Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
research-article

Achieving Secure Search over Encrypted Data for e-Commerce: A Blockchain Approach

Published: 08 December 2020 Publication History

Abstract

The advances of Internet technology has resulted in the rapid and pervasive development of e-commerce, which has not only changed the production and operation mode of many enterprises, but also affected the economic development mode of the whole society. This trend has incurred a strong need to store and process large amounts of sensitive data. The traditional data storage and search solutions cannot meet such requirements. To tackle this problem, in this article, we proposed Consortium Blockchain-based Distributed Secure Search (CBDSS) Scheme over encrypted data in e-Commerce environment. By integrating the blockchain and searchable encryption model, sensitive data can be effectively protected. The consortium blockchain can ensure that only authorized nodes can join the system. To fairly assign nodes for the search tasks, we developed an endorsement strategy in which two agent roles are set up to divide and match the search tasks with the virtual resources according to the load capacity of each node. The security analysis and experiments are conducted to evaluate the performance of our proposed scheme. The evaluation results have proved the reliability and security of our scheme over existing methods.

References

[1]
A. Chaudhary, K. Ahmad, and M. A. Rizvi. 2014. E-commerce security through asymmetric key algorithm. In 2014 4th International Conference on Communication Systems and Network Technologies. 776--781.
[2]
Deependra Singh and Vinay Deolalikar. 2018. Automating relevance banding in e-commerce search using click model. In 2018 IEEE International Conference on Big Data (Big Data). 1--5.
[3]
S. Wan, Y. Zhao, T. Wang, Z. Gu, Q. H. Abbasi, and K. K. R. Choo. 2019. Multi-dimensional data indexing and range query processing via Voronoi diagram for Internet of Things. Future Generation Computer Systems 91 (2019), 382--391.
[4]
F. Fouladfar. 2016. Proposing a distributed algorithm to finding malevolent entities and improving security in e-commerce environments. In 2016 10th International Conference on e-Commerce in Developing Countries: With Focus on e-Tourism (ECDC). 1--6.
[5]
Youke Wu, Haiyang Huang, Qun Wu, Anfeng Liu, and Tian Wang. 2019. A risk defense method based on microscopic state prediction with partial information observations in social networks. Journal of Parallel and Distributed Computing 131 (2019), 189--199.
[6]
X. Du, M. Guizani, Y. Xiao, and H. H. Chen. 2008. Defending DoS attacks on broadcast authentication in wireless sensor networks. In IEEE International Conference on Communications (ICC’08). 1653--1657.
[7]
S. Ding, S. Qu, Y. Xi, and S. Wan. 2019. A long video caption generation algorithm for big video data retrieval. Future Generation Computer Systems 93 (2019), 583--595.
[8]
Honghao Gao, Li Kuang, Yuyu Yin, Bin Guo, and Kai Dou. 2020. Mining consuming behaviors with temporal evolution for personalized recommendation in mobile marketing apps. Mobile Networks and Applications PP, 99 (2020), 1--1.
[9]
Jun Yu, Zhenzhong Kuang, Baopeng Zhang, Wei Zhang, Dan Lin, and Jianping Fan. 2018. Leveraging content sensitiveness and user trustworthiness to recommend fine-grained privacy settings for social image sharing. IEEE Transactions on Information Forensics and Security 13, 5 (2018), 1317--1332.
[10]
X. Liu, Z. Guan, X. Du, L. Wu, Z. Ul Abedin, and M. Guizani. 2019. Achieving secure and efficient cloud search services: Cross-lingual multi-keyword rank search over encrypted cloud data. In IEEE International Conference on Communications (ICC’19). 1--6.
[11]
Wai Kit Wong, David W. Cheung, Ben Kao, and Nikos Mamoulis. 2009. Secure kNN computation on encrypted databases. In International Conference on Management of Data (2009). 139--152.
[12]
Yang Yang, Ximeng Liu, and Robert H. Deng. 2020. Multi-user multi-keyword rank search over encrypted data in arbitrary language. IEEE Transactions on Dependable and Secure Computing 17, 2 (2020), 1--1.
[13]
Y. Xi, Y. Zhang, S. Ding, and S. Wan. 2020. Visual question answering model based on visual relationship detection. Signal Processing: Image Communication 801 (2020), 115648.
[14]
Ning Cao, Cong Wang, Ming Li, Kui Ren, and Wenjing Lou. 2014. Privacy-preserving multi-keyword ranked search over encrypted cloud data. IEEE Transactions on Parallel and Distributed Systems 25, 1 (2014), 222--233.
