [4] O. Mazhelis, G. Fazekas, and P. Tyrvainen, “Impact of storage acquisition intervals on the cost-efficiency of the private vs. public storage,” in Cloud Computing (CLOUD), 2012 IEEE 5th International Conference on. IEEE, 2012, pp. 646–653. [5] J. Oberheide, K. Veeraraghavan, E. Cooke, J. Flinn, and F. Jahanian, “Virtualized in-cloud security services for mobile devices,” in Proceedings of the First Workshop on Virtualization in Mobile Computing. ACM, 2008, pp. 31–35.
  • 12. java project centers in chennai