{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T15:42:15Z","timestamp":1760197335226,"version":"build-2065373602"},"reference-count":39,"publisher":"MDPI AG","issue":"4","license":[{"start":{"date-parts":[[2018,4,13]],"date-time":"2018-04-13T00:00:00Z","timestamp":1523577600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Sensors"],"abstract":"<jats:p>Smart sensor-equipped mobile devices sense, collect, and process data generated by the edge network to achieve intelligent control, but such mobile devices usually have limited storage and computing resources. Mobile cloud storage provides a promising solution owing to its rich storage resources, great accessibility, and low cost. But it also brings a risk of information leakage. The encryption of sensitive data is the basic step to resist the risk. However, deploying a high complexity encryption and decryption algorithm on mobile devices will greatly increase the burden of terminal operation and the difficulty to implement the necessary privacy protection algorithm. In this paper, we propose ENSURE (EfficieNt and SecURE), an efficient and secure encrypted search architecture over mobile cloud storage. ENSURE is inspired by edge computing. It allows mobile devices to offload the computation intensive task onto the edge server to achieve a high efficiency. Besides, to protect data security, it reduces the information acquisition of untrusted cloud by hiding the relevance between query keyword and search results from the cloud. Experiments on a real data set show that ENSURE reduces the computation time by 15% to 49% and saves the energy consumption by 38% to 69% per query.<\/jats:p>","DOI":"10.3390\/s18041189","type":"journal-article","created":{"date-parts":[[2018,4,13]],"date-time":"2018-04-13T14:38:14Z","timestamp":1523630294000},"page":"1189","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":24,"title":["Edge-Based Efficient Search over Encrypted Data Mobile Cloud Storage"],"prefix":"10.3390","volume":"18","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-1877-7796","authenticated-orcid":false,"given":"Yeting","family":"Guo","sequence":"first","affiliation":[{"name":"College of Computer, National University of Defense Technology, Changsha 410073, China"}]},{"given":"Fang","family":"Liu","sequence":"additional","affiliation":[{"name":"School of Data and Computer Science, Sun Yat-Sen University, Guangzhou 510006, China"}]},{"given":"Zhiping","family":"Cai","sequence":"additional","affiliation":[{"name":"College of Computer, National University of Defense Technology, Changsha 410073, China"}]},{"given":"Nong","family":"Xiao","sequence":"additional","affiliation":[{"name":"College of Computer, National University of Defense Technology, Changsha 410073, China"}]},{"given":"Ziming","family":"Zhao","sequence":"additional","affiliation":[{"name":"College of Computer, National University of Defense Technology, Changsha 410073, China"}]}],"member":"1968","published-online":{"date-parts":[[2018,4,13]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","unstructured":"Tang, J., Liu, A., Zhang, J., Xiong, N.N., Zeng, Z., and Wang, T. (2018). A trust-based secure routing scheme using the traceback approach for energy-harvesting wireless sensor networks. Sensors, 18.","DOI":"10.3390\/s18030751"},{"key":"ref_2","doi-asserted-by":"crossref","unstructured":"Liu, A., Huang, M., Zhao, M., and Wang, T. (2018). A smart high-speed backbone path construction approach for energy and delay optimization in WSNS. IEEE Access.","DOI":"10.1109\/ACCESS.2018.2809556"},{"key":"ref_3","doi-asserted-by":"crossref","first-page":"277","DOI":"10.1007\/s11390-018-1819-2","article-title":"LLMP: Exploiting LLDP for Latency Measurement in Software-Defined Data Center Networks","volume":"33","author":"Li","year":"2018","journal-title":"J. Comput. Sci. Technol."},{"key":"ref_4","doi-asserted-by":"crossref","unstructured":"Chun, B.G., Ihm, S., Maniatis, P., Naik, M., and Patti, A. (2011, January 10\u201313). Clonecloud: Elastic execution between mobile device and cloud. Proceedings of the 6th Conference on Computer systems, Salzburg, Austria.","DOI":"10.1145\/1966445.1966473"},{"key":"ref_5","unstructured":"Huang, D. (2011, January 16\u201318). Mobile cloud computing. Proceedings of the 2011 10th IEEE\/ACIS International Conference on Computer and Information Science, Sanya, China."