An Approach for Efficient and Secure Data Encryption Scheme for Spatial Data

被引:0
|
作者
Reddy N.C.S. [1 ]
Madhuravani B. [1 ]
Sneha D.P. [1 ]
机构
[1] Department of Computer Science and Engineering, MLR Institute of Technology, Dundigal, Hyderabad
关键词
Encryption; Ex-OR operation; Location privacy; Location-based services; Spatial query processing;
D O I
10.1007/s42979-020-0095-8
中图分类号
学科分类号
摘要
This article represents a dynamic grid system (DGS), a privacy grid system defined by the user. This is the primary all-encompassing secure and spatial data satisfying basic essential necessities for confidentiality-securing snapshot and location-based services (LBSs). First, secure and spatial data are responsible for achieving simple matching operation using a semi-trusted third party. The semi-trusted third party has no information about the location of the user. Second, under the defined adversary model, we can provide a secured snapshot and uninterrupted location-based services. Third, not beyond the proximity of the user’s area, the communication cost does not rely on others ideal confidentiality location; it depends on the number of pertinent salient activities. Fourth, despite these things, it has only been targeted on the range and our system that can effectively support different spatial queries without altering the algorithms that are kept running by the semi-reliable third parties and the database servers, given that the spatial query is abstracted into spatial regions within the desired search area. The experimental assessment shows a more efficient approach towards the dynamic grid structure than the progressive confidentiality technique for uninterrupted location-based services. We offer a dual spatial data transformation and encryption scheme in which encrypted requests are executed completely on the encrypted database by the provider, and the user gets encrypted results. To attain services found on their location, location-based services want users to consistently report their locations to a potentially unreliable server which may open them to security risks. Lamentably, there were many restrictions in the existing confidentiality-securing methods for location-based services, such as the trustworthy third party requirement, confidentiality restrictions and high overhead communication. © 2020, Springer Nature Singapore Pte Ltd.
引用
收藏
相关论文
共 50 条
  • [21] A blockchain based secure and privacy aware medical data sharing using smart contract and encryption scheme
    S. Vidhya
    V. Kalaivani
    Peer-to-Peer Networking and Applications, 2023, 16 : 900 - 913
  • [22] A Secure Data Transfer Approach With an Efficient Key Management Over Cloud
    Gupta, Lalit Mohan
    Garg, Hitendra
    Samad, Abdus
    INTERNATIONAL JOURNAL OF INFORMATION TECHNOLOGY AND WEB ENGINEERING, 2022, 17 (01)
  • [23] Secret Sharing-Based IoT Text Data Outsourcing: A Secure and Efficient Scheme
    Tang, Zhaohui
    IEEE ACCESS, 2021, 9 : 76908 - 76920
  • [24] A SECURE APPROACH FOR DATA TRANSMISSION IN COMPUTER NETWORKS USING MODIFIED ADVANCED ENCRYPTION STANDARD ALGORITHM
    Reddy, M. Indrasena
    Kumar, A. P. Siva
    JOURNAL OF MECHANICS OF CONTINUA AND MATHEMATICAL SCIENCES, 2019, : 14 - 28
  • [25] A Secure Lightweight Texture Encryption Scheme
    Jolfaei, Alireza
    Wu, Xin-Wen
    Muthukkumarasamy, Vallipuram
    IMAGE AND VIDEO TECHNOLOGY - PSIVT 2015 WORKSHOPS, 2016, 9555 : 344 - 356
  • [26] Secure Data Deduplication and Efficient Storage Utilization in Cloud Servers Using Encryption, Compression and Integrity Auditing
    Nair, Arya S.
    Radhakrishnan, B.
    Jayakrishnan, R. P.
    Kanthan, Padma Suresh Lekshmi
    SOFT COMPUTING SYSTEMS, ICSCS 2018, 2018, 837 : 326 - 334
  • [27] A Proxy Re-Encryption Approach to Secure Data Sharing in the Internet of Things Based on Blockchain
    Agyekum, Kwame Opuni-Boachie Obour
    Xia, Qi
    Sifah, Emmanuel Boateng
    Cobblah, Christian Nii Aflah
    Xia, Hu
    Gao, Jianbin
    IEEE SYSTEMS JOURNAL, 2022, 16 (01): : 1685 - 1696
  • [28] Secure and efficient online data storage and sharing over cloud environment using probabilistic with homomorphic encryption
    Jayapandian, N.
    Rahman, A. M. J. Md. Zubair
    CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2017, 20 (02): : 1561 - 1573
  • [29] Secure and efficient online data storage and sharing over cloud environment using probabilistic with homomorphic encryption
    N. Jayapandian
    A. M. J. Md. Zubair Rahman
    Cluster Computing, 2017, 20 : 1561 - 1573
  • [30] A Block Encryption Scheme for Secure Still Visual Data based on One-Way Coupled Map Lattice
    Zaghloul, Alaa
    Zhang, Tiejun
    Hou, Handan
    Amin, Mohamed
    Abd El-Latif, Ahmed A.
    Abd El-Wahab, Mohamed S.
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2014, 8 (04): : 89 - 99