An Approach for Efficient and Secure Data Encryption Scheme for Spatial Data

被引:0
|
作者
Reddy N.C.S. [1 ]
Madhuravani B. [1 ]
Sneha D.P. [1 ]
机构
[1] Department of Computer Science and Engineering, MLR Institute of Technology, Dundigal, Hyderabad
关键词
Encryption; Ex-OR operation; Location privacy; Location-based services; Spatial query processing;
D O I
10.1007/s42979-020-0095-8
中图分类号
学科分类号
摘要
This article represents a dynamic grid system (DGS), a privacy grid system defined by the user. This is the primary all-encompassing secure and spatial data satisfying basic essential necessities for confidentiality-securing snapshot and location-based services (LBSs). First, secure and spatial data are responsible for achieving simple matching operation using a semi-trusted third party. The semi-trusted third party has no information about the location of the user. Second, under the defined adversary model, we can provide a secured snapshot and uninterrupted location-based services. Third, not beyond the proximity of the user’s area, the communication cost does not rely on others ideal confidentiality location; it depends on the number of pertinent salient activities. Fourth, despite these things, it has only been targeted on the range and our system that can effectively support different spatial queries without altering the algorithms that are kept running by the semi-reliable third parties and the database servers, given that the spatial query is abstracted into spatial regions within the desired search area. The experimental assessment shows a more efficient approach towards the dynamic grid structure than the progressive confidentiality technique for uninterrupted location-based services. We offer a dual spatial data transformation and encryption scheme in which encrypted requests are executed completely on the encrypted database by the provider, and the user gets encrypted results. To attain services found on their location, location-based services want users to consistently report their locations to a potentially unreliable server which may open them to security risks. Lamentably, there were many restrictions in the existing confidentiality-securing methods for location-based services, such as the trustworthy third party requirement, confidentiality restrictions and high overhead communication. © 2020, Springer Nature Singapore Pte Ltd.
引用
收藏
相关论文
共 50 条
  • [11] Attribute-Based Encryption Scheme for Secure Multi-Group Data Sharing in Cloud
    Islam, Md Azharul
    Madria, Sanjay K.
    IEEE TRANSACTIONS ON SERVICES COMPUTING, 2022, 15 (04) : 2158 - 2172
  • [12] A secure database encryption scheme
    Sesay, S
    Yang, ZK
    Chen, JW
    Xu, D
    CCNC: 2005 2ND IEEE CONSUMER COMMUNICATIONS AND NETWORKING CONFERENCE, 2005, : 49 - 53
  • [13] An Efficient and Secure Health Data Propagation Scheme Using Steganography-Based Approach for Electronic Health Networks
    Zhang, Liping
    Han, Wenshuo
    Chen, Shukai
    Choo, Kim-Kwang Raymond
    IEEE-ACM TRANSACTIONS ON NETWORKING, 2024, 32 (02) : 1261 - 1272
  • [14] ESAC: An Efficient and Secure Access Control Scheme in Vehicular Named Data Networking
    Jiang, Shunrong
    Liu, Jianqing
    Wang, Liangmin
    Zhou, Yong
    Fang, Yuguang
    IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2020, 69 (09) : 10252 - 10263
  • [15] BDO-SD: An Efficient Scheme for Big Data Outsourcing with Secure Deduplication
    Wen, Mi
    Lu, Kejie
    Lei, Jingsheng
    Li, Fengyong
    Li, Jing
    2015 IEEE CONFERENCE ON COMPUTER COMMUNICATIONS WORKSHOPS (INFOCOM WKSHPS), 2015, : 214 - 219
  • [16] A blockchain-based secure data sharing scheme with efficient attribute revocation
    Li, Siyue
    Niu, Kele
    Wu, Bin
    JOURNAL OF SYSTEMS ARCHITECTURE, 2025, 159
  • [17] Data Encryption Scheme Based On Adaptive System
    Najam, Shaheryar
    Rehman, Mujeeb Ur
    Ahmed, Jameel
    2020 GLOBAL CONFERENCE ON WIRELESS AND OPTICAL TECHNOLOGIES (GCWOT), 2020,
  • [18] An Arbitrary Encryption Scheme For Homomorphic Data Migration
    Bhruguram, T. M.
    Jamal, Jesna
    Kurian, Maria
    Jose, Chinchu
    2011 THIRD INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING (ICOAC), 2011,
  • [19] Secure Data Mining in Cloud using Homomorphic Encryption
    Mittal, Deepti
    Kaur, Damandeep
    Aggarwal, Ashish
    2014 IEEE INTERNATIONAL CONFERENCE ON CLOUD COMPUTING IN EMERGING MARKETS (CCEM), 2014, : 155 - 160
  • [20] A blockchain based secure and privacy aware medical data sharing using smart contract and encryption scheme
    Vidhya, S.
    Kalaivani, V.
    PEER-TO-PEER NETWORKING AND APPLICATIONS, 2023, 16 (02) : 900 - 913