An Approach for Efficient and Secure Data Encryption Scheme for Spatial Data

被引:0
|
作者
Reddy N.C.S. [1 ]
Madhuravani B. [1 ]
Sneha D.P. [1 ]
机构
[1] Department of Computer Science and Engineering, MLR Institute of Technology, Dundigal, Hyderabad
关键词
Encryption; Ex-OR operation; Location privacy; Location-based services; Spatial query processing;
D O I
10.1007/s42979-020-0095-8
中图分类号
学科分类号
摘要
This article represents a dynamic grid system (DGS), a privacy grid system defined by the user. This is the primary all-encompassing secure and spatial data satisfying basic essential necessities for confidentiality-securing snapshot and location-based services (LBSs). First, secure and spatial data are responsible for achieving simple matching operation using a semi-trusted third party. The semi-trusted third party has no information about the location of the user. Second, under the defined adversary model, we can provide a secured snapshot and uninterrupted location-based services. Third, not beyond the proximity of the user’s area, the communication cost does not rely on others ideal confidentiality location; it depends on the number of pertinent salient activities. Fourth, despite these things, it has only been targeted on the range and our system that can effectively support different spatial queries without altering the algorithms that are kept running by the semi-reliable third parties and the database servers, given that the spatial query is abstracted into spatial regions within the desired search area. The experimental assessment shows a more efficient approach towards the dynamic grid structure than the progressive confidentiality technique for uninterrupted location-based services. We offer a dual spatial data transformation and encryption scheme in which encrypted requests are executed completely on the encrypted database by the provider, and the user gets encrypted results. To attain services found on their location, location-based services want users to consistently report their locations to a potentially unreliable server which may open them to security risks. Lamentably, there were many restrictions in the existing confidentiality-securing methods for location-based services, such as the trustworthy third party requirement, confidentiality restrictions and high overhead communication. © 2020, Springer Nature Singapore Pte Ltd.
引用
收藏
相关论文
共 50 条
  • [1] An Efficient & Secure Encryption Scheme for Biometric Data Using Holmes Map & Singular Value Decomposition
    Mehta, Garima
    Dutta, Malay Kishore
    Kim, Pyung Soo
    2014 INTERNATIONAL CONFERENCE ON MEDICAL IMAGING, M-HEALTH & EMERGING COMMUNICATION SYSTEMS (MEDCOM), 2015, : 211 - 215
  • [2] A New Secure and Lightweight Searchable Encryption Scheme over Encrypted Cloud Data
    Tahir, Shahzaib
    Ruj, Sushmita
    Rahulamathavan, Yogachandran
    Rajarajan, Muttukrishnan
    Glackin, Cornelius
    IEEE TRANSACTIONS ON EMERGING TOPICS IN COMPUTING, 2019, 7 (04) : 530 - 544
  • [3] A Secure and Efficient Task Matching Scheme for Spatial Crowdsourcing
    Zhou, Fulin
    Li, Junyi
    Lin, Yaping
    Wei, Jianhao
    Sandor, Voundi Koe Arthur
    IEEE ACCESS, 2020, 8 : 155819 - 155831
  • [4] Secure And Efficient Encryption Scheme Based on Bilinear Mapping
    Verma, Vandani
    Mishra, Pragya
    INTERNATIONAL JOURNAL OF ELECTRONICS AND TELECOMMUNICATIONS, 2022, 68 (03) : 469 - 473
  • [5] An efficient and secure aggregation encryption scheme in edge computing
    Wu, Junhua
    Sheng, Xiaofei
    Li, Guangshun
    Yu, Kan
    Liu, Junke
    CHINA COMMUNICATIONS, 2022, 19 (03) : 245 - 257
  • [6] Quantum safe lightweight encryption scheme for secure data sharing in Internet of Nano Things
    Prajapat, Sunil
    Rana, Aryan
    Kumar, Pankaj
    Das, Ashok Kumar
    COMPUTERS & ELECTRICAL ENGINEERING, 2024, 117
  • [7] Crowdsensed Data-oriented Distributed and Secure Spatial Query Scheme
    Li, Yuxi
    Zhou, Fucai
    Chen, Jingjing
    Ji, Dong
    2023 IEEE 22ND INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS, TRUSTCOM, BIGDATASE, CSE, EUC, ISCI 2023, 2024, : 912 - 919
  • [8] HARPOCRATES: An Approach Towards Efficient Encryption of Data-at-Rest
    Ali, Md Rasid
    Pal, Debranjan
    Das, Abhijit
    Chowdhury, Dipanwita Roy
    IEEE TRANSACTIONS ON EMERGING TOPICS IN COMPUTING, 2025, 13 (01) : 173 - 184
  • [9] A study for method of construct encryption scheme of data management to Secure Data using bucket ID in Cloud Computing Environment
    Song, You-Jin
    Cha, Jaesang
    Kang, Jang-Mook
    INFORMATION-AN INTERNATIONAL INTERDISCIPLINARY JOURNAL, 2012, 15 (03): : 1053 - 1064
  • [10] Attribute-Based Encryption Scheme for Secure Multi-Group Data Sharing in Cloud
    Islam, Md Azharul
    Madria, Sanjay K.
    IEEE TRANSACTIONS ON SERVICES COMPUTING, 2022, 15 (04) : 2158 - 2172