Privacy-Preserving Linear Region Search Service

被引:7
作者
Zhang, Hua [1 ]
Guo, Ziqing [1 ]
Zhao, Shaohua [1 ]
Wen, Qiaoyan [1 ]
机构
[1] Beijing Univ Posts & Telecommun, State Key Lab Networking & Switching Technol, Beijing 100876, Peoples R China
关键词
Cryptography; Indexes; Cloud computing; Algorithm design and analysis; Search problems; Outsourcing; Linear region search; privacy-preserving; location-based services; data outsourcing; cloud computing; RANGE QUERIES; CLOUD; SECURE;
D O I
10.1109/TSC.2017.2777970
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Due to a variety of advantages of data outsourcing, some Location Based Services (LBS) providers are motivated to outsource the geographic data and query service to commercial cloud. However, for protecting data confidentiality, the valuable data should be encrypted before outsourcing, which obstructs the utilization like geographic information query. To address this problem, some previous works regarding to secure search on encrypted database could be applied in outsourced LBS scenario directly, but none of them is tailor-made for linear region search (LRS). The LRS is a kind of LBS that widely used in navigation system, it finds the nearby points of interest (POI) for a query segment. In this paper, for the first time, we explore and solve the challenging problem of privacy-preserving linear region search. Specifically, we choose the quadtree structure to build index for POI database, then the results of LRS can be efficiently obtained by finding out the rectangular regions that query segment passes through. In order to preserve the privacy of both LBS providers and users, according to computational geometry and Asymmetric Scalar-product Preserving Encryption (ASPE) approach, we design a novel algorithm for accurately determining whether a segment intersects with a rectangle on ciphertext. Moreover, this algorithm also provides a new idea to solve other computational problems in encrypted 2-dimensional geometry space. Based on different privacy requirements of two threat models, we propose two privacy-preserving LRS schemes and corresponding dynamic update operations. Security analysis and experiments on real-world dataset show that our schemes are secure and efficient.
引用
收藏
页码:207 / 221
页数:15
相关论文
共 50 条
  • [31] BlindIdM: A privacy-preserving approach for identity management as a service
    David Nuñez
    Isaac Agudo
    International Journal of Information Security, 2014, 13 : 199 - 215
  • [32] Blockchain-Aided Privacy-Preserving Outsourcing Algorithms of Bilinear Pairings for Internet of Things Devices
    Zhang, Hanlin
    Tong, Le
    Yu, Jia
    Lin, Jie
    IEEE INTERNET OF THINGS JOURNAL, 2021, 8 (20): : 15596 - 15607
  • [33] Privacy-Preserving Spatial Keyword Search With Lightweight Access Control in Cloud Environments
    Zhao, Xingwen
    Gan, Luhui
    Fan, Kai
    IEEE INTERNET OF THINGS JOURNAL, 2024, 11 (07) : 12377 - 12387
  • [34] Lightweight and Privacy-Preserving Multi-Keyword Search over Outsourced Data
    Zhao, Meng
    Liu, Lingang
    Ding, Yong
    Deng, Hua
    Liang, Hai
    Wang, Huiyong
    Wang, Yujue
    APPLIED SCIENCES-BASEL, 2023, 13 (05):
  • [35] Privacy-Preserving Threshold Spatial Keyword Search in Cloud-Assisted IIoT
    Yang, Yutao
    Miao, Yinbin
    Ying, Zuobin
    Ning, Jianting
    Meng, Xiangdong
    Choo, Kim-Kwang Raymond
    IEEE INTERNET OF THINGS JOURNAL, 2022, 9 (18): : 16990 - 17001
  • [36] Privacy-Preserving Multi-Keyword Top-k Similarity Search Over Encrypted Data
    Ding, Xiaofeng
    Liu, Peng
    Jin, Hai
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2019, 16 (02) : 344 - 357
  • [37] Achieving an effective, scalable and privacy-preserving data sharing service in cloud computing
    Dong, Xin
    Yu, Jiadi
    Luo, Yuan
    Chen, Yingying
    Xue, Guangtao
    Li, Minglu
    COMPUTERS & SECURITY, 2014, 42 : 151 - 164
  • [38] Privacy-Preserving Deep Learning on Big Data in Cloud
    Fan, Yongkai
    Zhang, Wanyu
    Bai, Jianrong
    Lei, Xia
    Li, Kuanching
    CHINA COMMUNICATIONS, 2023, 20 (11) : 176 - 186
  • [39] Cryptographic Primitives in Privacy-Preserving Machine Learning: A Survey
    Qin, Hong
    He, Debiao
    Feng, Qi
    Khan, Muhammad Khurram
    Luo, Min
    Choo, Kim-Kwang Raymond
    IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, 2024, 36 (05) : 1919 - 1934
  • [40] Privacy-Preserving Secret Shared Computations Using MapReduce
    Dolev, Shlomi
    Gupta, Peeyush
    Li, Yin
    Mehrotra, Sharad
    Sharma, Shantanu
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2021, 18 (04) : 1645 - 1666