{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,27]],"date-time":"2026-01-27T14:09:53Z","timestamp":1769522993580,"version":"3.49.0"},"reference-count":26,"publisher":"Emerald","issue":"6","license":[{"start":{"date-parts":[[2019,10,11]],"date-time":"2019-10-11T00:00:00Z","timestamp":1570752000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.emerald.com\/insight\/site-policies"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["EL"],"published-print":{"date-parts":[[2019,11,22]]},"abstract":"<jats:sec>\n<jats:title content-type=\"abstract-subheading\">Purpose<\/jats:title>\n<jats:p>The security of archival privacy data in the cloud has become the main obstacle to the application of cloud computing in archives management. To this end, aiming at XML archives, this paper aims to present a privacy protection approach that can ensure the security of privacy data in the untrusted cloud, without compromising the system availability.<\/jats:p>\n<\/jats:sec>\n<jats:sec>\n<jats:title content-type=\"abstract-subheading\">Design\/methodology\/approach<\/jats:title>\n<jats:p>The basic idea of the approach is as follows. First, the privacy data before being submitted to the cloud should be strictly encrypted on a trusted client to ensure the security. Then, to query the encrypted data efficiently, the approach constructs some key feature data for the encrypted data, so that each XML query defined on the privacy data can be executed correctly in the cloud.<\/jats:p>\n<\/jats:sec>\n<jats:sec>\n<jats:title content-type=\"abstract-subheading\">Findings<\/jats:title>\n<jats:p>Finally, both theoretical analysis and experimental evaluation demonstrate the overall performance of the approach in terms of security, efficiency and accuracy.<\/jats:p>\n<\/jats:sec>\n<jats:sec>\n<jats:title content-type=\"abstract-subheading\">Originality\/value<\/jats:title>\n<jats:p>This paper presents a valuable study attempting to protect privacy for the management of XML archives in a cloud environment, so it has a positive significance to promote the application of cloud computing in a digital archive system.<\/jats:p>\n<\/jats:sec>","DOI":"10.1108\/el-05-2019-0127","type":"journal-article","created":{"date-parts":[[2019,10,11]],"date-time":"2019-10-11T03:05:22Z","timestamp":1570763122000},"page":"970-983","source":"Crossref","is-referenced-by-count":13,"title":["A privacy protection approach for XML-based archives management in a cloud environment"],"prefix":"10.1108","volume":"37","author":[{"given":"Zongda","family":"Wu","sequence":"first","affiliation":[]},{"given":"Jian","family":"Xie","sequence":"additional","affiliation":[]},{"given":"Xinze","family":"Lian","sequence":"additional","affiliation":[]},{"given":"Jun","family":"Pan","sequence":"additional","affiliation":[]}],"member":"140","published-online":{"date-parts":[[2019,10,11]]},"reference":[{"key":"key2021102914414105000_ref001","first-page":"1","article-title":"Secret sharing for cloud data security: a survey","volume":"2","year":"2017","journal-title":"VLDB Journal"},{"key":"key2021102914414105000_ref002","doi-asserted-by":"crossref","first-page":"41","DOI":"10.1016\/j.ins.2012.04.035","article-title":"XML filtering with XPath expressions containing parent and ancestor axes","volume":"210","year":"2012","journal-title":"Information Sciences"},{"issue":"3","key":"key2021102914414105000_ref003","first-page":"295","article-title":"Representing and reasoning on XML documents: a description logic approach","volume":"9","year":"2018","journal-title":"Journal of Logic and Computation"},{"issue":"4","key":"key2021102914414105000_ref004","doi-asserted-by":"crossref","first-page":"520","DOI":"10.1109\/TSC.2015.2500568","article-title":"Efficient and scalable query authentication for cloud-based storage systems with multiple data sources","volume":"10","year":"2017","journal-title":"IEEE Transactions on Services Computing"},{"key":"key2021102914414105000_ref005","doi-asserted-by":"crossref","first-page":"73","DOI":"10.1016\/j.cose.2017.02.008","article-title":"A novel access control protocol using proxy signatures for cloud-based health information exchange","volume":"67","year":"2017","journal-title":"Computers and Security"},{"key":"key2021102914414105000_ref006","first-page":"35","article-title":"The problems of records and archives management in cloud environment","volume":"2","year":"2017","journal-title":"Archives Science Study"},{"key":"key2021102914414105000_ref007","first-page":"35","article-title":"Encrypted data processing with homomorphic re-encryption","volume":"409","year":"2017","journal-title":"Information Sciences"},{"key":"key2021102914414105000_ref008","first-page":"77","article-title":"Research on the security evaluation system of digital archives in the cloud computing environment","volume":"1","year":"2018","journal-title":"Archives Science Study"},{"issue":"6","key":"key2021102914414105000_ref010","doi-asserted-by":"crossref","first-page":"9982","DOI":"10.1007\/s10916-013-9982-z","article-title":"A patient privacy protection scheme for medical information system","volume":"37","year":"2013","journal-title":"Journal of Medical Systems"},{"key":"key2021102914414105000_ref009","first-page":"18","article-title":"Research on privacy protection of university library readers under intelligent service environment","volume":"3","year":"2019","journal-title":"Library Theory and