Efficient and Privacy-Preserving Eclipse Query over Encrypted Data

被引:0
|
作者
Song, Weiyu [1 ,2 ]
Zhang, Yonggang [1 ,2 ]
Sun, Lili [1 ,2 ]
Zheng, Yandong [3 ]
Lu, Rongxing [4 ]
机构
[1] Jilin Univ, Coll Comp Sci & Technol, Changchun 130012, Peoples R China
[2] Jilin Univ, Key Lab Symbol Computat & Knowledge Engn, Minist Educ, Changchun 130012, Peoples R China
[3] Xidian Univ, State Key Lab Integrated Serv Networks, Xian 710071, Peoples R China
[4] Univ New Brunswick, Fac Comp Sci, Fredericton, NB E3B 5A3, Canada
来源
IEEE CONFERENCE ON GLOBAL COMMUNICATIONS, GLOBECOM | 2023年
关键词
SKYLINE; SECURE;
D O I
10.1109/GLOBECOM54140.2023.10437929
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
As the mobile Internet grows rapidly, location-based services (LBSs) are widely applied in the tourism and transportation fields. To fully mine the data collected, location service providers (LSPs) intend to offer various query services to users, which include eclipse query. The eclipse query can generalize nearest neighbor queries and skyline queries and allow users to set more rough and customizable preference ranges. In addition, with the boom of cloud computing, more and more LSPs hope to leverage the cloud to offer better query services. Given that the data could potentially contain confidential information, the data are required to be encrypted prior to outsourcing them. Therefore, eclipse queries need to be executed on the ciphertext. Although several schemes for eclipse queries have been proposed in existing works, they have little focus on privacy issues. To address this issue, we propose an efficient and privacy-preserving scheme for eclipse queries (EPEQ) in this paper. First, we develop a MinValue tree to construct an index for the dataset. Then, by utilizing the MinValue tree and a symmetric homomorphic encryption technique, we design a secure minimum value comparison protocol to obtain a skyline data and a secure undominated data acquisition protocol to obtain the data not skyline dominated by the skyline data. After that, we present our scheme. We analyze the security of the EPEQ scheme and perform experimental evaluations, demonstrating the security and efficiency of our EPEQ scheme.
引用
收藏
页码:1 / 6
页数:6
相关论文
共 50 条
  • [1] An Efficient and Privacy-Preserving Range Query over Encrypted Cloud Data
    Wang, Wentao
    Jin, Yuxuan
    Cao, Bin
    2022 19TH ANNUAL INTERNATIONAL CONFERENCE ON PRIVACY, SECURITY & TRUST (PST), 2022,
  • [2] Efficient and Privacy-Preserving Edit Distance Query over Encrypted Genomic Data
    Zheng, Yandong
    Lu, Rongxing
    Shao, Jun
    Zhang, Yonggang
    Zhu, Hui
    2019 11TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS AND SIGNAL PROCESSING (WCSP), 2019,
  • [3] An efficient privacy-preserving rank query over encrypted data in cloud computing
    Cheng, Fang-Quan
    Peng, Zhi-Yong
    Song, Wei
    Wang, Shu-Lin
    Cui, Yi-Hui
    Jisuanji Xuebao/Chinese Journal of Computers, 2012, 35 (11): : 2215 - 2227
  • [4] Efficient Privacy-Preserving Spatial Range Query Over Outsourced Encrypted Data
    Miao, Yinbin
    Yang, Yutao
    Li, Xinghua
    Liu, Zhiquan
    Li, Hongwei
    Choo, Kim-Kwang Raymond
    Deng, Robert H. H.
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2023, 18 : 3921 - 3933
  • [5] Efficient and Privacy-Preserving Spatial Keyword Similarity Query Over Encrypted Data
    Zhang, Songnian
    Ray, Suprio
    Lu, Rongxing
    Guan, Yunguo
    Zheng, Yandong
    Shao, Jun
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2023, 20 (05) : 3770 - 3786
  • [6] PRkNN: Efficient and Privacy-Preserving Reverse kNN Query Over Encrypted Data
    Zheng, Yandong
    Lu, Rongxing
    Zhang, Songnian
    Guan, Yunguo
    Wang, Fengwei
    Shao, Jun
    Zhu, Hui
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2023, 20 (05) : 4387 - 4402
  • [7] EPSet: Efficient and Privacy-Preserving Set Similarity Range Query Over Encrypted Data
    Zheng, Yandong
    Lu, Rongxing
    Guan, Yunguo
    Zhang, Songnian
    Shao, Jun
    Wang, Fengwei
    Zhu, Hui
    IEEE TRANSACTIONS ON SERVICES COMPUTING, 2024, 17 (02) : 524 - 536
  • [8] PGSim: Efficient and Privacy-Preserving Graph Similarity Query Over Encrypted Data in Cloud
    Zheng, Yandong
    Zhu, Hui
    Lu, Rongxing
    Guan, Yunguo
    Zhang, Songnian
    Wang, Fengwei
    Shao, Jun
    Li, Hui
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2023, 18 : 2030 - 2045
  • [9] Efficient and Privacy-Preserving Similarity Range Query Over Encrypted Time Series Data
    Zheng, Yandong
    Lu, Rongxing
    Guan, Yunguo
    Shao, Jun
    Zhu, Hui
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2022, 19 (04) : 2501 - 2516
  • [10] Achieving Practical and Privacy-Preserving kNN Query Over Encrypted Data
    Zheng, Yandong
    Lu, Rongxing
    Zhang, Songnian
    Shao, Jun
    Zhu, Hui
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2024, 21 (06) : 5479 - 5492