},{"key":"ref_6","doi-asserted-by":"crossref","unstructured":"Huang, D., Zhang, X., Kang, M., and Luo, J. (2010, January 4\u20135). Mobicloud: Building secure cloud framework for mobile computing and communication. Proceedings of the IEEE International Symposium on Service Oriented System Engineering, Nanjing, China.","DOI":"10.1109\/SOSE.2010.20"},{"key":"ref_7","doi-asserted-by":"crossref","unstructured":"Liu, F., and Li, T. (2018). A clustering k-anonymity privacy-preserving method for wearable IoT devices. Secur. Commun. Netw.","DOI":"10.1155\/2018\/4945152"},{"key":"ref_8","doi-asserted-by":"crossref","unstructured":"Sun, W., Cai, Z., Li, Y., Liu, F., Fang, S., and Wang, G. (2018). Security and Privacy in the Medical Internet of Things: A Review. Secur. Commun. Netw.","DOI":"10.1155\/2018\/5978636"},{"key":"ref_9","doi-asserted-by":"crossref","first-page":"8273","DOI":"10.1109\/ACCESS.2018.2809501","article-title":"QTSAC: An energy-efficient mac protocol for delay minimization in wireless sensor networks","volume":"6","author":"Liu","year":"2018","journal-title":"IEEE Access"},{"key":"ref_10","doi-asserted-by":"crossref","unstructured":"Zerr, S., Demidova, E., Olmedilla, D., Nejdl, W., Winslett, M., and Mitra, S. (2008, January 25\u201329). Zerber: R-confidential indexing for distributed documents. Proceedings of the International Conference on Extending Database Technology (EDBT 2008), Nantes, France.","DOI":"10.1145\/1353343.1353380"},{"key":"ref_11","doi-asserted-by":"crossref","unstructured":"Swaminathan, A., Mao, Y., Su, G.M., Gou, H., Varna, A.L., He, S., Wu, M., and Oard, D.W. (2007, January 29). Confidentiality-preserving rank-ordered search. Proceedings of the 2007 ACM Workshop on Storage Security and Survivability, Alexandria, VA, USA.","DOI":"10.1145\/1314313.1314316"},{"key":"ref_12","doi-asserted-by":"crossref","first-page":"895","DOI":"10.3233\/JCS-2011-0426","article-title":"Searchable symmetric encryption: Improved definitions and efficient constructions","volume":"19","author":"Curtmola","year":"2011","journal-title":"J. Comput. Secur."},{"key":"ref_13","first-page":"5","article-title":"Building an encrypted and searchable audit log","volume":"4","author":"Waters","year":"2004","journal-title":"Annu. Netw. Distrib. Syst. Secur. Symp."},{"key":"ref_14","doi-asserted-by":"crossref","first-page":"126","DOI":"10.1109\/TCC.2015.2398426","article-title":"Tees: An efficient search scheme over encrypted data on mobile cloud","volume":"5","author":"Li","year":"2017","journal-title":"IEEE Trans. Cloud Comput."},{"key":"ref_15","doi-asserted-by":"crossref","unstructured":"Wang, C., Cao, N., Li, J., Ren, K., and Lou, W. (2010, January 21\u201325). Secure ranked keyword search over encrypted cloud data. Proceedings of the IEEE International Conference on Distributed Computing Systems, Genova, Italy.","DOI":"10.1109\/ICDCS.2010.34"},{"key":"ref_16","unstructured":"Zerr, S., Olmedilla, D., Nejdl, W., and Siberski, W. (2009, January 23\u201326). Zerber+r: Top-k retrieval from a confidential index. Proceedings of the International Conference on Extending Database Technology: Advances in Database Technology, Saint-Petersburg, Russia."},{"key":"ref_17","unstructured":"Islam, M.S., Kuzu, M., and Kantarcioglu, M. (2012, January 5\u20138). Access pattern disclosure on searchable encryption: Ramification, attack and mitigation. Proceedings of the 19th Annual Network & Distributed System Security Symposium, San Diego, CA, USA."},{"key":"ref_18","doi-asserted-by":"crossref","first-page":"417","DOI":"10.1109\/TC.2011.255","article-title":"A distributed TCAM coprocessor architecture for integrated longest prefix matching, policy filtering, and content filtering","volume":"62","author":"Cai","year":"2013","journal-title":"IEEE Trans. Comput."},{"key":"ref_19","doi-asserted-by":"crossref","unstructured":"Zhang, H., Cai, Z., Liu, Q., Xiao, Q., Li, Y., and Chak, F.C. (2018). A survey on security-aware network measurement in SDN. Secur. Commun. Netw., 2018.","DOI":"10.1155\/2018\/2459154"},{"key":"ref_20","doi-asserted-by":"crossref","first-page":"30","DOI":"10.1109\/MC.2017.9","article-title":"The emergence of edge computing","volume":"50","author":"Satyanarayanan","year":"2017","journal-title":"Computer"},{"key":"ref_21","doi-asserted-by":"crossref","first-page":"637","DOI":"10.1109\/JIOT.2016.2579198","article-title":"Edge computing: Vision and challenges","volume":"3","author":"Shi","year":"2016","journal-title":"IEEE Internet Things J."},{"key":"ref_22","unstructured":"(2018, January 02). Paradrop. Available online: https:\/\/www.paradrop.org\/."},{"key":"ref_23","unstructured":"Hung, S.H., Shih, C.S., Shieh, J.P., Lee, C.P., and Huang, Y.H. (July, January 30). An online migration environment for executing mobile applications on the cloud. Proceedings of the Fifth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, Seoul, Korea."