A Searchable and Verifiable Data Protection Scheme for Scholarly Big Data
Abstract:
Scientific research achievements play a positive role in the promotion of social development. Scholarly big data include scholars’ scientific research, experimental data, and their own identity information. The security of scholarly big data relates to the authors’ reputation and the copyright of their works. This paper proposes a trusted third-party-aided searchable and verifiable data protection scheme that utilizes cloud computing technology. For a better description of the the protocol, we first present a user-differentiated system model and a cube data storage structure. On the basis of the novel system model and data structure, the scheme helps the users review the integrity of their uploaded or downloaded data at any time and search the online scholarly data with encrypted keywords. The security analysis and performance simulation demonstrate that the novel scheme is a secure and efficient scheme for scholarly big data applications.
Existing System:
Cloud data secure searches are a the problems faced by users with the continuous development of cloud computing technology. A large number of researchers [34], [35], [36], [37], [38] have devoted efforts to proposing reliable schemes for secure searches of the data in the cloud. Orencik et al. [34] present a privacy-preserving searchable scheme for encrypted data using queries with multiple keywords. Additionally, the scheme can hide the search patterns and provide an effective scoring and ranking capability. Focusing on the range query problem, Jho et al. [35] present a novel searchable encryption protocol that provides an efficient range query by utilizing symmetric key encryption systems. Miao et al. [36] present a scheme that can achieve a verifiable conjunctive keywords search of encrypted data without a secure channel. The scheme is proved to ensure data integrity and availability.
Proposed System:
In this paper can meet the user’s requirements for data integrity verification and keyword encrypted search. A scenario was set up to better demonstrate the workflow and features of the proposed scheme. A user u (author or editor) sends data to CS with a series of encrypted keywords, and another user u ∗ (reader) searches the data for the keyword W∗ and asks the system to provide an integrity verification of the data results for which he is searching. Note that this reader may be the author or editor himself or other people who pass the system authentication. In addition, the proposed scheme allows multiple users to upload data. To simplify the scheme described in this section, only one user is designed to upload data for searching.
Conclusion:
In this paper, we construct a system model that can distinguish the users according to their roles and special requirements of scholarly big data. Moreover, an innovative cube data storage structure is proposed. On the basis of the novel system and data structure, we present a novel searchable and verifiable data protection scheme for scholarly big data. The security and performance analyses show that our scheme is efficient for scholarly big data. In the future, we will design a secure data sharing scheme for scholarly big data to supplement our current scheme.
REFERENCES
[1] S. Xie, W. Zhong, K. Xie, R. Yu, and Y. Zhang, “Fair energy scheduling for vehicle-to-grid networks using adaptive dynamic programming,” IEEE Transactions on Neural Networks & Learning Systems, vol. 27, no. 8, pp. 1697–1707, 2016.
[2] Y. Zhang, R. Yu, S. Xie, and W. Yao, “Home m2m networks: Architectures, standards, and qos improvement,” Communications Magazine IEEE, vol. 49, no. 4, pp. 44–52, 2011.
[3] S. Tuarob, S. Bhatia, P. Mitra, and C. L. Giles, “Algorithmseer: A system for extracting and searching for algorithms in scholarly big data,” IEEE Transactions on Big Data, vol. 2, no. 1, pp. 3–17, 2016.
[4] Y. Sun and F. Gu, “Compressive sensing of piezoelectric sensor response signal for phased array structural health monitoring,” International Journal of Sensor Networks, vol. 23, no. 4, pp. 258–264, 2
[5] J. Shen, C. Wang, C.-F. Lai, A. Wang, and H.-C. Chao, “Direction density-based secure routing protocol for healthcare data in incompletely predictable networks,” IEEE Access, vol. 4, pp. 9163– 9173, 2016.
[6] F. Xia, W. Wang, T. M. Bekele, and H. Liu, “Big scholarly data: A survey,” IEEE Transactions on Big Data, vol. 3, no. 1, pp. 18–35, 2017.
[7] Z. Zhou, C. Gao, C. Xu, Y. Zhang, S. Mumtaz, and J. Rodriguez, “Social big data based content dissemination in internet of vehicles,” IEEE Transactions on Industrial Informatics, vol. 14, no. 2, pp. 768–777, 2018.
[8] W.-L. Chin, W. Li, and H.-H. Chen, “Energy big data security threats in iot-based smart grid communications,” IEEE Communications Magazine, vol. 55, no. 10, pp. 70–75, 2017.
[9] Y. Xiang, W. Zhou, and M. Guo, “Flexible deterministic packet marking: An ip traceback system to find the real source of attacks,” IEEE Transactions on Parallel and Distributed Systems, vol. 20, no. 4, pp. 567–580, 2009.
[10] X. Chen, J. Li, J. Ma, Q. Tang, and W. Lou, “New algorithms for secure outsourcing of modular exponentiations,” IEEE Transactions on Parallel and Distributed Systems, vol. 25, no. 9, pp. 2386–2396, 2014.
[11] J. Shen, J. Shen, X. Chen, X. Huang, and W. Susilo, “An efficient public auditing protocol with novel dynamic structure for cloud data,” IEEE Transactions on Information Forensics and Security, vol. 12, no. 10, pp. 2402–2415, 2017.
[12] B. Wang, X. Gu, L. Ma, and S. Yan, “Temperature error correction based on bp neural network in meteorological wireless sensor network,” International Journal of Sensor Networks, vol. 23, no. 4, pp. 265–278, 2017.
[13] W. Zhong, K. Xie, Y. Liu, C. Yang, and S. Xie, “Auction mechanisms for energy trading in multi-energy systems,” IEEE Transactions on Industrial Informatics, vol. 14, no. 4, pp. 1511–1521, 2018.
[14] J. Kang, R. Yu, X. Huang, S. Maharjan, Y. Zhang, and E. Hossain, “Enabling localized peer-to-peer electricity trading a plugin hybrid electric vehicles using consortium blockchains,” IEEE Transactions on Industrial Informatics, vol. 13, no. 6, pp. 3154–3164, 2017.
[15] J. Li, X. Li, B. Yang, and X. Sun, “Segmentation-based image copymove forgery detection scheme,” IEEE Transactions on Information Forensics and Security, vol. 10, no. 3, pp. 507–518, 2015.