Application of Meta-Heuristics Methods on PIR Protocols Over Cloud Storage Services

Application of Meta-Heuristics Methods on PIR Protocols Over Cloud Storage Services

Hadj Ahmed Bouarara, Reda Mohamed Hamou, Amine Rahmani, Abdelmalek Amine
Copyright: © 2014 |Pages: 19
DOI: 10.4018/ijcac.2014070101
OnDemand:
(Individual Articles)
Available
$37.50
No Current Special Offers
TOTAL SAVINGS: $37.50

Abstract

The term of big, data is an important concept that represents the exponential growth of volume and variety of data collection, one of the advantages of this technology is the ability of treating heterogeneous data, such as textual documents, also as its name indicates ‘big data' refers to the huge volume of data counted by petabytes which implies an information retrieval extension to help users to find their need this extension must incorporate other protection against existent threats. In fact, big data services such as cloud computing do keep traces about user activities and queries, which compromise the user privacy and can offer useful information to network hackers that attack users or even cloud server to adapt or personalize their platforms without the user's agreement, and maybe the most known attack can be man-in-the-middle during a storage or extracting data session between a user and a cloud server for this cause, the need to a secure protocol represent a high necessity which gives birth to the concept of Private Information Retrieval (PIR), as the authors mention before, one of the checks is the vast mass of data that hinders the correct handling of data and increases the error rate for retrieving a relevant information, for that the use of new techniques and approaches that allow the improvement of retrieval models over this kind of services is an important case to be processed. In this purpose, the authors introduce a new proposition called Meta-heuristic Privet Information Retrieval (M-PIR) in order to benefit from the success of meta-heuristics methods and improve the efficiency of PIR protocols in term of returned information; to better meet the needs of users, they use a bag of word for the text representation, TFIDF as weighting for the digitalization, the benchmarking MEDLINE corpus for the experimentation and panoply of validation tools (Recall, Precision, F-measure and Entropy) for the evaluation of our results. So that the paper is over the application of a meta-heuristics algorithms on a set of PIR protocols using a multitude of cryptographic schemes in order to study the influence of these schemes on quality of results.
Article Preview
Top

Introduction And Problematic

The concept of data-driven decision-making is now known broadly over the world, especially with the coming of big data and its promises, in those days there is a big enthusiasm to this technology because of its real goals even if there is currently a wide gap between its theoretic concepts and goals and its realization, people upload more than 2.5 quintillion bytes of data per year.

In order to get much better understanding our work, the authors like to give you a complete grasp about the big data and its concepts, especially the cloud computing, simply the cloud computing is a concept of outsourcing the data from local machines to a set of virtual servers situated at distance by presenting the processing of those data as web services which guarantee an economical useless in term of capacity of material required to the process and also in term of financial concepts by basing on rule of pay what you use. Otherwise, the cloud computing is a model of sharing resources over the web using web services in order to enable convenient on demand, we talk about developing applications without the need to install a recommended platform and storing data without need to big spaces in the computer using storage as a service(Greer, 2012; Li, 2012).

Concerning the concept of big data according to authors in (Jinbao, 2013), it is as a simple of an abstract layer used in order to give a visual way to manage stored data of multiple structures and formats over global storage devices in a fundamental architecture like what Figure 1 indicates.

Figure 1.

General architecture of big data (Jinbao, 2013)

ijcac.2014070101.f01

Privacy, timeless, scalability of data is the most important problems that big data recognize starting from the first step of data acquisition; in fact search information over big data is like searching for a needle in haystack because of the huge volume of data, nowadays, relevance information has become a crucial problem that’s why the construction of an efficient private information retrieval model (PIR) is a challenge in the middle of computer sciences and most of classical methods present several problems such as:

  • In terms of cryptographic schemes where the concept of randomizing during encryption is a necessity to improve the security of such ciphered text which can affect the retrieval model

  • Quality of performance and the results returned

  • The choice of parameters (representation method, similarity measure)

  • Response time

  • The problem of the multiplicity of data

Our target is to handle and settle the problems previously cited where the integration of the optimization algorithms is an important fact in order to obtain scalable and rapid services (Yaga, 2012).

The optimization of retrieval models is a wide area with various techniques that can affect even the optimization of queries or any step of the recovery process, in this paper, we try to project a set of techniques for the optimization’s of a secure retrieve protocol named PIR (Private Information Retrieval) in big data by applying a set of meta-heuristics algorithms in order to improve the efficiency of this approach, for that we include also a clear protocol, which is a retrieval model without security issue in order to give a better comparison and study the influence of cryptosystems on retrieval models

Top

Now many researches are in progress in order to ensure more scalability and rapidity of PIR protocols in big data, in this section we present a set of published works in concerning the retrieval and PIR, models in big data and cloud computing.

Complete Article List

Search this Journal:
Reset
Volume 14: 1 Issue (2024)
Volume 13: 1 Issue (2023)
Volume 12: 4 Issues (2022): 2 Released, 2 Forthcoming
Volume 11: 4 Issues (2021)
Volume 10: 4 Issues (2020)
Volume 9: 4 Issues (2019)
Volume 8: 4 Issues (2018)
Volume 7: 4 Issues (2017)
Volume 6: 4 Issues (2016)
Volume 5: 4 Issues (2015)
Volume 4: 4 Issues (2014)
Volume 3: 4 Issues (2013)
Volume 2: 4 Issues (2012)
Volume 1: 4 Issues (2011)
View Complete Journal Contents Listing