DocumentCode
698949
Title
New Private Information Retrieval Protocol Using Social Bees Lifstyle over Cloud Computing
Author
Hadj Ahmed, Bouarara ; Amine, Abdelmalek ; Reda Mohamed, Hamou
Author_Institution
Dept. of Comput. Sci., Tahar Moulay Univ. of Saida, Algeria
fYear
2015
fDate
13-14 Feb. 2015
Firstpage
161
Lastpage
165
Abstract
Recently, a novel form of web services had seen the light under the name of Cloud Computing which presents the dematerialisation of software, systems and infrastructures. However, in a world where digital information is everywhere, finding the desired information has become a crucial problem. In other hand, the users of cloud services starting asking about their privacy protection, particularly when they lose control of their data during the treatment and even some of them think about counting the service providers themselves as honest attackers. For that, new approaches had been published in every axis of the privacy preserving domain. One of these axis consists of a special retrieval models which allow both finding and hiding sensitive desired information at the same time. The substance of our work is a new system of private information retrieval protocol (PIR) composed of four steps the authentication to ensure the identification of authorised users. The encryption of stored documents by the server using the boosting algorithm based on the life of bees and multi-filter cryptosystems. The information retrieval step using a combination of distances by social bees where a document must pass through three dams controlled with three types of worker bees, the bee queen represents the query and the hive represents the class of relevant documents. Finally, a visualization step that permits the presentation of the results in graphical format understandable by humans as a 3D cube. Our objectives is to amend the response to users´ demands.
Keywords
Web services; cloud computing; cryptography; data protection; data visualisation; information retrieval; 3D cube; PIR; authentication; authorised user identification; bee hive; bee queen; boosting algorithm; cloud computing; cloud services; digital information; graphical format; multifilter cryptosystems; privacy preserving domain; privacy protection; private information retrieval protocol; sensitive desired information hiding; service providers; social bee lifestyle; software, dematerialisation; stored documents encryption; user demands; visualization step; web services; worker bees; Boosting; Cloud computing; Encryption; Information retrieval; Protocols; Boosting Cryptosystem; Cloud Computing; Private Information Retrieval; Social bees; Visualisation;
fLanguage
English
Publisher
ieee
Conference_Titel
Computational Intelligence & Communication Technology (CICT), 2015 IEEE International Conference on
Conference_Location
Ghaziabad
Print_ISBN
978-1-4799-6022-4
Type
conf
DOI
10.1109/CICT.2015.163
Filename
7078687
Link To Document