Verifiable Spatial Range Query Over Encrypted Cloud Data in VANET

被引:12
作者
Meng, Qian [1 ,2 ]
Weng, Jian [3 ]
Miao, Yinbin [4 ]
Chen, Kefei [1 ,2 ]
Shen, Zhonghua [1 ,2 ]
Wang, Fuqun [1 ,2 ]
Li, Zhijun [4 ]
机构
[1] Hangzhou Normal Univ, Sch Math, Hangzhou 311121, Peoples R China
[2] Westone Cryptol Res Ctr, Beijing 100071, Peoples R China
[3] Jinan Univ, Coll Informat Sci & Technol, Guangzhou 510632, Peoples R China
[4] Xidian Univ, Sch Cyber Engn, Xian 710071, Peoples R China
基金
国家重点研发计划;
关键词
Vehicular ad hoc networks; Security; Spatial databases; Query processing; Costs; Hash functions; Generators; Spatial data; verification; G-tree; accumulator; VANET; DATA SHARING FRAMEWORK; INDUSTRIAL INTERNET; ACCESS-CONTROL; SECURE;
D O I
10.1109/TVT.2021.3120089
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
With the popularization of the geo-positioning technologies and Location Based Service (LBS), the spatial range query has gained increasing attention in VANET. To eliminate local data storage and computation burden, the data owner outsources his/her spatial data and the processing of range query tasks to location based service providers. However, outsourcing tasks may bring the risk of privacy leakage as location based service providers and clients, including data owner and data users are not in the same trusted domain. Besides, malicious service providers may forge or tamper retrieval results due to interest incentives such as saving storage or computational capacity. Therefore, we first propose and construct the Verifiable Spatial Range Query (VSRQ) scheme in VANET by using the hierarchical cell based encoding method, G-tree and the accumulator. To guarantee the correctness and completeness of search results, we leverage an accumulator-based technology. Then, we develop an improved G-tree to accelerate query processing and extend it to support multi-dimensional range queries. Security analysis shows that basic VSRQ and extension of VSRQ schemes are secure in terms of the privacy of index and confidentiality of spatial data. Extensive experiments further show that, basic (or extension of) VSRQ scheme can achieve result integrity while supporting spatial range query and lower computational and storage burden compared with existing schemes.
引用
收藏
页码:12342 / 12357
页数:16
相关论文
共 50 条
[31]   Multi-Client Verifiable Encrypted Keyword Search Scheme With Authorization Over Outsourced Encrypted Data [J].
Yang, Xu ;
Wang, Qiuhao ;
Qi, Saiyu ;
Li, Ke ;
Wang, Jianfeng ;
Zhao, Wenjia ;
Qi, Yong .
IEEE TRANSACTIONS ON NETWORK SCIENCE AND ENGINEERING, 2024, 11 (06) :6356-6371
[32]   An Efficient and Verifiable Encrypted Data Filtering Framework Over Large-Scale Storage in Cloud Edge [J].
Huang, Qinlong ;
Wang, Chao ;
Lu, Boyu .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2024, 19 :8248-8262
[33]   Efficient and Privacy-Preserving Spatial Keyword Similarity Query Over Encrypted Data [J].
Zhang, Songnian ;
Ray, Suprio ;
Lu, Rongxing ;
Guan, Yunguo ;
Zheng, Yandong ;
Shao, Jun .
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2023, 20 (05) :3770-3786
[34]   Verifiable Diversity Ranking Search Over Encrypted Outsourced Data [J].
Liu, Yuling ;
Peng, Hua ;
Wang, Jie .
CMC-COMPUTERS MATERIALS & CONTINUA, 2018, 55 (01) :37-57
[35]   PGSim: Efficient and Privacy-Preserving Graph Similarity Query Over Encrypted Data in Cloud [J].
Zheng, Yandong ;
Zhu, Hui ;
Lu, Rongxing ;
Guan, Yunguo ;
Zhang, Songnian ;
Wang, Fengwei ;
Shao, Jun ;
Li, Hui .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2023, 18 :2030-2045
[36]   A novel approach for query over encrypted data in database [J].
Al-Saraireh J. .
International Journal of Information and Computer Security, 2019, 11 (06) :621-636
[37]   VPAMS: Verifiable and practical attribute-based multi-keyword search over encrypted cloud data [J].
Liang, Yanrong ;
Li, Yanping ;
Cao, Qiang ;
Ren, Fang .
JOURNAL OF SYSTEMS ARCHITECTURE, 2020, 108
[38]   A Verifiable and Dynamic Multi-keyword Ranked Search Scheme over Encrypted Cloud Data with Accuracy Improvement [J].
Zhang, Qi ;
Fu, Shaojing ;
Jia, Nan ;
Xu, Ming .
SECURITY AND PRIVACY IN COMMUNICATION NETWORKS, SECURECOMM 2018, PT I, 2018, 254 :588-604
[39]   MUSE: An Efficient and Accurate Verifiable Privacy-Preserving Multikeyword Text Search over Encrypted Cloud Data [J].
Zhu Xiangyang ;
Dai Hua ;
Yi Xun ;
Yang Geng ;
Li Xiao .
SECURITY AND COMMUNICATION NETWORKS, 2017,
[40]   Authenticable Data Analytics Over Encrypted Data in the Cloud [J].
Chen, Lanxiang ;
Mu, Yi ;
Zeng, Lingfang ;
Rezaeibagha, Fatemeh ;
Deng, Robert H. .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2023, 18 :1800-1813