A privacy protection approach for XML-based archives management in a cloud environment
DOI | https://doi.org/10.1108/EL-05-2019-0127 |
Published date | 09 December 2019 |
Date | 09 December 2019 |
Pages | 970-983 |
Author | Zongda Wu,Jian Xie,Xinze Lian,Jun Pan |
Subject Matter | Information & knowledge management,Information & communications technology,Internet |
A privacy protection approach for
XML-based archives management
in a cloud environment
Zongda Wu
Department of Computer Science and Engineering, Shaoxing University,
Shaoxing, China and School of Information Management, Nanjing University,
Nanjing, China
Jian Xie
Shaoxing University, Shaoxing, China
Xinze Lian
Oujiang College, Wenzhou University, Wenzhou, China, and
Jun Pan
Zhejiang University of Science and Technology, Hangzhou, China
Abstract
Purpose –The security of archival privacy data in the cloud has become the main obstacle to the
application of cloud computing in archives management. To this end, aiming at XML archives, this paper
aims to present a privacy protection approachthat can ensure the security of privacy data in the untrusted
cloud, withoutcompromising the system availability.
Design/methodology/approach –The basic idea of the approach is as follows. First,the privacy data
before being submitted to the cloud should be strictly encrypted on a trusted client to ensure the security.
Then, to querythe encrypted data efficiently, the approach constructssome key feature data for the encrypted
data, so that each XML querydefined on the privacy data can be executed correctlyin the cloud.
Findings –Finally, both theoretical analysis and experimental evaluation demonstrate the overall
performanceof the approach in terms of security, efficiency and accuracy.
Originality/value –This paper presents a valuable study attempting to protect privacy for the
management of XML archives in a cloud environment, so it has a positive significance to promote the
applicationof cloud computing in a digital archivesystem.
Keywords Archives management, Digital archives, Privacy protection, Cloud computing
Paper type Research paper
1. Introduction
Cloud computing enables people to obtain their required resources –such as network, server,
storage, application and service –from a shared pool of configurable computing resources
anytime, anywhere, and on demand (Peng et al., 2016). It can minimize the overhead of resource
management, and thus reduce the institutional investment in business operation and document
management (Yoo and Kim, 2018). In recent years, government sectors in developed countries,
such as the USA, the UK, and Australia, have launched the Cloud First strategy (Chen, 2017),
This study is supported by the National Social Science Foundation of China (No. 19BTQ056).
EL
37,6
970
Received26 May 2019
Revised22 July 2019
Accepted30 August 2019
TheElectronic Library
Vol.37 No. 6, 2019
pp. 970-983
© Emerald Publishing Limited
0264-0473
DOI 10.1108/EL-05-2019-0127
The current issue and full text archive of this journal is available on Emerald Insight at:
www.emeraldinsight.com/0264-0473.htm
To continue reading
Request your trial