• DocumentCode
    698949
  • Title

    New Private Information Retrieval Protocol Using Social Bees Lifstyle over Cloud Computing

  • Author

    Hadj Ahmed, Bouarara ; Amine, Abdelmalek ; Reda Mohamed, Hamou

  • Author_Institution
    Dept. of Comput. Sci., Tahar Moulay Univ. of Saida, Algeria
  • fYear
    2015
  • fDate
    13-14 Feb. 2015
  • Firstpage
    161
  • Lastpage
    165
  • Abstract
    Recently, a novel form of web services had seen the light under the name of Cloud Computing which presents the dematerialisation of software, systems and infrastructures. However, in a world where digital information is everywhere, finding the desired information has become a crucial problem. In other hand, the users of cloud services starting asking about their privacy protection, particularly when they lose control of their data during the treatment and even some of them think about counting the service providers themselves as honest attackers. For that, new approaches had been published in every axis of the privacy preserving domain. One of these axis consists of a special retrieval models which allow both finding and hiding sensitive desired information at the same time. The substance of our work is a new system of private information retrieval protocol (PIR) composed of four steps the authentication to ensure the identification of authorised users. The encryption of stored documents by the server using the boosting algorithm based on the life of bees and multi-filter cryptosystems. The information retrieval step using a combination of distances by social bees where a document must pass through three dams controlled with three types of worker bees, the bee queen represents the query and the hive represents the class of relevant documents. Finally, a visualization step that permits the presentation of the results in graphical format understandable by humans as a 3D cube. Our objectives is to amend the response to users´ demands.
  • Keywords
    Web services; cloud computing; cryptography; data protection; data visualisation; information retrieval; 3D cube; PIR; authentication; authorised user identification; bee hive; bee queen; boosting algorithm; cloud computing; cloud services; digital information; graphical format; multifilter cryptosystems; privacy preserving domain; privacy protection; private information retrieval protocol; sensitive desired information hiding; service providers; social bee lifestyle; software, dematerialisation; stored documents encryption; user demands; visualization step; web services; worker bees; Boosting; Cloud computing; Encryption; Information retrieval; Protocols; Boosting Cryptosystem; Cloud Computing; Private Information Retrieval; Social bees; Visualisation;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Computational Intelligence & Communication Technology (CICT), 2015 IEEE International Conference on
  • Conference_Location
    Ghaziabad
  • Print_ISBN
    978-1-4799-6022-4
  • Type

    conf

  • DOI
    10.1109/CICT.2015.163
  • Filename
    7078687