},{"key":"ref_24","doi-asserted-by":"crossref","unstructured":"Zou, P., Wang, C., Liu, Z., and Bao, D. (2010, January 6\u20138). Phosphor: A cloud based DRM scheme with sim card. Proceedings of the 2010 12th International Asia-Pacific Web Conference, Busan, Korea.","DOI":"10.1109\/APWeb.2010.43"},{"key":"ref_25","doi-asserted-by":"crossref","unstructured":"Ristenpart, T., Tromer, E., Shacham, H., and Savage, S. (2009, January 9\u201313). Hey, you, get off of my cloud: Exploring information leakage in third-party compute clouds. Proceedings of the 16th ACM Conference on Computer and Communications Security, Chicago, IL, USA.","DOI":"10.1145\/1653662.1653687"},{"key":"ref_26","doi-asserted-by":"crossref","unstructured":"Chang, Y.C., and Mitzenmacher, M. (2005, January 7\u201310). Privacy preserving keyword searches on remote encrypted data. Proceedings of the International Conference on Applied Cryptography and Network Security (ACNS 2005), New York, NY, USA.","DOI":"10.1007\/11496137_30"},{"key":"ref_27","unstructured":"Miettinen, A.P., and Nurminen, J.K. (2010, January 22\u201325). Energy efficiency of mobile clients in cloud computing. Proceedings of the 2nd Usenix Conference on Hot Topics in Cloud Computing, Boston, MA, USA."},{"key":"ref_28","doi-asserted-by":"crossref","unstructured":"Bowers, K.D., Juels, A., and Oprea, A. (2009, January 9\u201313). Hail: A high-availability and integrity layer for cloud storage. Proceedings of the 16th ACM Conference on Computer and Communications Security, Chicago, IL, USA.","DOI":"10.1145\/1653662.1653686"},{"key":"ref_29","first-page":"1","article-title":"Mobile edge computing\u2014A key technology towards 5G","volume":"11","author":"Hu","year":"2015","journal-title":"ETSI White Paper"},{"key":"ref_30","doi-asserted-by":"crossref","first-page":"5531","DOI":"10.1109\/ACCESS.2017.2693438","article-title":"Biometric security through visual encryption for fog edge computing","volume":"5","author":"Abdul","year":"2017","journal-title":"IEEE Access"},{"key":"ref_31","doi-asserted-by":"crossref","unstructured":"Jridi, M., Chapel, T., Dorez, V., Le Bougeant, G., and Le Botlan, A. (2018). SoC-Based Edge Computing Gateway in the Context of the Internet of Multimedia Things: Experimental Platform. J. Low Power Electron. Appl., 8.","DOI":"10.3390\/jlpea8010001"},{"key":"ref_32","doi-asserted-by":"crossref","unstructured":"Jindal, M., and Dave, M. (2014, January 9\u201311). Data security protocol for cloudlet based architecture. Proceedings of the Recent Advances and Innovations in Engineering, Jaipur, India.","DOI":"10.1109\/ICRAIE.2014.6909186"},{"key":"ref_33","doi-asserted-by":"crossref","unstructured":"Huang, D., Zhou, Z., Xu, L., Xing, T., and Zhong, Y. (2011, January 10\u201315). In Secure data processing framework for mobile cloud computing. Proceedings of the Computer Communications Workshops, Shanghai, China.","DOI":"10.1109\/INFCOMW.2011.5928886"},{"key":"ref_34","doi-asserted-by":"crossref","first-page":"6","DOI":"10.1145\/1132956.1132959","article-title":"Inverted Files for Text Search Engines","volume":"38","author":"Zobel","year":"2006","journal-title":"ACM Comput. Surv."},{"key":"ref_35","doi-asserted-by":"crossref","first-page":"51","DOI":"10.1109\/MC.2010.98","article-title":"Cloud computing for mobile users: Can offloading computation save energy?","volume":"43","author":"Kumar","year":"2010","journal-title":"Computer"},{"key":"ref_36","doi-asserted-by":"crossref","unstructured":"Cash, D., Perry, J., Perry, J., and Ristenpart, T. (2015, January 12\u201316). Leakage-abuse attacks against searchable encryption. Proceedings of the ACM Conference on Computer and Communications Security, Denver, CO, USA.","DOI":"10.1145\/2810103.2813700"},{"key":"ref_37","doi-asserted-by":"crossref","first-page":"176","DOI":"10.1016\/j.ins.2013.11.021","article-title":"Search pattern leakage in searchable encryption: Attacks and new construction","volume":"265","author":"Liu","year":"2014","journal-title":"Inf. Sci."},{"key":"ref_38","unstructured":"Internet Engineering Task Force (IETF) (2018, February 08). RFCs. Available online: http:\/\/www.ietf.org\/standards\/rfcs\/."},{"key":"ref_39","unstructured":"Qualcomm (2018, February 10). Trepn Power Profiler. Available online: https:\/\/developer.qualcomm.com\/software\/trepn-power-profiler."}],"container-title":["Sensors"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/1424-8220\/18\/4\/1189\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T15:00:34Z","timestamp":1760194834000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/1424-8220\/18\/4\/1189"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,4,13]]},"references-count":39,"journal-issue":{"issue":"4","published-online":{"date-parts":[[2018,4]]}},"alternative-id":["s18041189"],"URL":"https:\/\/doi.org\/10.3390\/s18041189","relation":{},"ISSN":["1424-8220"],"issn-type":[{"type":"electronic","value":"1424-8220"}],"subject":[],"published":{"date-parts":[[2018,4,13]]}}}