{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,30]],"date-time":"2025-10-30T01:53:13Z","timestamp":1761789193347,"version":"3.40.5"},"reference-count":20,"publisher":"IGI Global","issue":"3","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014,7,1]]},"abstract":"<p>The term of big, data is an important concept that represents the exponential growth of volume and variety of data collection, one of the advantages of this technology is the ability of treating heterogeneous data, such as textual documents, also as its name indicates \u2018big data' refers to the huge volume of data counted by petabytes which implies an information retrieval extension to help users to find their need this extension must incorporate other protection against existent threats. In fact, big data services such as cloud computing do keep traces about user activities and queries, which compromise the user privacy and can offer useful information to network hackers that attack users or even cloud server to adapt or personalize their platforms without the user's agreement, and maybe the most known attack can be man-in-the-middle during a storage or extracting data session between a user and a cloud server for this cause, the need to a secure protocol represent a high necessity which gives birth to the concept of Private Information Retrieval (PIR), as the authors mention before, one of the checks is the vast mass of data that hinders the correct handling of data and increases the error rate for retrieving a relevant information, for that the use of new techniques and approaches that allow the improvement of retrieval models over this kind of services is an important case to be processed. In this purpose, the authors introduce a new proposition called Meta-heuristic Privet Information Retrieval (M-PIR) in order to benefit from the success of meta-heuristics methods and improve the efficiency of PIR protocols in term of returned information; to better meet the needs of users, they use a bag of word for the text representation, TFIDF as weighting for the digitalization, the benchmarking MEDLINE corpus for the experimentation and panoply of validation tools (Recall, Precision, F-measure and Entropy) for the evaluation of our results. So that the paper is over the application of a meta-heuristics algorithms on a set of PIR protocols using a multitude of cryptographic schemes in order to study the influence of these schemes on quality of results.<\/p>","DOI":"10.4018\/ijcac.2014070101","type":"journal-article","created":{"date-parts":[[2014,12,9]],"date-time":"2014-12-09T14:02:23Z","timestamp":1418133743000},"page":"1-19","source":"Crossref","is-referenced-by-count":12,"title":["Application of Meta-Heuristics Methods on PIR Protocols Over Cloud Storage Services"],"prefix":"10.4018","volume":"4","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-4973-4385","authenticated-orcid":true,"given":"Hadj Ahmed","family":"Bouarara","sequence":"first","affiliation":[{"name":"GeCoDe Laboratory, Department of Computer Science, University of Saida, Sa\u00efda, Algeria"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Reda Mohamed","family":"Hamou","sequence":"additional","affiliation":[{"name":"GeCoDe Laboratory, Department of Computer Science, University of Saida, Sa\u00efda, Algeria"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Amine","family":"Rahmani","sequence":"additional","affiliation":[{"name":"GeCoDe Laboratory, Department of Computer Science, University of Saida, Sa\u00efda, Algeria"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Abdelmalek","family":"Amine","sequence":"additional","affiliation":[{"name":"GeCoDe Laboratory, Department of Computer Science, University of Saida, Sa\u00efda, Algeria"}],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"2432","reference":[{"key":"ijcac.2014070101-0","first-page":"1278","article-title":"Towards secure mobile cloud computing: A survey.","author":"N. K.Abdul","year":"2013","journal-title":"Future Generation Computer Systems"},{"key":"ijcac.2014070101-1","doi-asserted-by":"publisher","DOI":"10.4018\/ijcac.2011040105"},{"key":"ijcac.2014070101-2","unstructured":"Dan, B., & Brent, W. (2007). Conjunctive, Subset, and Range Queries on Encrypted Data. 4th Theory of Cryptography Conference (pp. 535-554). Amsterdam, The Netherlands: Springer."