Abstract
The advances of Internet technology has resulted in the rapid and pervasive development of e-commerce, which has not only changed the production and operation mode of many enterprises, but also affected the economic development mode of the whole society. This trend has incurred a strong need to store and process large amounts of sensitive data. The traditional data storage and search solutions cannot meet such requirements. To tackle this problem, in this article, we proposed Consortium Blockchain-based Distributed Secure Search (CBDSS) Scheme over encrypted data in e-Commerce environment. By integrating the blockchain and searchable encryption model, sensitive data can be effectively protected. The consortium blockchain can ensure that only authorized nodes can join the system. To fairly assign nodes for the search tasks, we developed an endorsement strategy in which two agent roles are set up to divide and match the search tasks with the virtual resources according to the load capacity of each node. The security analysis and experiments are conducted to evaluate the performance of our proposed scheme. The evaluation results have proved the reliability and security of our scheme over existing methods.
- A. Chaudhary, K. Ahmad, and M. A. Rizvi. 2014. E-commerce security through asymmetric key algorithm. In 2014 4th International Conference on Communication Systems and Network Technologies. 776--781.Google Scholar
- Deependra Singh and Vinay Deolalikar. 2018. Automating relevance banding in e-commerce search using click model. In 2018 IEEE International Conference on Big Data (Big Data). 1--5.Google Scholar
Cross Ref
- S. Wan, Y. Zhao, T. Wang, Z. Gu, Q. H. Abbasi, and K. K. R. Choo. 2019. Multi-dimensional data indexing and range query processing via Voronoi diagram for Internet of Things. Future Generation Computer Systems 91 (2019), 382--391.Google Scholar
Digital Library
- F. Fouladfar. 2016. Proposing a distributed algorithm to finding malevolent entities and improving security in e-commerce environments. In 2016 10th International Conference on e-Commerce in Developing Countries: With Focus on e-Tourism (ECDC). 1--6.Google Scholar
Cross Ref
- Youke Wu, Haiyang Huang, Qun Wu, Anfeng Liu, and Tian Wang. 2019. A risk defense method based on microscopic state prediction with partial information observations in social networks. Journal of Parallel and Distributed Computing 131 (2019), 189--199.Google Scholar
Digital Library
- X. Du, M. Guizani, Y. Xiao, and H. H. Chen. 2008. Defending DoS attacks on broadcast authentication in wireless sensor networks. In IEEE International Conference on Communications (ICC’08). 1653--1657.Google Scholar
- S. Ding, S. Qu, Y. Xi, and S. Wan. 2019. A long video caption generation algorithm for big video data retrieval. Future Generation Computer Systems 93 (2019), 583--595.Google Scholar
Digital Library
- Honghao Gao, Li Kuang, Yuyu Yin, Bin Guo, and Kai Dou. 2020. Mining consuming behaviors with temporal evolution for personalized recommendation in mobile marketing apps. Mobile Networks and Applications PP, 99 (2020), 1--1.Google Scholar
- Jun Yu, Zhenzhong Kuang, Baopeng Zhang, Wei Zhang, Dan Lin, and Jianping Fan. 2018. Leveraging content sensitiveness and user trustworthiness to recommend fine-grained privacy settings for social image sharing. IEEE Transactions on Information Forensics and Security 13, 5 (2018), 1317--1332.Google Scholar
Digital Library
- X. Liu, Z. Guan, X. Du, L. Wu, Z. Ul Abedin, and M. Guizani. 2019. Achieving secure and efficient cloud search services: Cross-lingual multi-keyword rank search over encrypted cloud data. In IEEE International Conference on Communications (ICC’19). 1--6.Google Scholar
- Wai Kit Wong, David W. Cheung, Ben Kao, and Nikos Mamoulis. 2009. Secure kNN computation on encrypted databases. In International Conference on Management of Data (2009). 139--152.Google Scholar
Digital Library
- Yang Yang, Ximeng Liu, and Robert H. Deng. 2020. Multi-user multi-keyword rank search over encrypted data in arbitrary language. IEEE Transactions on Dependable and Secure Computing 17, 2 (2020), 1--1.Google Scholar
Digital Library
- Y. Xi, Y. Zhang, S. Ding, and S. Wan. 2020. Visual question answering model based on visual relationship detection. Signal Processing: Image Communication 801 (2020), 115648.Google Scholar
Digital Library
- Ning Cao, Cong Wang, Ming Li, Kui Ren, and Wenjing Lou. 2014. Privacy-preserving multi-keyword ranked search over encrypted cloud data. IEEE Transactions on Parallel and Distributed Systems 25, 1 (2014), 222--233.Google Scholar
Digital Library
- S. Jiang, J. Cao, J. A. McCann, Y. Yang, Y. Liu, X. Wang, and Y. Deng. 2019. Privacy-preserving and efficient multi-keyword search over encrypted data on blockchain. In 2019 IEEE International Conference on Blockchain (Blockchain). 405--410.Google Scholar
- Shahzaib Tahir and Muttukrishnan Rajarajan. 2018. Privacy-preserving searchable encryption framework for permissioned blockchain networks. In IEEE Green Computing and Communications (2018). 1628--1633.Google Scholar
Cross Ref
- Jun Yu, Chaoqun Hong, Yong Rui, and Dacheng Tao. 2018. Multitask autoencoder model for recovering human poses. IEEE Transactions on Industrial Electronics 65, 6 (2018), 5060--5068.Google Scholar
