skip to main content
research-article

Achieving Secure Search over Encrypted Data for e-Commerce: A Blockchain Approach

Authors Info & Claims
Published:08 December 2020Publication History
Skip Abstract Section

Abstract

The advances of Internet technology has resulted in the rapid and pervasive development of e-commerce, which has not only changed the production and operation mode of many enterprises, but also affected the economic development mode of the whole society. This trend has incurred a strong need to store and process large amounts of sensitive data. The traditional data storage and search solutions cannot meet such requirements. To tackle this problem, in this article, we proposed Consortium Blockchain-based Distributed Secure Search (CBDSS) Scheme over encrypted data in e-Commerce environment. By integrating the blockchain and searchable encryption model, sensitive data can be effectively protected. The consortium blockchain can ensure that only authorized nodes can join the system. To fairly assign nodes for the search tasks, we developed an endorsement strategy in which two agent roles are set up to divide and match the search tasks with the virtual resources according to the load capacity of each node. The security analysis and experiments are conducted to evaluate the performance of our proposed scheme. The evaluation results have proved the reliability and security of our scheme over existing methods.

References

  1. A. Chaudhary, K. Ahmad, and M. A. Rizvi. 2014. E-commerce security through asymmetric key algorithm. In 2014 4th International Conference on Communication Systems and Network Technologies. 776--781.Google ScholarGoogle Scholar
  2. Deependra Singh and Vinay Deolalikar. 2018. Automating relevance banding in e-commerce search using click model. In 2018 IEEE International Conference on Big Data (Big Data). 1--5.Google ScholarGoogle ScholarCross RefCross Ref
  3. S. Wan, Y. Zhao, T. Wang, Z. Gu, Q. H. Abbasi, and K. K. R. Choo. 2019. Multi-dimensional data indexing and range query processing via Voronoi diagram for Internet of Things. Future Generation Computer Systems 91 (2019), 382--391.Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. F. Fouladfar. 2016. Proposing a distributed algorithm to finding malevolent entities and improving security in e-commerce environments. In 2016 10th International Conference on e-Commerce in Developing Countries: With Focus on e-Tourism (ECDC). 1--6.Google ScholarGoogle ScholarCross RefCross Ref
  5. Youke Wu, Haiyang Huang, Qun Wu, Anfeng Liu, and Tian Wang. 2019. A risk defense method based on microscopic state prediction with partial information observations in social networks. Journal of Parallel and Distributed Computing 131 (2019), 189--199.Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. X. Du, M. Guizani, Y. Xiao, and H. H. Chen. 2008. Defending DoS attacks on broadcast authentication in wireless sensor networks. In IEEE International Conference on Communications (ICC’08). 1653--1657.Google ScholarGoogle Scholar
  7. S. Ding, S. Qu, Y. Xi, and S. Wan. 2019. A long video caption generation algorithm for big video data retrieval. Future Generation Computer Systems 93 (2019), 583--595.Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. Honghao Gao, Li Kuang, Yuyu Yin, Bin Guo, and Kai Dou. 2020. Mining consuming behaviors with temporal evolution for personalized recommendation in mobile marketing apps. Mobile Networks and Applications PP, 99 (2020), 1--1.Google ScholarGoogle Scholar
  9. Jun Yu, Zhenzhong Kuang, Baopeng Zhang, Wei Zhang, Dan Lin, and Jianping Fan. 2018. Leveraging content sensitiveness and user trustworthiness to recommend fine-grained privacy settings for social image sharing. IEEE Transactions on Information Forensics and Security 13, 5 (2018), 1317--1332.Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. X. Liu, Z. Guan, X. Du, L. Wu, Z. Ul Abedin, and M. Guizani. 2019. Achieving secure and efficient cloud search services: Cross-lingual multi-keyword rank search over encrypted cloud data. In IEEE International Conference on Communications (ICC’19). 1--6.Google ScholarGoogle Scholar