Practice"},{"key":"key2021102914414105000_ref011","doi-asserted-by":"crossref","first-page":"79","DOI":"10.1016\/j.ins.2017.11.065","article-title":"Executing multi-dimensional range query efficiently and flexibly over outsourced ciphertexts in the cloud","volume":"432","year":"2018","journal-title":"Information Sciences"},{"issue":"2","key":"key2021102914414105000_ref012","first-page":"306","article-title":"Knowledge-based resource allocation for collaborative simulation development in a multi-tenant cloud computing environment","volume":"11","year":"2016","journal-title":"IEEE Transactions on Services Computing"},{"issue":"3","key":"key2021102914414105000_ref013","first-page":"305","article-title":"On formalizing and normalizing role-based access control systems","volume":"52","year":"2018","journal-title":"The Computer Journal"},{"issue":"1","key":"key2021102914414105000_ref014","doi-asserted-by":"crossref","first-page":"295","DOI":"10.1007\/s10479-011-1012-2","article-title":"XHSTT: an XML archive for high school timetabling problems in different countries","volume":"218","year":"2014","journal-title":"Annals of Operations Research"},{"issue":"5","key":"key2021102914414105000_ref015","doi-asserted-by":"crossref","first-page":"494","DOI":"10.1109\/TDSC.2015.2494049","article-title":"Mandatory content access control for privacy protection in information centric networks","volume":"14","year":"2017","journal-title":"IEEE Transactions on Dependable and Secure Computing"},{"issue":"4","key":"key2021102914414105000_ref016","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3007204","article-title":"Current research and open problems in attribute-based access control","volume":"49","year":"2017","journal-title":"ACM Computing Surveys"},{"key":"key2021102914414105000_ref017","doi-asserted-by":"crossref","first-page":"88","DOI":"10.1016\/j.jnca.2016.11.027","article-title":"Cloud security issues and challenges: a survey","volume":"79","year":"2017","journal-title":"Journal of Network and Computer Applications"},{"issue":"16","key":"key2021102914414105000_ref018","doi-asserted-by":"crossref","first-page":"e3336","DOI":"10.1002\/dac.3336","article-title":"A lightweight password\u2010based authentication protocol using smart card","volume":"30","year":"2017","journal-title":"International Journal of Communication Systems"},{"issue":"2","key":"key2021102914414105000_ref019","doi-asserted-by":"crossref","first-page":"497","DOI":"10.1007\/s00500-017-2834-x","article-title":"Forward and backward secure fuzzy encryption for data sharing in cloud computing","volume":"23","year":"2019","journal-title":"Soft Computing"},{"issue":"4","key":"key2021102914414105000_ref020","doi-asserted-by":"crossref","first-page":"915","DOI":"10.1007\/s11280-017-0491-8","article-title":"An effective approach for the protection of privacy text data in the CloudDB","volume":"21","year":"2018","journal-title":"World Wide Web"},{"issue":"6","key":"key2021102914414105000_ref021","doi-asserted-by":"crossref","first-page":"1154","DOI":"10.1108\/EL-07-2017-0162","article-title":"An approach for the protection of users\u2019 book browsing preference privacy in a digital library","volume":"36","year":"2018","journal-title":"The Electronic Library"},{"key":"key2021102914414105000_ref022","doi-asserted-by":"crossref","first-page":"215","DOI":"10.1016\/j.ins.2015.07.010","article-title":"Constructing plausible innocuous pseudo queries to protect user query intention","volume":"325","year":"2015","journal-title":"Information Sciences"},{"issue":"2","key":"key2021102914414105000_ref023","first-page":"113","article-title":"The evolving path of chinese and foreign information security systems","volume":"44","year":"2018","journal-title":"Journal of Library Science in China"},{"issue":"8","key":"key2021102914414105000_ref024","doi-asserted-by":"crossref","first-page":"2952","DOI":"10.3390\/su10082952","article-title":"A decision-making model for adopting a cloud computing system","volume":"10","year":"2018","journal-title":"Sustainability"},{"issue":"11","key":"key2021102914414105000_ref025","doi-asserted-by":"crossref","first-page":"2535","DOI":"10.1007\/s11128-014-0808-9","article-title":"Quantum identity authentication based on ping-pong technique without entanglements","volume":"13","year":"2014","journal-title":"Quantum Information Processing"},{"key":"key2021102914414105000_ref026","first-page":"101","article-title":"Protection of user\u2019s privacy in personalized information services of digital libraries","volume":"2","year":"2018","journal-title":"Library Theory and Practice"}],"container-title":["The Electronic Library"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/EL-05-2019-0127\/full\/xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/EL-05-2019-0127\/full\/html","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,25]],"date-time":"2025-07-25T01:07:18Z","timestamp":1753405638000},"score":1,"resource":{"primary":{"URL":"http:\/\/www.emerald.com\/el\/article\/37\/6\/970-983\/30291"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,10,11]]},"references-count":26,"journal-issue":{"issue":"6","published-online":{"date-parts":[[2019,10,11]]},"published-print":{"date-parts":[[2019,11,22]]}},"alternative-id":["10.1108\/EL-05-2019-0127"],"URL":"https:\/\/doi.org\/10.1108\/el-05-2019-0127","relation":{},"ISSN":["0264-0473","0264-0473"],"issn-type":[{"value":"0264-0473","type":"print"},{"value":"0264-0473","type":"print"}],"subject":[],"published":{"date-parts":[[2019,10,11]]}}}