DocumentCode :
698949
Title :
New Private Information Retrieval Protocol Using Social Bees Lifstyle over Cloud Computing
Author :
Hadj Ahmed, Bouarara ; Amine, Abdelmalek ; Reda Mohamed, Hamou
Author_Institution :
Dept. of Comput. Sci., Tahar Moulay Univ. of Saida, Algeria
fYear :
2015
fDate :
13-14 Feb. 2015
Firstpage :
161
Lastpage :
165
Abstract :
Recently, a novel form of web services had seen the light under the name of Cloud Computing which presents the dematerialisation of software, systems and infrastructures. However, in a world where digital information is everywhere, finding the desired information has become a crucial problem. In other hand, the users of cloud services starting asking about their privacy protection, particularly when they lose control of their data during the treatment and even some of them think about counting the service providers themselves as honest attackers. For that, new approaches had been published in every axis of the privacy preserving domain. One of these axis consists of a special retrieval models which allow both finding and hiding sensitive desired information at the same time. The substance of our work is a new system of private information retrieval protocol (PIR) composed of four steps the authentication to ensure the identification of authorised users. The encryption of stored documents by the server using the boosting algorithm based on the life of bees and multi-filter cryptosystems. The information retrieval step using a combination of distances by social bees where a document must pass through three dams controlled with three types of worker bees, the bee queen represents the query and the hive represents the class of relevant documents. Finally, a visualization step that permits the presentation of the results in graphical format understandable by humans as a 3D cube. Our objectives is to amend the response to users´ demands.
Keywords :
Web services; cloud computing; cryptography; data protection; data visualisation; information retrieval; 3D cube; PIR; authentication; authorised user identification; bee hive; bee queen; boosting algorithm; cloud computing; cloud services; digital information; graphical format; multifilter cryptosystems; privacy preserving domain; privacy protection; private information retrieval protocol; sensitive desired information hiding; service providers; social bee lifestyle; software, dematerialisation; stored documents encryption; user demands; visualization step; web services; worker bees; Boosting; Cloud computing; Encryption; Information retrieval; Protocols; Boosting Cryptosystem; Cloud Computing; Private Information Retrieval; Social bees; Visualisation;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Computational Intelligence & Communication Technology (CICT), 2015 IEEE International Conference on
Conference_Location :
Ghaziabad
Print_ISBN :
978-1-4799-6022-4
Type :
conf
DOI :
10.1109/CICT.2015.163
Filename :
7078687
Link To Document :
بازگشت