},{"key":"ijcac.2014070101-3","doi-asserted-by":"crossref","unstructured":"Fred, G., James, P. K., & Laguna, M. (1995). Genetic algorithms and taboo search-hybrids for optimization. Computers, 111-134.","DOI":"10.1016\/0305-0548(93)E0023-M"},{"key":"ijcac.2014070101-4","first-page":"173","article-title":"A novel genetic algorithm for automatic clustering.","author":"G.Gautam","year":"2004","journal-title":"Pattern Recognition Letters"},{"key":"ijcac.2014070101-5","doi-asserted-by":"publisher","DOI":"10.1109\/SCC.2012.106"},{"key":"ijcac.2014070101-6","unstructured":"HAMOU. R. M. (2009). Proposal of cellular automaton for solving text-mining problem: Unsupervised classification (clustering) based on wordnet. the second International Conference on web and Information Technology (ICWIT\u201909) (pp. 63-75). Kerkennah Island, Sfax, Tunisia IHE Edition: IEEE."},{"key":"ijcac.2014070101-7","doi-asserted-by":"crossref","unstructured":"Hamou, R. M., Amine, A., Lokbani, A. C., & Simonet, M. (2012). Visualization and clustering by 3D cellular automata: Application to unstructured data. International Journal Of Data Mining And Emerging Technologies, 15-25.","DOI":"10.5958\/j.2249-3212.2.1.003"},{"key":"ijcac.2014070101-8","doi-asserted-by":"publisher","DOI":"10.1109\/CDEE.2010.60"},{"key":"ijcac.2014070101-9","first-page":"542","author":"C.Herv\u00e9","year":"2005","journal-title":"Public Traceability in Traitor Tracing Schemes. Eurocrypt '05"},{"key":"ijcac.2014070101-10","first-page":"690","article-title":"Cryptographically-enforced hierarchical access control with multiple keys.","author":"C.Jason","year":"2009","journal-title":"Journal of Logic and Algebraic Programming"},{"key":"ijcac.2014070101-11","unstructured":"Jinbao, Z., & Allen, W. (2013, December 15). Retrieved from CA Technologies: http:\/\/www.ca.com\/us\/~\/media\/files\/articles\/ca-technology-exchange\/data-modeling-for-big-data-zhu-wang.aspx"},{"key":"ijcac.2014070101-12","doi-asserted-by":"crossref","unstructured":"Li, M., Yu, S., Lou, W., & Hou, Y. (2012). Toward Privacy-Assured Cloud Data Services with Flexible Search Functionalities. Distributed Computing Systems Workshops (ICDCSW), 2012 32nd International Conference (pp. 466 - 470). Macau: IEEE.","DOI":"10.1109\/ICDCSW.2012.41"},{"key":"ijcac.2014070101-13","first-page":"56","article-title":"Toward privacy-assured and searchable cloud data storage services.","author":"M.Li","year":"2013","journal-title":"IEEE Network"},{"key":"ijcac.2014070101-14","unstructured":"Ravinder, R., Sridhar, S., & RamaKrishna, V. (2013). An Optimistic Approach for Query Construction and Execution in Cloud Computing Environment . International Journal of Advanced Research in Computer Science and Software Engineering, 237-241."},{"key":"ijcac.2014070101-15","unstructured":"Samatha, N., Vijay, C. K., & Raja, S. R. (2012). Query Optimization Issues for Data Retrieval in Cloud Computing. International Journal Of Computational Engineering Research, 2250-3005."},{"key":"ijcac.2014070101-16","doi-asserted-by":"crossref","unstructured":"Wang, C., Cao, N., Ren, K., & Lou, W. (2012). Enabling Secure and Efficient Ranked Keyword Search over Outsourced Cloud Data. Parallel and Distributed Systems, IEEE Transactions, 1467 - 1479.","DOI":"10.1109\/TPDS.2011.282"},{"key":"ijcac.2014070101-17","first-page":"542","article-title":"An Efficient Quasi-Identifier Index Based Approach for Privacy Preservation over Incremental Data Sets on Cloud.","author":"Z.Xuyun","year":"2013","journal-title":"Journal of Computer and System Sciences"},{"key":"ijcac.2014070101-18","doi-asserted-by":"crossref","unstructured":"Yaga, R., Lingala, T., & Sreekanth, G. (2012). A Secure Model for Cloud Computing Based Storage and Retrieval. IOSR Journal of Computer Engineering, 01-05.","DOI":"10.9790\/0661-0610105"},{"key":"ijcac.2014070101-19","doi-asserted-by":"crossref","unstructured":"Zeeshan, P., Ammar, A. A., Asad, M. K., Sungyoung, L., & Eui-Nam, H. (2013). Privacy-ware Searching with Oblivious Term Matching for Cloud Storage. Supercomput, 538\u2013560.","DOI":"10.1007\/s11227-012-0829-z"}],"container-title":["International Journal of Cloud Applications and Computing"],"original-title":[],"language":"ng","link":[{"URL":"https:\/\/www.igi-global.com\/viewtitle.aspx?TitleId=120243","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,6,1]],"date-time":"2022-06-01T14:59:58Z","timestamp":1654095598000},"score":1,"resource":{"primary":{"URL":"https:\/\/services.igi-global.com\/resolvedoi\/resolve.aspx?doi=10.4018\/ijcac.2014070101"}},"subtitle":[""],"short-title":[],"issued":{"date-parts":[[2014,7,1]]},"references-count":20,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2014,7]]}},"URL":"https:\/\/doi.org\/10.4018\/ijcac.2014070101","relation":{},"ISSN":["2156-1834","2156-1826"],"issn-type":[{"type":"print","value":"2156-1834"},{"type":"electronic","value":"2156-1826"}],"subject":[],"published":{"date-parts":[[2014,7,1]]}}}