Privacy-Preserving Spatial Keyword Search With Lightweight Access Control in Cloud Environments

被引:3
作者
Zhao, Xingwen [1 ]
Gan, Luhui [1 ]
Fan, Kai [1 ]
机构
[1] Xidian Univ, State Key Lab Integrated Serv Networks, Xian 710071, Peoples R China
关键词
Access control; Cloud computing; Encryption; Servers; Keyword search; Indexes; Industrial Internet of Things; cloud computing; Industrial Internet of Things (IIoT); spatial keyword search; QUERY;
D O I
10.1109/JIOT.2023.3333359
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
As cloud computing continues to gain popularity, various applications have been deployed under Industrial Internet of Things (IIoT) scenarios. In order to alleviate the heavy burden of local storage and processing, a substantial amount of data is entrusted to the cloud server (CS), but attendant security risks like privacy leakages begin to appear. In addition, another vital security issue, access control, has come to attention. Many existing spatial keyword similarity search schemes are unable to implement access control. To solve these issues, we propose a novel scheme privacy-preserving spatial keyword similarity search with lightweight access control (PSKSSA) scheme. Specifically, we design an efficient access control IR-tree (ACIR-tree) that achieves sublinear query efficiency. Access control is implemented through role-based polynomial technology, which is integrated into the ACIR-tree and the query vector, so that spatial keywords and access control information are uniformly encoded into a vector. Meanwhile, privacy is protected by enhanced asymmetric scalar-product-preserving encryption (EASPE), which guarantees indistinguishability against the chosen-plaintext attack (IND-CPA) model. The most similar k results are found by the CS while implementing access control for data users. Through formal analysis and extensive experiments, it has proved that the proposed scheme is safe and effective, with good scalability.
引用
收藏
页码:12377 / 12387
页数:11
相关论文
共 26 条
  • [1] Cao N, 2011, IEEE INFOCOM SER, P829, DOI 10.1109/INFCOM.2011.5935306
  • [2] New Algorithms for Secure Outsourcing of Modular Exponentiations
    Chen, Xiaofeng
    Li, Jin
    Ma, Jianfeng
    Tang, Qiang
    Lou, Wenjing
    [J]. IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2014, 25 (09) : 2386 - 2396
  • [3] Secure kNN Query Processing in Untrusted Cloud Environments
    Choi, Sunoh
    Ghinita, Gabriel
    Lim, Hyo-Sang
    Bertino, Elisa
    [J]. IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, 2014, 26 (11) : 2818 - 2831
  • [4] Cong G, 2009, PROC VLDB ENDOW, V2
  • [5] Secure Boolean Spatial Keyword Query With Lightweight Access Control in Cloud Environments
    Cui, Ningning
    Yang, Xiaochun
    Chen, Yunliang
    Li, Jianxin
    Wang, Bin
    Min, Geyong
    [J]. IEEE INTERNET OF THINGS JOURNAL, 2022, 9 (12) : 9503 - 9514
  • [6] When Geo-Text Meets Security: Privacy-Preserving Boolean Spatial Keyword Queries
    Cui, Ningning
    Li, Jianxin
    Yang, Xiaochun
    Wang, Bin
    Reynolds, Mark
    Xiang, Yong
    [J]. 2019 IEEE 35TH INTERNATIONAL CONFERENCE ON DATA ENGINEERING (ICDE 2019), 2019, : 1046 - 1057
  • [7] Artificial Intelligence for Detection, Estimation, and Compensation of Malicious Attacks in Nonlinear Cyber-Physical Systems and Industrial IoT
    Farivar, Faezeh
    Haghighi, Mohammad Sayad
    Jolfaei, Alireza
    Alazab, Mamoun
    [J]. IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2020, 16 (04) : 2716 - 2725
  • [8] Efficient and Secure Decision Tree Classification for Cloud-Assisted Online Diagnosis Services
    Liang, Jinwen
    Qin, Zheng
    Xiao, Sheng
    Ou, Lu
    Lin, Xiaodong
    [J]. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2021, 18 (04) : 1632 - 1644
  • [9] Top-k Query Processing on Encrypted Databases with Strong Security Guarantees
    Meng, Xianrui
    Zhu, Haohan
    Kollios, George
    [J]. 2018 IEEE 34TH INTERNATIONAL CONFERENCE ON DATA ENGINEERING (ICDE), 2018, : 353 - 364
  • [10] Fine-grained search and access control in multi-user searchable encryption without shared keys
    Nair, Manju S.
    Rajasree, M. S.
    [J]. JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2018, 41 : 124 - 133