[15]
S. Jiang, J. Cao, J. A. McCann, Y. Yang, Y. Liu, X. Wang, and Y. Deng. 2019. Privacy-preserving and efficient multi-keyword search over encrypted data on blockchain. In 2019 IEEE International Conference on Blockchain (Blockchain). 405--410.
[16]
Shahzaib Tahir and Muttukrishnan Rajarajan. 2018. Privacy-preserving searchable encryption framework for permissioned blockchain networks. In IEEE Green Computing and Communications (2018). 1628--1633.
[17]
Jun Yu, Chaoqun Hong, Yong Rui, and Dacheng Tao. 2018. Multitask autoencoder model for recovering human poses. IEEE Transactions on Industrial Electronics 65, 6 (2018), 5060--5068.
[18]
Honghao Gao, Yueshen Xu, Yuyu Yin, Weipeng Zhang, Rui Li, and Xinheng Wang. 2019. Context-aware QoS prediction with neural collaborative filtering for Internet-of-Things services. IEEE Internet of Things Journal PP, 99 (2019), 1--1.
[19]
Zhangjie Fu, Kui Ren, Jiangang Shu, Xingming Sun, and Fengxiao Huang. 2016. Enabling personalized search over encrypted outsourced data with efficiency improvement. IEEE Transactions on Parallel and Distributed Systems 27, 9 (2016), 2546--2559.
[20]
Zhangjie Fu, Xinle Wu, Chaowen Guan, Xingming Sun, and Kui Ren. 2016. Toward efficient multi-keyword fuzzy search over encrypted outsourced data with accuracy improvement. IEEE Transactions on Information Forensics and Security 11, 12 (2016), 2706--2716.
[21]
Hongwei Li, Yi Yang, Tom H. Luan, Xiaohui Liang, Liang Zhou, and Xuemin Sherman Shen. 2016. Enabling fine-grained multi-keyword search supporting classified sub-dictionaries over encrypted cloud data. IEEE Transactions on Dependable and Secure Computing 13, 3 (2016), 312--325.
[22]
Hongwei Li, Dongxiao Liu, Kun Jia, and Xiaodong Lin. 2015. Achieving authorized and ranked multi-keyword search over encrypted cloud data. In International Conference on Communications (2015). 7450--7455.
[23]
Chi Chen, Xiaojie Zhu, Peisong Shen, Jiankun Hu, Song Guo, Zahir Tari, and Albert Y. Zomaya. 2016. An efficient privacy-preserving ranked keyword search method. IEEE Transactions on Parallel and Distributed Systems 27, 4 (2016), 951--963.
[24]
Zhihua Xia, Xinhui Wang, Xingming Sun, and Qian Wang. 2016. A secure and dynamic multi-keyword ranked search scheme over encrypted cloud data. IEEE Transactions on Parallel and Distributed Systems 27, 2 (2016), 340--352.
[25]
Zhiguo Wan and Robert H. Deng. 2016. VPSearch: Achieving verifiability for privacy-preserving multi-keyword search over encrypted cloud data. IEEE Transactions on Dependable and Secure Computing 15, 6 (2016), 1083--1095.
[26]
J. Fu, Y. Liu, H. Chao, B. K. Bhargava, and Z. Zhang. 2018. Secure data storage and searching for industrial IoT by integrating fog computing and cloud computing. IEEE Transactions on Industrial Informatics 14, 10 (2018), 4519--4528.
[27]
Chengjun Cai, Xingliang Yuan, and Cong Wang. 2017. Towards trustworthy and private keyword search in encrypted decentralized storage. In International Conference on Communications (2017). 1--7.
[28]
Shengshan Hu, Chengjun Cai, Qian Wang, Cong Wang, Xiangyang Luo, and Kui Ren. 2018. Searching an encrypted cloud meets blockchain: A decentralized, reliable and fair realization. In International Conference on Computer Communications (2018). 792--800.
[29]
Peng Jiang, Fuchun Guo, Kaitai Liang, Jianchang Lai, and Qiaoyan Wen. 2017. Searchain: Blockchain-based private keyword search in decentralized storage. Future Generation Computer Systems (2017), 1.
[30]
Shufen Niu, Lixia Chen, Jinfeng Wang, and Fei Yu. 2020. Electronic health record sharing scheme with searchable attribute-based encryption on blockchain. IEEE Access 8 (2020), 7195--7204.
[31]
B. Chen, L. Wu, H. Wang, L. Zhou, and D. He. 2019. A blockchain-based searchable public-key encryption with forward and backward privacy for cloud-assisted vehicular social networks. IEEE Transactions on Vehicular Technology (2019), 1--1.
[32]
Yang Yang, Hongrui Lin, Ximeng Liu, Wenzhong Guo, Xianghan Zheng, and Zhiquan Liu. 2019. Blockchain-based verifiable multi-keyword ranked search on encrypted cloud with fair payment. IEEE Access 7 (2019), 140818--140832.
[33]
Zhitao Guan, Xueyan Liu, Longfei Wu, Jun Wu, Ruzhi Xu, Jinhu Zhang, and Yuanzhang Li. 2020. Cross-lingual multi-keyword rank search with semantic extension over encrypted data. Information Sciences 514 (2020), 523--540.