  11. Wai Kit Wong, David W. Cheung, Ben Kao, and Nikos Mamoulis. 2009. Secure kNN computation on encrypted databases. In International Conference on Management of Data (2009). 139--152.Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. Yang Yang, Ximeng Liu, and Robert H. Deng. 2020. Multi-user multi-keyword rank search over encrypted data in arbitrary language. IEEE Transactions on Dependable and Secure Computing 17, 2 (2020), 1--1.Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. Y. Xi, Y. Zhang, S. Ding, and S. Wan. 2020. Visual question answering model based on visual relationship detection. Signal Processing: Image Communication 801 (2020), 115648.Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. Ning Cao, Cong Wang, Ming Li, Kui Ren, and Wenjing Lou. 2014. Privacy-preserving multi-keyword ranked search over encrypted cloud data. IEEE Transactions on Parallel and Distributed Systems 25, 1 (2014), 222--233.Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. S. Jiang, J. Cao, J. A. McCann, Y. Yang, Y. Liu, X. Wang, and Y. Deng. 2019. Privacy-preserving and efficient multi-keyword search over encrypted data on blockchain. In 2019 IEEE International Conference on Blockchain (Blockchain). 405--410.Google ScholarGoogle Scholar
  16. Shahzaib Tahir and Muttukrishnan Rajarajan. 2018. Privacy-preserving searchable encryption framework for permissioned blockchain networks. In IEEE Green Computing and Communications (2018). 1628--1633.Google ScholarGoogle ScholarCross RefCross Ref
  17. Jun Yu, Chaoqun Hong, Yong Rui, and Dacheng Tao. 2018. Multitask autoencoder model for recovering human poses. IEEE Transactions on Industrial Electronics 65, 6 (2018), 5060--5068.Google ScholarGoogle ScholarCross RefCross Ref
  18. Honghao Gao, Yueshen Xu, Yuyu Yin, Weipeng Zhang, Rui Li, and Xinheng Wang. 2019. Context-aware QoS prediction with neural collaborative filtering for Internet-of-Things services. IEEE Internet of Things Journal PP, 99 (2019), 1--1.Google ScholarGoogle Scholar
  19. Zhangjie Fu, Kui Ren, Jiangang Shu, Xingming Sun, and Fengxiao Huang. 2016. Enabling personalized search over encrypted outsourced data with efficiency improvement. IEEE Transactions on Parallel and Distributed Systems 27, 9 (2016), 2546--2559.Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. Zhangjie Fu, Xinle Wu, Chaowen Guan, Xingming Sun, and Kui Ren. 2016. Toward efficient multi-keyword fuzzy search over encrypted outsourced data with accuracy improvement. IEEE Transactions on Information Forensics and Security 11, 12 (2016), 2706--2716.Google ScholarGoogle ScholarCross RefCross Ref
  21. Hongwei Li, Yi Yang, Tom H. Luan, Xiaohui Liang, Liang Zhou, and Xuemin Sherman Shen. 2016. Enabling fine-grained multi-keyword search supporting classified sub-dictionaries over encrypted cloud data. IEEE Transactions on Dependable and Secure Computing 13, 3 (2016), 312--325.Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. Hongwei Li, Dongxiao Liu, Kun Jia, and Xiaodong Lin. 2015. Achieving authorized and ranked multi-keyword search over encrypted cloud data. In International Conference on Communications (2015). 7450--7455.Google ScholarGoogle ScholarCross RefCross Ref
  23. Chi Chen, Xiaojie Zhu, Peisong Shen, Jiankun Hu, Song Guo, Zahir Tari, and Albert Y. Zomaya. 2016. An efficient privacy-preserving ranked keyword search method. IEEE Transactions on Parallel and Distributed Systems 27, 4 (2016), 951--963.Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. Zhihua Xia, Xinhui Wang, Xingming Sun, and Qian Wang. 2016. A secure and dynamic multi-keyword ranked search scheme over encrypted cloud data. IEEE Transactions on Parallel and Distributed Systems 27, 2 (2016), 340--352.Google ScholarGoogle ScholarDigital LibraryDigital Library
