Crowdsensed Data-oriented Distributed and Secure Spatial Query Scheme

被引:0
作者
Li, Yuxi [1 ]
Zhou, Fucai [2 ]
Chen, Jingjing [1 ]
Ji, Dong [3 ]
机构
[1] Northeastern Univ, Sch Comp Sci & Engn, Shenyang, Peoples R China
[2] Northeastern Univ, Software Coll, Shenyang, Peoples R China
[3] Northeastern Univ, Natl Frontiers Sci Ctr Ind Intelligence & Syst Op, Shenyang, Peoples R China
来源
2023 IEEE 22ND INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS, TRUSTCOM, BIGDATASE, CSE, EUC, ISCI 2023 | 2024年
关键词
mobile crowdsensing; secure data sharing; spatial queries; query pattern; access control; LOCATION-PRIVACY;
D O I
10.1109/TrustCom60117.2023.00130
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Focusing on the privacy concerns and leakage abuse of sensory data collection in mobile crowdsensing (MCS) environment, we propose a crowdsensed data-oriented distributed and secure spatial query scheme while ensuring data privacy as long as query patterns. To cater to the demands of real-world MCS workloads, we designed a distributed multi-layer architecture and leveraged distributed hash functions(DHT) and broadcast encryption(BE) to achieve load-balancing and enforce access control. Our scheme incorporates a recently developed cryptographic tool-function secret sharing (FSS) to safeguard the query pattern and sensory data from potential compromises at the server layer. The analysis demonstrates that our scheme achieves affordable query complexity while satisfying adaptive L-semantic security. Encouraging experimental results substantiate the efficacy of our scheme, the growth rates of query cost diminishes as the number of records and participants increases. These findings emphasize the suitability of our scheme for crowdsensing applications with fine-grained access control requirements and establish it as an efficient cryptographic tool that holds promise for diverse MCS applications.
引用
收藏
页码:912 / 919
页数:8
相关论文
共 25 条
  • [1] RETRACTED: An improved source location privacy protection using adaptive trust sector-based authentication with honey encryption algorithm in WSN (Retracted Article)
    Arivarasi, A.
    Ramesh, P.
    [J]. JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2021, 13 (Suppl 1) : 9 - 9
  • [2] Function Secret Sharing: Improvements and Extensions
    Boyle, Elette
    Gilboa, Niv
    Ishai, Yuval
    [J]. CCS'16: PROCEEDINGS OF THE 2016 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2016, : 1292 - 1303
  • [3] Universally composable security: A new paradigm for cryptographic protocols
    Canetti, R
    [J]. 42ND ANNUAL SYMPOSIUM ON FOUNDATIONS OF COMPUTER SCIENCE, PROCEEDINGS, 2001, : 136 - 145
  • [4] On protecting end-to-end location privacy against local eavesdropper in Wireless Sensor Networks
    Chen, Honglong
    Lou, Wei
    [J]. PERVASIVE AND MOBILE COMPUTING, 2015, 16 : 36 - 50
  • [5] Single-Server Private Information Retrieval with Sublinear Amortized Time
    Corrigan-Gibbs, Henry
    Henzinger, Alexandra
    Kogan, Dmitry
    [J]. ADVANCES IN CRYPTOLOGY - EUROCRYPT 2022, PT II, 2022, 13276 : 3 - 33
  • [6] Delerablee C, 2007, LECT NOTES COMPUT SC, V4575, P39
  • [7] Location Privacy-Preserving Truth Discovery in Mobile Crowd Sensing
    Gao, Jingsheng
    Fu, Shaojing
    Luo, Yuchuan
    Xie, Tao
    [J]. 2020 29TH INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATIONS AND NETWORKS (ICCCN 2020), 2020,
  • [8] Gowalla, 2021, About us
  • [9] Crowd sensing aware disaster framework design with IoT technologies
    Kucuk, Kerem
    Bayilmis, Cuneyt
    Sonmez, Ahmet Furkan
    Kacar, Sezgin
    [J]. JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2020, 11 (04) : 1709 - 1725
  • [10] Utility-preserving anonymization for health data publishing
    Lee, Hyukki
    Kim, Soohyung
    Kim, Jong Wook
    Chung, Yon Dohn
    [J]. BMC MEDICAL INFORMATICS AND DECISION MAKING, 2017, 17