Verifiable Spatial Range Query Over Encrypted Cloud Data in VANET

被引:11
作者
Meng, Qian [1 ,2 ]
Weng, Jian [3 ]
Miao, Yinbin [4 ]
Chen, Kefei [1 ,2 ]
Shen, Zhonghua [1 ,2 ]
Wang, Fuqun [1 ,2 ]
Li, Zhijun [4 ]
机构
[1] Hangzhou Normal Univ, Sch Math, Hangzhou 311121, Peoples R China
[2] Westone Cryptol Res Ctr, Beijing 100071, Peoples R China
[3] Jinan Univ, Coll Informat Sci & Technol, Guangzhou 510632, Peoples R China
[4] Xidian Univ, Sch Cyber Engn, Xian 710071, Peoples R China
基金
国家重点研发计划;
关键词
Vehicular ad hoc networks; Security; Spatial databases; Query processing; Costs; Hash functions; Generators; Spatial data; verification; G-tree; accumulator; VANET; DATA SHARING FRAMEWORK; INDUSTRIAL INTERNET; ACCESS-CONTROL; SECURE;
D O I
10.1109/TVT.2021.3120089
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
With the popularization of the geo-positioning technologies and Location Based Service (LBS), the spatial range query has gained increasing attention in VANET. To eliminate local data storage and computation burden, the data owner outsources his/her spatial data and the processing of range query tasks to location based service providers. However, outsourcing tasks may bring the risk of privacy leakage as location based service providers and clients, including data owner and data users are not in the same trusted domain. Besides, malicious service providers may forge or tamper retrieval results due to interest incentives such as saving storage or computational capacity. Therefore, we first propose and construct the Verifiable Spatial Range Query (VSRQ) scheme in VANET by using the hierarchical cell based encoding method, G-tree and the accumulator. To guarantee the correctness and completeness of search results, we leverage an accumulator-based technology. Then, we develop an improved G-tree to accelerate query processing and extend it to support multi-dimensional range queries. Security analysis shows that basic VSRQ and extension of VSRQ schemes are secure in terms of the privacy of index and confidentiality of spatial data. Extensive experiments further show that, basic (or extension of) VSRQ scheme can achieve result integrity while supporting spatial range query and lower computational and storage burden compared with existing schemes.
引用
收藏
页码:12342 / 12357
页数:16
相关论文
共 50 条
[21]   A Verifiable Semantic Searching Scheme by Optimal Matching Over Encrypted Data in Public Cloud [J].
Yang, Wenyuan ;
Zhu, Yuesheng .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2021, 16 :100-115
[22]   Verifiable Encrypted Image Retrieval With Reversible Data Hiding in Cloud Environment [J].
Li, Mingyue ;
Zhu, Yuting ;
Du, Ruizhong ;
Jia, Chunfu .
IEEE TRANSACTIONS ON CLOUD COMPUTING, 2025, 13 (01) :397-410
[23]   Privacy-Preserving Keyword Similarity Search Over Encrypted Spatial Data in Cloud Computing [J].
Song, Fuyuan ;
Qin, Zheng ;
Xue, Liang ;
Zhang, Jixin ;
Lin, Xiaodong ;
Shen, Xuemin .
IEEE INTERNET OF THINGS JOURNAL, 2022, 9 (08) :6184-6198
[24]   Enabling Efficient Verifiable Fuzzy Keyword Search Over Encrypted Data in Cloud Computing [J].
Ge, Xinrui ;
Yu, Jia ;
Hu, Chengyu ;
Zhang, Hanlin ;
Hao, Rong .
IEEE ACCESS, 2018, 6 :45725-45739
[25]   Toward Verifiable Phrase Search Over Encrypted Cloud-Based IoT Data [J].
Ge, Xinrui ;
Yu, Jia ;
Chen, Fei ;
Kong, Fanyu ;
Wang, Huaqun .
IEEE INTERNET OF THINGS JOURNAL, 2021, 8 (16) :12902-12918
[26]   Efficient and Generalized Geometric Range Search on Encrypted Spatial Data in the Cloud [J].
Luo, Yuchuan ;
Fu, Shaojing ;
Wang, Dongsheng ;
Xu, Ming ;
Jia, Xiaohua .
2017 IEEE/ACM 25TH INTERNATIONAL SYMPOSIUM ON QUALITY OF SERVICE (IWQOS), 2017,
[27]   VMKDO: Verifiable multi-keyword search over encrypted cloud data for dynamic data-owner [J].
Miao, Yinbin ;
Ma, Jianfeng ;
Liu, Ximeng ;
Liu, Zhiquan ;
Shen, Limin ;
Wei, Fushan .
PEER-TO-PEER NETWORKING AND APPLICATIONS, 2018, 11 (02) :287-297
[28]   Expressive query over outsourced encrypted data [J].
Yang, Yang ;
Liu, Ximeng ;
Deng, Robert .
INFORMATION SCIENCES, 2018, 442 :33-53
[29]   A Method of Query over Encrypted Data in Database [J].
Liu, Lianzhong ;
Gai, Jingfen .
2009 INTERNATIONAL CONFERENCE ON COMPUTER ENGINEERING AND TECHNOLOGY, VOL I, PROCEEDINGS, 2009, :23-27
[30]   Private Conjunctive Query over Encrypted Data [J].
Saha, Tushar Kanti ;
Koshiba, Takeshi .
PROGRESS IN CRYPTOLOGY - AFRICACRYPT 2017, 2017, 10239 :149-164