Privacy-Preserving Linear Region Search Service

被引:7
|
作者
Zhang, Hua [1 ]
Guo, Ziqing [1 ]
Zhao, Shaohua [1 ]
Wen, Qiaoyan [1 ]
机构
[1] Beijing Univ Posts & Telecommun, State Key Lab Networking & Switching Technol, Beijing 100876, Peoples R China
关键词
Cryptography; Indexes; Cloud computing; Algorithm design and analysis; Search problems; Outsourcing; Linear region search; privacy-preserving; location-based services; data outsourcing; cloud computing; RANGE QUERIES; CLOUD; SECURE;
D O I
10.1109/TSC.2017.2777970
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Due to a variety of advantages of data outsourcing, some Location Based Services (LBS) providers are motivated to outsource the geographic data and query service to commercial cloud. However, for protecting data confidentiality, the valuable data should be encrypted before outsourcing, which obstructs the utilization like geographic information query. To address this problem, some previous works regarding to secure search on encrypted database could be applied in outsourced LBS scenario directly, but none of them is tailor-made for linear region search (LRS). The LRS is a kind of LBS that widely used in navigation system, it finds the nearby points of interest (POI) for a query segment. In this paper, for the first time, we explore and solve the challenging problem of privacy-preserving linear region search. Specifically, we choose the quadtree structure to build index for POI database, then the results of LRS can be efficiently obtained by finding out the rectangular regions that query segment passes through. In order to preserve the privacy of both LBS providers and users, according to computational geometry and Asymmetric Scalar-product Preserving Encryption (ASPE) approach, we design a novel algorithm for accurately determining whether a segment intersects with a rectangle on ciphertext. Moreover, this algorithm also provides a new idea to solve other computational problems in encrypted 2-dimensional geometry space. Based on different privacy requirements of two threat models, we propose two privacy-preserving LRS schemes and corresponding dynamic update operations. Security analysis and experiments on real-world dataset show that our schemes are secure and efficient.
引用
收藏
页码:207 / 221
页数:15
相关论文
共 50 条
  • [1] BlindIdM: A privacy-preserving approach for identity management as a service
    Nunez, David
    Agudo, Isaac
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2014, 13 (02) : 199 - 215
  • [2] PrigSim: Towards Privacy-Preserving Graph Similarity Search as a Cloud Service
    Wang, Songlei
    Zheng, Yifeng
    Jia, Xiaohua
    Huang, Hejiao
    Wang, Cong
    IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, 2023, 35 (10) : 10478 - 10496
  • [3] Efficient and Privacy-Preserving Search Over Edge-Cloud Collaborative Entity in IoT
    Zhang, Puning
    Chui, Yilan
    Liu, Huan
    Yang, Zhigang
    Wu, Dapeng
    Wang, Ruyan
    IEEE INTERNET OF THINGS JOURNAL, 2023, 10 (04) : 3192 - 3205
  • [4] Privacy-Preserving Outsourced Similarity Search
    Kozak, Stepan
    Novak, David
    Zezula, Pavel
    JOURNAL OF DATABASE MANAGEMENT, 2014, 25 (03) : 48 - 71
  • [5] SecDM: privacy-preserving data outsourcing framework with differential privacy
    Dagher, Gaby G.
    Fung, Benjamin C. M.
    Mohammed, Noman
    Clark, Jeremy
    KNOWLEDGE AND INFORMATION SYSTEMS, 2020, 62 (05) : 1923 - 1960
  • [6] AVPMIR: Adaptive Verifiable Privacy-Preserving Medical Image Retrieval
    Li, Dong
    Lu, Qingguo
    Liao, Xiaofeng
    Xiang, Tao
    Wu, Jiahui
    Le, Junqing
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2024, 21 (05) : 4637 - 4651
  • [7] Privacy-preserving large-scale systems of linear equations in outsourcing storage and computation
    Li, Dongmei
    Dong, Xiaolei
    Cao, Zhenfu
    Wang, Haijiang
    SCIENCE CHINA-INFORMATION SCIENCES, 2018, 61 (03)
  • [8] Pavan: A privacy-preserving system for DB-as-a-Service
    Moghadam, Somayeh Sobati
    Fayoumi, Amjad
    Vafadoost, Peyman
    ICT EXPRESS, 2021, 7 (02): : 259 - 264
  • [9] Privacy-preserving Range Search
    Liu, Jie
    Chen, Changpin
    2017 4TH INTERNATIONAL CONFERENCE ON INFORMATION SCIENCE AND CONTROL ENGINEERING (ICISCE), 2017, : 553 - 556
  • [10] Achieving Efficient and Privacy-Preserving Set Containment Search Over Encrypted Data
    Zheng, Yandong
    Lu, Rongxing
    Guan, Yunguo
    Shao, Jun
    Zhu, Hui
    IEEE TRANSACTIONS ON SERVICES COMPUTING, 2022, 15 (05) : 2604 - 2618