Secure and Efficient Product Information Retrieval in Cloud Computing

被引:1
作者
Zhao, Ying-Si [1 ]
Zeng, Qing-An [2 ]
机构
[1] Beijing Jiaotong Univ, Sch Econ & Management, Beijing 100044, Peoples R China
[2] North Carolina A&T State Univ, Dept Comp Syst Technol, Greensboro, NC 27411 USA
关键词
Product information retrieval; cloud computing; information security; PUBLIC-KEY ENCRYPTION; CONJUNCTIVE KEYWORD SEARCH; BIG DATA; PRIVACY;
D O I
10.1109/ACCESS.2018.2816919
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Cloud computing is a promising information technique (IT) that can organize a large amount of IT resources in an efficient and flexible manner. Increasingly numerous companies plan to move their local data management systems to the cloud and store and manage their product information on cloud servers. An accompanying challenge is how to protect the security of the commercially confidential data, while maintaining the ability to search the data. In this paper, a privacy-preserving data search scheme is proposed, that can support both the identifier-based and feature-based product searches. Specifically, two novel index trees are constructed and encrypted, that can be searched without knowing the plaintext data. Analysis and simulation results demonstrate the security and efficiency of our scheme.
引用
收藏
页码:14747 / 14754
页数:8
相关论文
共 50 条
[31]   Cloud Computing and Information Policy: Computing in a Policy Cloud? [J].
Jaeger, Paul T. ;
Lin, Jimmy ;
Grimes, Justin M. .
JOURNAL OF INFORMATION TECHNOLOGY & POLITICS, 2008, 5 (03) :269-283
[32]   A Secure Framework for Mobile Cloud Computing [J].
Al-Omary, Alauddin .
2019 INTERNATIONAL CONFERENCE ON INNOVATION AND INTELLIGENCE FOR INFORMATICS, COMPUTING, AND TECHNOLOGIES (3ICT), 2019,
[33]   Secure integration of IoT and Cloud Computing [J].
Stergiou, Christos ;
Psannis, Kostas E. ;
Kim, Byung-Gyu ;
Gupta, Brij .
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2018, 78 :964-975
[34]   A secure and efficient mechanism for scheduling tasks in cloud computing environments [J].
Bairagi, Ravi ;
Purohit, Preetesh ;
Bandhu, Kailash Chandra ;
Litoriya, Ratnesh .
SECURITY AND PRIVACY, 2022, 5 (05)
[35]   Efficient public integrity auditing with secure deduplication in cloud computing [J].
Huo, Huixia ;
Jiang, Tao ;
Tan, Shichong ;
Tao, Xiaoling .
INTERNATIONAL JOURNAL OF EMBEDDED SYSTEMS, 2019, 11 (06) :764-777
[36]   Secure and efficient ownership verification for deduplicated cloud computing systems [J].
Dave, Jay ;
Ram, R. Kamalesh ;
Patil, Pratik ;
Patil, Himanshu ;
Borole, Sarvesh ;
Panda, Subhrakanta .
JOURNAL OF CLOUD COMPUTING-ADVANCES SYSTEMS AND APPLICATIONS, 2025, 14 (01)
[37]   An Efficient and Secure Vehicular Networks Based on IoT and Cloud Computing [J].
El Zouka H.A. .
SN Computer Science, 2022, 3 (3)
[38]   Private Information Retrieval using Stripping Technique in Cloud Computing [J].
Rakesh, M. .
SECOND INTERNATIONAL CONFERENCE ON CURRENT TRENDS IN ENGINEERING AND TECHNOLOGY (ICCTET 2014), 2014, :572-578
[39]   Construction of Green Information Retrieval System Based on Cloud Computing [J].
Yan, Zhang .
PROCEEDINGS OF THE 2014 2ND INTERNATIONAL CONFERENCE ON ADVANCES IN SOCIAL SCIENCE, HUMANITIES AND MANAGEMENT, 2015, 12 :179-181
[40]   Towards Secure Cloud-Computing in FinTechs - An Artefact for Prioritizing Information Security Measures [J].
Leuthe, Daniel ;
Weiss, Florian ;
Dersch, Julian ;
Bitzer, Michael .
PROCEEDINGS OF THE 57TH ANNUAL HAWAII INTERNATIONAL CONFERENCE ON SYSTEM SCIENCES, 2024, :4568-4577