Enabling Efficient Spatial Keyword Queries on Encrypted Data With Strong Security Guarantees

被引:26
作者
Wang, Xiangyu [1 ,2 ]
Ma, Jianfeng [1 ,2 ]
Li, Feng [1 ,2 ]
Liu, Ximeng [3 ]
Miao, Yinbin [1 ,4 ,5 ]
Deng, Robert H. [6 ]
机构
[1] Xidian Univ, Sch Cyber Engn, Xian 710071, Peoples R China
[2] Xidian Univ, Shaanxi Key Lab Network & Syst Secur, Xian 710071, Peoples R China
[3] Fuzhou Univ, Coll Math & Comp Sci, Fuzhou 350108, Peoples R China
[4] Guilin Univ Elect Technol, Guangxi Key Lab Trusted Software, Guilin 541004, Peoples R China
[5] City Univ Hong Kong, Dept Comp Sci, Hong Kong, Peoples R China
[6] Singapore Management Univ, Sch Informat Syst, Singapore 188065, Singapore
基金
中国国家自然科学基金;
关键词
Encryption; Cryptography; Servers; Spatial databases; Security; Indexes; Databases; Structured encryption; spatio-textual data; hidden vector encryption; SEARCHABLE SYMMETRIC-ENCRYPTION;
D O I
10.1109/TIFS.2021.3118880
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Structured Encryption (STE), which allows a server to provide secure search services on encrypted data structures, has been widely investigated in recent years. To meet expressive search requirements in practical applications, a large number of STE constructions have been proposed either on textual keywords or spatial data. However, STE on spatio-textual data, which are widely used in location-based services, has not been fully investigated. In this paper, we formally define the notion of Spatial Keyword Structured Encryption (SKSE) and propose several concrete SKSE constructions with various efficiency-security trade-offs. Firstly, we propose a basic construction with linear search complexity, which only leaks the private files matching both spatial range query and all query keywords. Then, to improve the search efficiency on large-scale datasets, we present a novel tree-based construction with sub-linear search complexity. Finally, we introduce a post-validation approach to remove false positives and further improve storage and search performance. Our constructions are general in the sense that they can be constructed from any hidden vector encryption schemes, including public-key setting and symmetric-key setting, which can meet different sharing requirements. Our rigorous security analysis and comprehensive performance evaluation demonstrate that the proposed constructions are secure and outperform the start-of-the-art solutions.
引用
收藏
页码:4909 / 4923
页数:15
相关论文
共 32 条
  • [31] A Key-Policy Searchable Attribute-Based Encryption Scheme for Efficient Keyword Search and Fine-Grained Access Control over Encrypted Data
    Yin, Hui
    Xiong, Yinqiao
    Zhang, Jixin
    Ou, Lu
    Liao, Shaolin
    Qin, Zheng
    ELECTRONICS, 2019, 8 (03)
  • [32] Experimental Demonstration of High-Speed Spatial Light Modulation Enabling 25-Gbit/s Twisted Light Encoding/Decoding and 260-m Security FreeSpace Data Transmission
    Zhao, Yifan
    Wang, Andong
    Zhu, Long
    Zheng, Shuang
    Zhou, Nan
    Wang, Jian
    2016 15TH INTERNATIONAL CONFERENCE ON OPTICAL COMMUNICATIONS AND NETWORKS (ICOCN), 2016,