Enabling Efficient Spatial Keyword Queries on Encrypted Data With Strong Security Guarantees

被引:26
|
作者
Wang, Xiangyu [1 ,2 ]
Ma, Jianfeng [1 ,2 ]
Li, Feng [1 ,2 ]
Liu, Ximeng [3 ]
Miao, Yinbin [1 ,4 ,5 ]
Deng, Robert H. [6 ]
机构
[1] Xidian Univ, Sch Cyber Engn, Xian 710071, Peoples R China
[2] Xidian Univ, Shaanxi Key Lab Network & Syst Secur, Xian 710071, Peoples R China
[3] Fuzhou Univ, Coll Math & Comp Sci, Fuzhou 350108, Peoples R China
[4] Guilin Univ Elect Technol, Guangxi Key Lab Trusted Software, Guilin 541004, Peoples R China
[5] City Univ Hong Kong, Dept Comp Sci, Hong Kong, Peoples R China
[6] Singapore Management Univ, Sch Informat Syst, Singapore 188065, Singapore
基金
中国国家自然科学基金;
关键词
Encryption; Cryptography; Servers; Spatial databases; Security; Indexes; Databases; Structured encryption; spatio-textual data; hidden vector encryption; SEARCHABLE SYMMETRIC-ENCRYPTION;
D O I
10.1109/TIFS.2021.3118880
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Structured Encryption (STE), which allows a server to provide secure search services on encrypted data structures, has been widely investigated in recent years. To meet expressive search requirements in practical applications, a large number of STE constructions have been proposed either on textual keywords or spatial data. However, STE on spatio-textual data, which are widely used in location-based services, has not been fully investigated. In this paper, we formally define the notion of Spatial Keyword Structured Encryption (SKSE) and propose several concrete SKSE constructions with various efficiency-security trade-offs. Firstly, we propose a basic construction with linear search complexity, which only leaks the private files matching both spatial range query and all query keywords. Then, to improve the search efficiency on large-scale datasets, we present a novel tree-based construction with sub-linear search complexity. Finally, we introduce a post-validation approach to remove false positives and further improve storage and search performance. Our constructions are general in the sense that they can be constructed from any hidden vector encryption schemes, including public-key setting and symmetric-key setting, which can meet different sharing requirements. Our rigorous security analysis and comprehensive performance evaluation demonstrate that the proposed constructions are secure and outperform the start-of-the-art solutions.
引用
收藏
页码:4909 / 4923
页数:15
相关论文
共 32 条
  • [1] Efficient Strong Privacy-Preserving Conjunctive Keyword Search Over Encrypted Cloud Data
    Xu, Chang
    Wang, Ruijuan
    Zhu, Liehuang
    Zhang, Chuan
    Lu, Rongxing
    Sharif, Kashif
    IEEE TRANSACTIONS ON BIG DATA, 2023, 9 (03) : 805 - 817
  • [2] Efficient Privacy-Preserving Geographic Keyword Boolean Range Query Over Encrypted Spatial Data
    Gong, Zhimao
    Li, Junyi
    Lin, Yaping
    Wei, Jianhao
    Lancine, Camara
    IEEE SYSTEMS JOURNAL, 2023, 17 (01): : 455 - 466
  • [3] cBiK: A Space-Efficient Data Structure for Spatial Keyword Queries
    Sanjuan-Contreras, Carlos E.
    Gutierrez Retamal, Gilberto
    Martinez-Prieto, Miguel A.
    Seco, Diego
    IEEE ACCESS, 2020, 8 (08): : 98827 - 98846
  • [4] Efficient and Privacy-Preserving Spatial Keyword Similarity Query Over Encrypted Data
    Zhang, Songnian
    Ray, Suprio
    Lu, Rongxing
    Guan, Yunguo
    Zheng, Yandong
    Shao, Jun
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2023, 20 (05) : 3770 - 3786
  • [5] Efficient Keyword Search over Encrypted Cloud Data
    Meharwade, Anuradha
    Patil, G. A.
    1ST INTERNATIONAL CONFERENCE ON INFORMATION SECURITY & PRIVACY 2015, 2016, 78 : 139 - 145
  • [6] Efficient and Secure Geometric Range Search Over Encrypted Spatial Data in Mobile Cloud
    Miao, Yinbin
    Wang, Guijuan
    Li, Xinghua
    Li, Hongwei
    Choo, Kim-Kwang Raymond
    Deng, Rebert H.
    IEEE TRANSACTIONS ON MOBILE COMPUTING, 2025, 24 (03) : 1621 - 1635
  • [7] Checking Only When It Is Necessary: Enabling Integrity Auditing Based on the Keyword With Sensitive Information Privacy for Encrypted Cloud Data
    Gao, Xiang
    Yu, Jia
    Chang, Yan
    Wang, Huaqun
    Fan, Jianxi
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2022, 19 (06) : 3774 - 3789
  • [8] Efficient Location-Based Skyline Queries With Secure R-Tree Over Encrypted Data
    Wang, Zuan
    Ding, Xiaofeng
    Lu, Junfeng
    Zhang, Liang
    Zhou, Pan
    Choo, Kim-Kwang Raymond
    Jin, Hai
    IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, 2023, 35 (10) : 10436 - 10450
  • [9] Efficient Hidden Vector Encryption for Conjunctive Queries on Encrypted Data
    Park, Jong Hwan
    IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, 2011, 23 (10) : 1483 - 1497
  • [10] An Efficient Processing of Range Spatial Keyword Queries over Moving Objects
    Oh, Sujin
    Jung, HaRim
    Kim, Ung-Mo
    2018 32ND INTERNATIONAL CONFERENCE ON INFORMATION NETWORKING (ICOIN), 2018, : 525 - 530