Cited By

View all
  • (2024)Blockchain-based E-commerce Transaction Verification Mechanism Design and Performance EvaluationApplied Mathematics and Nonlinear Sciences10.2478/amns-2024-17149:1Online publication date: 5-Jul-2024
  • (2024)The blockchain‐based privacy‐preserving searchable attribute‐based encryption scheme for federated learning model in IoMTConcurrency and Computation: Practice and Experience10.1002/cpe.825736:24Online publication date: 20-Aug-2024
  • (2023)Privacy-Preserving Searchable Encryption Scheme Based on Public and Private BlockchainsTsinghua Science and Technology10.26599/TST.2021.901007028:1(13-26)Online publication date: Feb-2023
  • Show More Cited By

Index Terms

  1. Achieving Secure Search over Encrypted Data for e-Commerce: A Blockchain Approach

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Transactions on Internet Technology
    ACM Transactions on Internet Technology  Volume 21, Issue 1
    Visions Paper, Regular Papers, SI: Blockchain in E-Commerce, and SI: Human-Centered Security, Privacy, and Trust in the Internet of Things
    February 2021
    534 pages
    ISSN:1533-5399
    EISSN:1557-6051
    DOI:10.1145/3441681
    • Editor:
    • Ling Liu
    Issue’s Table of Contents
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 08 December 2020
    Accepted: 01 June 2020
    Revised: 01 June 2020
    Received: 01 February 2020
    Published in TOIT Volume 21, Issue 1

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. Blockchain
    2. Top-k search
    3. searchable encryption
    4. smart contract

    Qualifiers

    • Research-article
    • Research
    • Refereed

    Funding Sources

    • National Natural Science Foundation of China

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)69
    • Downloads (Last 6 weeks)5
    Reflects downloads up to 11 Jan 2025

    Other Metrics

    Citations

    Cited By

    View all
    • (2024)Blockchain-based E-commerce Transaction Verification Mechanism Design and Performance EvaluationApplied Mathematics and Nonlinear Sciences10.2478/amns-2024-17149:1Online publication date: 5-Jul-2024
    • (2024)The blockchain‐based privacy‐preserving searchable attribute‐based encryption scheme for federated learning model in IoMTConcurrency and Computation: Practice and Experience10.1002/cpe.825736:24Online publication date: 20-Aug-2024
    • (2023)Privacy-Preserving Searchable Encryption Scheme Based on Public and Private BlockchainsTsinghua Science and Technology10.26599/TST.2021.901007028:1(13-26)Online publication date: Feb-2023
    • (2023)Survey on Secure Keyword Search over Outsourced Data: From Cloud to Blockchain-assisted ArchitectureACM Computing Surveys10.1145/361782456:3(1-40)Online publication date: 5-Oct-2023
    • (2023)Blockchain-Assisted Secure Data Sharing Protocol With a Dynamic Multiuser Keyword Search in IIoTIEEE Internet of Things Journal10.1109/JIOT.2023.326491210:17(15749-15760)Online publication date: 1-Sep-2023
    • (2023)An Efficient Revocable and Searchable MA-ABE Scheme With Blockchain Assistance for C-IoTIEEE Internet of Things Journal10.1109/JIOT.2022.321382910:3(2754-2766)Online publication date: 1-Feb-2023
    • (2023)Secure and Efficiently Searchable IoT Communication Data Management Model: Using Blockchain as a New ToolIEEE Internet of Things Journal10.1109/JIOT.2021.312148210:14(11985-11999)Online publication date: 15-Jul-2023
    • (2023)Privacy-preserving and efficient data sharing for blockchain-based intelligent transportation systemsInformation Sciences10.1016/j.ins.2023.03.121635(72-85)Online publication date: Jul-2023
    • (2022)Purchase Behavior of Generation Z for New-Brand Beauty ProductsJournal of Electronic Commerce in Organizations10.4018/JECO.30030420:2(1-21)Online publication date: 19-Aug-2022
    • (2022)Application Research in Computer Vision Signature Encryption System of Enterprise Contract Economic ManagementWireless Communications & Mobile Computing10.1155/2022/96779422022Online publication date: 1-Jan-2022
    • Show More Cited By

    View Options

    Login options

    Full Access

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    HTML Format

    View this article in HTML Format.

    HTML Format

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media