  25. Zhiguo Wan and Robert H. Deng. 2016. VPSearch: Achieving verifiability for privacy-preserving multi-keyword search over encrypted cloud data. IEEE Transactions on Dependable and Secure Computing 15, 6 (2016), 1083--1095.Google ScholarGoogle ScholarCross RefCross Ref
  26. J. Fu, Y. Liu, H. Chao, B. K. Bhargava, and Z. Zhang. 2018. Secure data storage and searching for industrial IoT by integrating fog computing and cloud computing. IEEE Transactions on Industrial Informatics 14, 10 (2018), 4519--4528.Google ScholarGoogle ScholarCross RefCross Ref
  27. Chengjun Cai, Xingliang Yuan, and Cong Wang. 2017. Towards trustworthy and private keyword search in encrypted decentralized storage. In International Conference on Communications (2017). 1--7.Google ScholarGoogle ScholarCross RefCross Ref
  28. Shengshan Hu, Chengjun Cai, Qian Wang, Cong Wang, Xiangyang Luo, and Kui Ren. 2018. Searching an encrypted cloud meets blockchain: A decentralized, reliable and fair realization. In International Conference on Computer Communications (2018). 792--800.Google ScholarGoogle ScholarDigital LibraryDigital Library
  29. Peng Jiang, Fuchun Guo, Kaitai Liang, Jianchang Lai, and Qiaoyan Wen. 2017. Searchain: Blockchain-based private keyword search in decentralized storage. Future Generation Computer Systems (2017), 1.Google ScholarGoogle Scholar
  30. Shufen Niu, Lixia Chen, Jinfeng Wang, and Fei Yu. 2020. Electronic health record sharing scheme with searchable attribute-based encryption on blockchain. IEEE Access 8 (2020), 7195--7204.Google ScholarGoogle ScholarCross RefCross Ref
  31. B. Chen, L. Wu, H. Wang, L. Zhou, and D. He. 2019. A blockchain-based searchable public-key encryption with forward and backward privacy for cloud-assisted vehicular social networks. IEEE Transactions on Vehicular Technology (2019), 1--1.Google ScholarGoogle Scholar
  32. Yang Yang, Hongrui Lin, Ximeng Liu, Wenzhong Guo, Xianghan Zheng, and Zhiquan Liu. 2019. Blockchain-based verifiable multi-keyword ranked search on encrypted cloud with fair payment. IEEE Access 7 (2019), 140818--140832.Google ScholarGoogle ScholarCross RefCross Ref
  33. Zhitao Guan, Xueyan Liu, Longfei Wu, Jun Wu, Ruzhi Xu, Jinhu Zhang, and Yuanzhang Li. 2020. Cross-lingual multi-keyword rank search with semantic extension over encrypted data. Information Sciences 514 (2020), 523--540.Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Achieving Secure Search over Encrypted Data for e-Commerce: A Blockchain Approach

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in

    Full Access

    • Published in

      cover image ACM Transactions on Internet Technology
      ACM Transactions on Internet Technology  Volume 21, Issue 1
      Visions Paper, Regular Papers, SI: Blockchain in E-Commerce, and SI: Human-Centered Security, Privacy, and Trust in the Internet of Things
      February 2021
      534 pages
      ISSN:1533-5399
      EISSN:1557-6051
      DOI:10.1145/3441681
      • Editor:
      • Ling Liu
      Issue’s Table of Contents

      Copyright © 2020 ACM

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 8 December 2020
      • Revised: 1 June 2020
      • Accepted: 1 June 2020
      • Received: 1 February 2020
      Published in toit Volume 21, Issue 1

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • research-article
      • Research
      • Refereed

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    HTML Format

    View this article in HTML Format .

    View HTML Format
    About Cookies On This Site

    We use cookies to ensure that we give you the best experience on our website.

    Learn more

    Got it!