Access the full text.
Sign up today, get DeepDyve free for 14 days.
Santosh Chandrasekhar, Ahmed Ibrahim, M. Singhal (2017)
A novel access control protocol using proxy signatures for cloud-based health information exchangeComput. Secur., 67
Zhou Bo (2008)
Protection of Users' Privacy in Personalized Information Services in Digital LibrariesLibrary Tribune
Qi Li, R. Sandhu, Xinwen Zhang, Mingwei Xu
Ieee Transactions on Dependable and Secure Computing Mandatory Content Access Control for Privacy Protection in Information Centric Networks
(2017)
The problems of records and archives management in cloud environment
Gongzhuang Peng, Hongwei Wang, Jietao Dong, Heming Zhang (2018)
Knowledge-Based Resource Allocation for Collaborative Simulation Development in a Multi-Tenant Cloud Computing EnvironmentIEEE Transactions on Services Computing, 11
Jianghong Wei, Xuexian Hu, Wenfen Liu, Qihui Zhang (2019)
Forward and backward secure fuzzy encryption for data sharing in cloud computingSoft Computing, 23
Seok-Keun Yoo, Boyoung Kim (2018)
A Decision-Making Model for Adopting a Cloud Computing SystemSustainability
B. Ning, Chengfei Liu (2012)
XML filtering with XPath expressions containing parent and ancestor axesInf. Sci., 210
Hao Yuan, Yi-min Liu, Guo-zhu Pan, Gang Zhang, Jun Zhou, Zhan-jun Zhang (2014)
Quantum identity authentication based on ping-pong technique without entanglementsQuantum Information Processing, 13
Zongda Wu, Guandong Xu, Chenglang Lu, Enhong Chen, Fangjie Jiang, Guiling Li (2018)
An effective approach for the protection of privacy text data in the CloudDBWorld Wide Web, 21
Chenglang Lu, Zongda Wu, Mingyong Liu, Wei Chen, Junfang Guo (2013)
A Patient Privacy Protection Scheme for Medical Information SystemJournal of Medical Systems, 37
(2018)
Research on the security evaluation system of digital archives in the cloud computing environment
(2019)
Research on privacy protection of university library readers under intelligent service environment
Zongda Wu, Jie Shi, Chenglang Lu, Enhong Chen, Guandong Xu, Guiling Li, Sihong Xie, Philip Yu (2015)
Constructing plausible innocuous pseudo queries to protect user query intentionInf. Sci., 325
Diego Calvanese, Giuseppe Giacomo, M. Lenzerini (1999)
Representing and Reasoning on XML Documents: A Description Logic ApproachJ. Log. Comput., 9
Santosh Chandrasekhar, M. Singhal (2017)
Efficient and Scalable Query Authentication for Cloud-Based Storage Systems with Multiple Data SourcesIEEE Transactions on Services Computing, 10
(2018)
The evolving path of chinese and foreign information security systems
Chenyu Wang, Ding Wang, Guoai Xu, Yanhui Guo (2017)
A lightweight password‐based authentication protocol using smart cardInternational Journal of Communication Systems, 30
Philip Yu, Douglas Cornell (2005)
Buffer management based on return on consumption in a multi-query environmentThe VLDB Journal, 2
D. Power, M. Slaymaker, A. Simpson (2009)
On Formalizing and Normalizing Role-Based Access Control SystemsComput. J., 52
Junaid Shuja, A. Gani, Kashif Bilal, Atta Khan, S. Madani, S. Khan, Albert Zomaya (2016)
A Survey of Mobile Device VirtualizationACM Computing Surveys (CSUR), 49
Zongda Wu, Chengren Zheng, Jian Xiejian, Zhifeng Zhou, Guandong Xu, Enhong Chen (2018)
An approach for the protection of users' book browsing preference privacy in a digital libraryElectron. Libr., 36
IEEE Transactions on Dependable and Secure Computing, 14
Library Theory and Practice, 2
Varunya Attasena, J. Darmont, Nouria Harbi (2017)
Secret sharing for cloud data security: a surveyThe VLDB Journal, 26
G. Post, Jeffrey Kingston, S. Ahmadi, S. Daskalaki, Christos Gogos, J. Kyngäs, K. Nurmi, Nysret Musliu, N. Pillay, H. Santos, Andrea Schaerf (2014)
XHSTT: an XML archive for high school timetabling problems in different countriesAnnals of Operations Research, 218
Daniel Servos, Sylvia Osborn (2017)
Current Research and Open Problems in Attribute-Based Access ControlACM Computing Surveys (CSUR), 49
Zhuolin Mei, Hong Zhu, Zongmin Cui, Zongda Wu, Gang Peng, Bin Wu, Caicai Zhang (2018)
Executing multi-dimensional range query efficiently and flexibly over outsourced ciphertexts in the cloudInf. Sci., 432
Ashish Singh, Kakali Chatterjee (2017)
Cloud security issues and challenges: A surveyJ. Netw. Comput. Appl., 79
Wenxiu Ding, Zheng Yan, R. Deng (2017)
Encrypted data processing with Homomorphic Re-EncryptionInf. Sci., 409
The security of archival privacy data in the cloud has become the main obstacle to the application of cloud computing in archives management. To this end, aiming at XML archives, this paper aims to present a privacy protection approach that can ensure the security of privacy data in the untrusted cloud, without compromising the system availability.Design/methodology/approachThe basic idea of the approach is as follows. First, the privacy data before being submitted to the cloud should be strictly encrypted on a trusted client to ensure the security. Then, to query the encrypted data efficiently, the approach constructs some key feature data for the encrypted data, so that each XML query defined on the privacy data can be executed correctly in the cloud.FindingsFinally, both theoretical analysis and experimental evaluation demonstrate the overall performance of the approach in terms of security, efficiency and accuracy.Originality/valueThis paper presents a valuable study attempting to protect privacy for the management of XML archives in a cloud environment, so it has a positive significance to promote the application of cloud computing in a digital archive system.
The Electronic Library – Emerald Publishing
Published: Nov 22, 2019
Keywords: Archives management; Digital archives; Privacy protection; Cloud computing
Read and print from thousands of top scholarly journals.
Already have an account? Log in
Bookmark this article. You can see your Bookmarks on your DeepDyve Library.
To save an article, log in first, or sign up for a DeepDyve account if you don’t already have one.
Copy and paste the desired citation format or use the link below to download a file formatted for EndNote
Access the full text.
Sign up today, get DeepDyve free for 14 days.
All DeepDyve websites use cookies to improve your online experience. They were placed on your computer when you launched this website. You can change your cookie settings through your browser.