Privacy-preserving Boolean range query with verifiability and forward security over spatio-textual data

被引:3
作者
Ge, Xinrui [1 ]
Yu, Jia [1 ]
Kong, Fanyu [2 ]
机构
[1] Qingdao Univ, Coll Comp Sci & Technol, Qingdao 266071, Peoples R China
[2] Shandong Univ, Sch Software, Jinan 250101, Peoples R China
基金
中国国家自然科学基金;
关键词
Privacy preserving; Cloud computing; Cloud security; Forward security; Spatio-textual data; ENABLING EFFICIENT; SEARCH;
D O I
10.1016/j.ins.2024.120929
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Boolean range query, as one typical spatial keyword query, has received more and more attention and been widely deployed in many applications. To release the storage and computation burden of client, the spatio-textual data is usually outsourced to the cloud. Some existing schemes have been proposed to realize privacy -preserving boolean range query over spatio-textual data. Nevertheless, these schemes do not support the verifiability and the forward security of spatiotextual data simultaneously. In this paper, we aim at exploring this issue and design a privacypreserving boolean range query scheme with verifiability and forward security over spatio-textual data. In order to realize forward security, we build a secure binary tree index and a secure keyword index for the spatio-textual data. In each update, we generate new tokens for all leaf nodes using different keys, and assign new states for updated keywords. The cloud cannot learn the keyword of previous query token because the update token is not matched with the previous query token. As a result, the proposed scheme realizes forward security. To realize result verification, we design a novel forward secure verification tag. Benefiting from the accumulation of this tag and the newly state assigned for keyword, we can conveniently perform update operation and prevent the cloud from returning the object not updated. According to the newly state stored locally and the returned objects by the cloud, we can generate the tag and check whether it is the same as the returned tag for verifying the result validity. We leverage the additive symmetric homomorphic encryption algorithm to securely realize the accumulation of ciphertexts. Formal security analysis presents that our proposed scheme satisfies forward security and verifiability. Extend experiment is conducted to show its efficiency.
引用
收藏
页数:21
相关论文
共 39 条
  • [1] Reverse spatial top-k keyword queries
    Ahmed, Pritom
    Eldawy, Ahmed
    Hristidis, Vagelis
    Tsotras, Vassilis J.
    [J]. VLDB JOURNAL, 2023, 32 (03) : 501 - 524
  • [2] Forward and Backward Private Searchable Encryption from Constrained Cryptographic Primitives
    Bost, Raphael
    Minaud, Brice
    Ohrimenko, Olga
    [J]. CCS'17: PROCEEDINGS OF THE 2017 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2017, : 1465 - 1482
  • [3] Σοφοζ - Forward Secure Searchable Encryption
    Bost, Raphael
    [J]. CCS'16: PROCEEDINGS OF THE 2016 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2016, : 1143 - 1154
  • [4] Bost Raphael., 2016, Cryptology ePrint Archive
  • [5] Efficient and Provably Secure Aggregation of Encrypted Data in Wireless Sensor Networks
    Castelluccia, Claude
    Chan, Aldar C-F
    Mykletun, Einar
    Tsudik, Gene
    [J]. ACM TRANSACTIONS ON SENSOR NETWORKS, 2009, 5 (03) : 1 - 36
  • [6] When Geo-Text Meets Security: Privacy-Preserving Boolean Spatial Keyword Queries
    Cui, Ningning
    Li, Jianxin
    Yang, Xiaochun
    Wang, Bin
    Reynolds, Mark
    Xiang, Yong
    [J]. 2019 IEEE 35TH INTERNATIONAL CONFERENCE ON DATA ENGINEERING (ICDE 2019), 2019, : 1046 - 1057
  • [7] Curtain RF, 2006, LECT NOTES CONTR INF, V329, P79, DOI 10.1007/11664550_5
  • [8] Privacy-Preserving Graph Matching Query Supporting Quick Subgraph Extraction
    Ge, Xinrui
    Yu, Jia
    Hao, Rong
    [J]. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2024, 21 (03) : 1286 - 1300
  • [9] Towards Achieving Keyword Search over Dynamic Encrypted Cloud Data with Symmetric-Key Based Verification
    Ge, Xinrui
    Yu, Jia
    Zhang, Hanlin
    Hu, Chengyu
    Li, Zengpeng
    Qin, Zhan
    Hao, Rong
    [J]. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2021, 18 (01) : 490 - 504
  • [10] Vehicular Fog Computing: Architecture, Use Case, and Security and Forensic Challenges
    Huang, Cheng
    Lu, Rongxing
    Choo, Kim-Kwang Raymond
    [J]. IEEE COMMUNICATIONS MAGAZINE, 2017, 55 (11) : 105 - 111