Secure and Efficient Product Information Retrieval in Cloud Computing

被引:1
作者
Zhao, Ying-Si [1 ]
Zeng, Qing-An [2 ]
机构
[1] Beijing Jiaotong Univ, Sch Econ & Management, Beijing 100044, Peoples R China
[2] North Carolina A&T State Univ, Dept Comp Syst Technol, Greensboro, NC 27411 USA
关键词
Product information retrieval; cloud computing; information security; PUBLIC-KEY ENCRYPTION; CONJUNCTIVE KEYWORD SEARCH; BIG DATA; PRIVACY;
D O I
10.1109/ACCESS.2018.2816919
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Cloud computing is a promising information technique (IT) that can organize a large amount of IT resources in an efficient and flexible manner. Increasingly numerous companies plan to move their local data management systems to the cloud and store and manage their product information on cloud servers. An accompanying challenge is how to protect the security of the commercially confidential data, while maintaining the ability to search the data. In this paper, a privacy-preserving data search scheme is proposed, that can support both the identifier-based and feature-based product searches. Specifically, two novel index trees are constructed and encrypted, that can be searched without knowing the plaintext data. Analysis and simulation results demonstrate the security and efficiency of our scheme.
引用
收藏
页码:14747 / 14754
页数:8
相关论文
共 50 条
[41]   Secure and efficient content-based image retrieval using dominant local patterns and watermark encryption in cloud computing [J].
Sucharitha, G. ;
Godavarthi, Deepthi ;
Ramesh, Janjhyam Venkata Naga ;
Khan, M. Ijaz .
CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2024, 27 (09) :11873-11889
[42]   Efficient and secure identity-based encryption scheme with equality test in cloud computing [J].
Wu, Libing ;
Zhang, Yubo ;
Choo, Kim-Kwang Raymond ;
He, Debiao .
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2017, 73 :22-31
[43]   Time efficient secure DNA based access control model for cloud computing environment [J].
Namasudra, Suyel ;
Roy, Pinki ;
Vijayakumar, Pandi ;
Audithan, Sivaraman ;
Balusamy, Balamurugan .
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2017, 73 :90-105
[44]   Protection of personal information in the South African Cloud Computing environment: A framework for Cloud Computing adoption [J].
Skolmen, Dayne Edward ;
Gerber, Mariana .
2015 INFORMATION SECURITY FOR SOUTH AFRICA - PROCEEDINGS OF THE ISSA 2015 CONFERENCE, 2015,
[45]   Efficient and Secure Content-Based Image Retrieval in Cloud-Assisted Internet of Things [J].
Chen, Lin ;
Yang, Yiwei ;
Yang, Li ;
Xu, Chao ;
Miao, Yinbin ;
Liu, Zhiquan ;
Liu, Ximeng ;
Choo, Kim-Kwang Raymond ;
Liang, Zhihong ;
Hong, Chao .
IEEE INTERNET OF THINGS JOURNAL, 2025, 12 (05) :6001-6013
[46]   Towards secure mobile cloud computing: A survey [J].
Khan, Abdul Nasir ;
Kiah, M. L. Mat ;
Khan, Samee U. ;
Madani, Sajjad A. .
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2013, 29 (05) :1278-1299
[47]   Efficient Information Retrieval for Ranked Queries in Cost-Effective Cloud Environments [J].
Liu, Qin ;
Tan, Chiu C. ;
Wu, Jie ;
Wang, Guojun .
2012 PROCEEDINGS IEEE INFOCOM, 2012, :2581-2585
[48]   Secure cloud computing using homomorphic construction [J].
Swathi V. ;
Vani M.P. .
International Journal of Cloud Computing, 2019, 8 (04) :354-370
[49]   Secure and Efficient Online Fingerprint Authentication Scheme Based On Cloud Computing [J].
Liu, Yao ;
Zhou, Tanping ;
Yue, Zelun ;
Liu, Wenchao ;
Han, Yiliang ;
Li, Qi ;
Yang, Xiaoyuan .
IEEE TRANSACTIONS ON CLOUD COMPUTING, 2023, 11 (01) :564-578
[50]   An Efficient and Secure Dynamic Auditing Protocol for Data Storage in Cloud Computing [J].
Yang, Kan ;
Jia, Xiaohua .
IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2013, 24 (09) :1717-1726