Cross Ref
- Honghao Gao, Yueshen Xu, Yuyu Yin, Weipeng Zhang, Rui Li, and Xinheng Wang. 2019. Context-aware QoS prediction with neural collaborative filtering for Internet-of-Things services. IEEE Internet of Things Journal PP, 99 (2019), 1--1.Google Scholar
- Zhangjie Fu, Kui Ren, Jiangang Shu, Xingming Sun, and Fengxiao Huang. 2016. Enabling personalized search over encrypted outsourced data with efficiency improvement. IEEE Transactions on Parallel and Distributed Systems 27, 9 (2016), 2546--2559.Google Scholar
Digital Library
- Zhangjie Fu, Xinle Wu, Chaowen Guan, Xingming Sun, and Kui Ren. 2016. Toward efficient multi-keyword fuzzy search over encrypted outsourced data with accuracy improvement. IEEE Transactions on Information Forensics and Security 11, 12 (2016), 2706--2716.Google Scholar
Cross Ref
- Hongwei Li, Yi Yang, Tom H. Luan, Xiaohui Liang, Liang Zhou, and Xuemin Sherman Shen. 2016. Enabling fine-grained multi-keyword search supporting classified sub-dictionaries over encrypted cloud data. IEEE Transactions on Dependable and Secure Computing 13, 3 (2016), 312--325.Google Scholar
Digital Library
- Hongwei Li, Dongxiao Liu, Kun Jia, and Xiaodong Lin. 2015. Achieving authorized and ranked multi-keyword search over encrypted cloud data. In International Conference on Communications (2015). 7450--7455.Google Scholar
Cross Ref
- Chi Chen, Xiaojie Zhu, Peisong Shen, Jiankun Hu, Song Guo, Zahir Tari, and Albert Y. Zomaya. 2016. An efficient privacy-preserving ranked keyword search method. IEEE Transactions on Parallel and Distributed Systems 27, 4 (2016), 951--963.Google Scholar
Digital Library
- Zhihua Xia, Xinhui Wang, Xingming Sun, and Qian Wang. 2016. A secure and dynamic multi-keyword ranked search scheme over encrypted cloud data. IEEE Transactions on Parallel and Distributed Systems 27, 2 (2016), 340--352.Google Scholar
Digital Library
- Zhiguo Wan and Robert H. Deng. 2016. VPSearch: Achieving verifiability for privacy-preserving multi-keyword search over encrypted cloud data. IEEE Transactions on Dependable and Secure Computing 15, 6 (2016), 1083--1095.Google Scholar
Cross Ref
- J. Fu, Y. Liu, H. Chao, B. K. Bhargava, and Z. Zhang. 2018. Secure data storage and searching for industrial IoT by integrating fog computing and cloud computing. IEEE Transactions on Industrial Informatics 14, 10 (2018), 4519--4528.Google Scholar
Cross Ref
- Chengjun Cai, Xingliang Yuan, and Cong Wang. 2017. Towards trustworthy and private keyword search in encrypted decentralized storage. In International Conference on Communications (2017). 1--7.Google Scholar
Cross Ref
- Shengshan Hu, Chengjun Cai, Qian Wang, Cong Wang, Xiangyang Luo, and Kui Ren. 2018. Searching an encrypted cloud meets blockchain: A decentralized, reliable and fair realization. In International Conference on Computer Communications (2018). 792--800.Google Scholar
Digital Library
- Peng Jiang, Fuchun Guo, Kaitai Liang, Jianchang Lai, and Qiaoyan Wen. 2017. Searchain: Blockchain-based private keyword search in decentralized storage. Future Generation Computer Systems (2017), 1.Google Scholar
- Shufen Niu, Lixia Chen, Jinfeng Wang, and Fei Yu. 2020. Electronic health record sharing scheme with searchable attribute-based encryption on blockchain. IEEE Access 8 (2020), 7195--7204.Google Scholar
Cross Ref
- B. Chen, L. Wu, H. Wang, L. Zhou, and D. He. 2019. A blockchain-based searchable public-key encryption with forward and backward privacy for cloud-assisted vehicular social networks. IEEE Transactions on Vehicular Technology (2019), 1--1.Google Scholar
- Yang Yang, Hongrui Lin, Ximeng Liu, Wenzhong Guo, Xianghan Zheng, and Zhiquan Liu. 2019. Blockchain-based verifiable multi-keyword ranked search on encrypted cloud with fair payment. IEEE Access 7 (2019), 140818--140832.Google Scholar
Cross Ref
- Zhitao Guan, Xueyan Liu, Longfei Wu, Jun Wu, Ruzhi Xu, Jinhu Zhang, and Yuanzhang Li. 2020. Cross-lingual multi-keyword rank search with semantic extension over encrypted data. Information Sciences 514 (2020), 523--540.Google Scholar
Digital Library
Index Terms
Achieving Secure Search over Encrypted Data for e-Commerce: A Blockchain Approach
Recommendations
Dynamic Verifiable Encrypted Keyword Search
Outsourcing data storage to the cloud securely and retrieving the remote data in an efficient way is a very significant research topic, with high relevance to secure cloud deployment. With the ever growing security and privacy concerns, encrypting the ...
Secure Approximate Nearest Neighbor Search over Encrypted Data
BWCCA '14: Proceedings of the 2014 Ninth International Conference on Broadband and Wireless Computing, Communication and ApplicationsFor the past decade, approximate nearest neighbor (ANN) search in high dimensional space has been studied extensively. However, it supports only ANN search over palintext in traditional locality sensitive hashing (LSH). How to perform ANN search over ...
Enabling verifiable multiple keywords search over encrypted cloud data
AbstractSearchable Encryption (SE) enables a user to search over encrypted data, such as data stored in a remote cloud server. Existing certificate-, identity-, and attribute-based SE schemes suffer from certificate management or key escrow ...






Comments