Privacy-Preserving Spatial Keyword Search With Lightweight Access Control in Cloud Environments

被引:3
作者
Zhao, Xingwen [1 ]
Gan, Luhui [1 ]
Fan, Kai [1 ]
机构
[1] Xidian Univ, State Key Lab Integrated Serv Networks, Xian 710071, Peoples R China
关键词
Access control; Cloud computing; Encryption; Servers; Keyword search; Indexes; Industrial Internet of Things; cloud computing; Industrial Internet of Things (IIoT); spatial keyword search; QUERY;
D O I
10.1109/JIOT.2023.3333359
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
As cloud computing continues to gain popularity, various applications have been deployed under Industrial Internet of Things (IIoT) scenarios. In order to alleviate the heavy burden of local storage and processing, a substantial amount of data is entrusted to the cloud server (CS), but attendant security risks like privacy leakages begin to appear. In addition, another vital security issue, access control, has come to attention. Many existing spatial keyword similarity search schemes are unable to implement access control. To solve these issues, we propose a novel scheme privacy-preserving spatial keyword similarity search with lightweight access control (PSKSSA) scheme. Specifically, we design an efficient access control IR-tree (ACIR-tree) that achieves sublinear query efficiency. Access control is implemented through role-based polynomial technology, which is integrated into the ACIR-tree and the query vector, so that spatial keywords and access control information are uniformly encoded into a vector. Meanwhile, privacy is protected by enhanced asymmetric scalar-product-preserving encryption (EASPE), which guarantees indistinguishability against the chosen-plaintext attack (IND-CPA) model. The most similar k results are found by the CS while implementing access control for data users. Through formal analysis and extensive experiments, it has proved that the proposed scheme is safe and effective, with good scalability.
引用
收藏
页码:12377 / 12387
页数:11
相关论文
共 26 条
  • [21] Wong WK, 2009, ACM SIGMOD/PODS 2009 CONFERENCE, P139
  • [22] Enabling Efficient and Geometric Range Query With Access Control Over Encrypted Spatial Data
    Xu, Guowen
    Li, Hongwei
    Dai, Yuanshun
    Yang, Kan
    Lin, Xiaodong
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2019, 14 (04) : 870 - 885
  • [23] Yang YT, 2022, INT CON DISTR COMP S, P392, DOI [10.1109/ICDCS54860.2022.00045, 10.1007/978-981-19-8915-5_34]
  • [24] Privacy-Preserving Threshold Spatial Keyword Search in Cloud-Assisted IIoT
    Yang, Yutao
    Miao, Yinbin
    Ying, Zuobin
    Ning, Jianting
    Meng, Xiangdong
    Choo, Kim-Kwang Raymond
    [J]. IEEE INTERNET OF THINGS JOURNAL, 2022, 9 (18): : 16990 - 17001
  • [25] Yao B, 2013, PROC INT CONF DATA, P733, DOI 10.1109/ICDE.2013.6544870
  • [26] Zheng K, 2015, PROC INT CONF DATA, P423, DOI 10.1109/ICDE.2015.7113303