A Framework for Homomorphic, Private Information Retrieval Protocols in the Cloud

Full Text (PDF, 689KB), PP.16-23

Views: 0 Downloads: 0


Mahmoud Fahsi 1,* Sidi Mohamed Benslimane 1 Amine Rahmani 2

1. EEIDIS Laboratory, Djillali Liabes University, Sidi Bel Abbes, 22000, Algeria

2. GeCoDe Laboratory, Taher Moualy University, Saida, 20000, Algeria

* Corresponding author.

DOI: https://doi.org/10.5815/ijmecs.2015.05.03

Received: 2 Jan. 2015 / Revised: 12 Feb. 2015 / Accepted: 20 Mar. 2015 / Published: 8 May 2015

Index Terms

Cloud health Storage and Retrieval, Private Information Retrieval, Cloud User Privacy, access control


Professional use of cloud health storage around the world implies Information-Retrieval extensions. These developments should help users find what they need among thousands or billions of enterprise documents and reports. However, extensions must offer protection against existing threats, for instance, hackers, server administrators and service providers who use people’s personal data for their own purposes. Indeed, cloud servers maintain traces of user activities and queries, which compromise user security against network hackers. Even cloud servers can use those traces to adapt or personalize their platforms without users’ agreements. For this purpose, we suggest implementing Private Information Retrieval (PIR) protocols to ease the retrieval task and secure it from both servers and hackers. We study the effectiveness of this solution through an evaluation of information retrieval time, recall and precision. The experimental results show that our framework ensures a reasonable and acceptable level of confidentiality for retrieval of data through cloud services.

Cite This Paper

Mahmoud Fahsi, Sidi Mohamed Benslimane, Amine Rahmani, "A Framework for Homomorphic, Private Information Retrieval Protocols in the Cloud", International Journal of Modern Education and Computer Science (IJMECS), vol.7, no.5, pp.16-23, 2015. DOI:10.5815/ijmecs.2015.05.03


[1]Wittow, M. H., Buller, D. J., Cloud Computing: Emerging Legal Issues for Access to Data, Anywhere, Anytime. Journal of Internet Law, Jul, 14(1), 1-10. (2010).
[2]Harfoushi, O., Alfawwaz, B., Ghatasheh, N. A., Obiedat, R., Abu-Faraj, M. M., Faris, H., Data Security Issues and Challenges in Cloud Computing: A Conceptual Analysis and Review. Journal of Computer Science & Communications, PP. 15-21, (2014).
[3]Mark, P., Jason, B., Monya, K., White Paper: Cloud Storage: the Next Frontier for Tape. Enterprise Strategy Group, commissioned by Oracle and is distributed under license from ESG. (2013).
[4]Chor, B., Goldreich, O., Kushile, E., vitz, and Sudan, M., Private Information Retrieval, 36th IEEE Conference on the Foundations of Computer Science (FOCS), pp. 41-50. (1995).
[5]Carlos, A., M., Chiffrement Homomorphe et Execution d’Algorithmes sur des Données Chiffrées: Avancées Récentes, PICC, XLIM. (2011).
[6]Zeeshan, P., Ammar, A. A., Asad, M. K., Sangyoung, L., Privacy-Aware Searching with Oblivious Term Matching for Cloud Storage, Springer J Supercomput 63:538–560. (2012).
[7]PFPDT :Préposé fédéral à la protection des données et à la transparence, Feldeggweg 1300 Berne. (2011).
[8]Kevin, H., Murat, K., Latifur, K., Bhavani, T., Security Issues for Cloud Computing, International Journal of Information Security and Privacy, 4 (2), 39-51. (2010).
[9]Carlos, A. M., Les Protocoles de Retrait d’Information Privé (RIP), XLIM UMR CNRS 6172, (2008).
[10]Adi, S., Identity-Based Cryptosystems and Signature Schemes. Advances in Cryptology, pp. 47-53. (1985).
[11]Zielinski, D., Be Clear on Cloud Computing Contracts. HRMagazine, Nov, 54(11), 63-65. (2009).
[12]Nashaat el-Khameesy, Hossam Abdel Rahman Mohamed. A Proposed Model for Datacenter in Depth Defense to Enhance Continual Security. International Journal of Information Technology and Computer Science, Vol 05, No. 04, 55-67, (2013).
[13]Talbot, D., Security in the Ether. Technology Review, 113(1), 36-42. (2010).
[14]Greengard, S., Kshetri, N., Cloud Computing and Developing Nations. Communications of the ACM, 53(5), 18-20. (2010).
[15]Xuyun, Z., Chang, L., Surya, N., Jinjun, C., An Efficient Quasi-Identifier Index Based Approach for Privacy Preservation over Incremental Data Sets on Cloud, Journal of Computer and System Sciences 79 542–555. (2012).
[16]Melvin, G., John, W. N., 2014, Cloud Computing Method and System. United State Patent No US8762709 B2, (2014).
[17]Cong, W., Ning, C., Kui, R., Wenjing, L., Enabling Secure and Efficient Ranked Keyword Search over Outsourced Cloud Data, IEEE, ICDCS’10. (2010).
[18]Ming, L., Shucheng, Y., Wenjing L, Y., Thomas, H., Toward Privacy-Assured Cloud Data Services with Flexible Search Functionalities, SPCC-2012. (2012).
[19]Sion, R., Carbunar, B., On the computational practicality of private information retrieval. In NDSS 2007. (2007).
[20]Olumofin, F., Goldberg I., Revisiting the computational practicality of private information retrieval. In FC 2011. (2011).
[21]Dan, B., Matt, F., Identity-Based Encryption from the Weil Pairing. Advances in Cryptology | CRYPTOGRAPHIC 20012139/2001, pp. 213-229.doi: 10.1007/3-540-44647-8_13. (2001).
[22]Vipul, G., Amit, S., Attribute-Based Encryption for Fine-Grained Access Control of Encrypted Data. Conference on Computer and Communications Security: Proceedings of the 13th ACM conference on Computer and communications security. (2006).
[23]Bethencourt, J., Sahai, A., Waters, B., Ciphertext-Policy Attribute-Based Encryption. Proceedings of 2007 IEEE Symposium on Security and Privacy. (2007).
[24]Jonathan, K., Amit, S., Brent, W., Predicate Encryption Sup-porting Disjunctions, Polynomial Equations, and Inner Products'. Advances in Cryptology EUROCRYPT2008, pp. 146-162. (2008).
[25]Dan, B., Brent, W., Conjunctive, Subset, and Range Queries on Encrypted Data. Theory of Cryptography. Ed. by Salil Vadhan. Vol. 4392. Lecture Notes in Computer Science. Springer Berlin/Heidel-berg, pp.535-554. (2007).