An Approach for Efficient and Secure Data Encryption Scheme for Spatial Data

被引:0
|
作者
Reddy N.C.S. [1 ]
Madhuravani B. [1 ]
Sneha D.P. [1 ]
机构
[1] Department of Computer Science and Engineering, MLR Institute of Technology, Dundigal, Hyderabad
关键词
Encryption; Ex-OR operation; Location privacy; Location-based services; Spatial query processing;
D O I
10.1007/s42979-020-0095-8
中图分类号
学科分类号
摘要
This article represents a dynamic grid system (DGS), a privacy grid system defined by the user. This is the primary all-encompassing secure and spatial data satisfying basic essential necessities for confidentiality-securing snapshot and location-based services (LBSs). First, secure and spatial data are responsible for achieving simple matching operation using a semi-trusted third party. The semi-trusted third party has no information about the location of the user. Second, under the defined adversary model, we can provide a secured snapshot and uninterrupted location-based services. Third, not beyond the proximity of the user’s area, the communication cost does not rely on others ideal confidentiality location; it depends on the number of pertinent salient activities. Fourth, despite these things, it has only been targeted on the range and our system that can effectively support different spatial queries without altering the algorithms that are kept running by the semi-reliable third parties and the database servers, given that the spatial query is abstracted into spatial regions within the desired search area. The experimental assessment shows a more efficient approach towards the dynamic grid structure than the progressive confidentiality technique for uninterrupted location-based services. We offer a dual spatial data transformation and encryption scheme in which encrypted requests are executed completely on the encrypted database by the provider, and the user gets encrypted results. To attain services found on their location, location-based services want users to consistently report their locations to a potentially unreliable server which may open them to security risks. Lamentably, there were many restrictions in the existing confidentiality-securing methods for location-based services, such as the trustworthy third party requirement, confidentiality restrictions and high overhead communication. © 2020, Springer Nature Singapore Pte Ltd.
引用
收藏
相关论文
共 50 条
  • [31] Analysis of Encryption and Lossless Compression Techniques for Secure Data Transmission
    Singh, Siddharth
    Devgon, Raaghavv
    2019 IEEE 4TH INTERNATIONAL CONFERENCE ON COMPUTER AND COMMUNICATION SYSTEMS (ICCCS 2019), 2019, : 120 - 124
  • [32] VEDSDA: Voronoi Encryption and Decryption for Secure Data Aggregation in WSNs
    S. Reshma
    K. Shaila
    K. R. Venugopal
    Wireless Personal Communications, 2021, 119 : 2675 - 2694
  • [33] A Cloud Secure Storage Mechanism Based on Data Dispersion and Encryption
    Song, Heqing
    Li, Jifei
    Li, Haoteng
    IEEE ACCESS, 2021, 9 : 63745 - 63751
  • [34] VEDSDA: Voronoi Encryption and Decryption for Secure Data Aggregation in WSNs
    Reshma, S.
    Shaila, K.
    Venugopal, K. R.
    WIRELESS PERSONAL COMMUNICATIONS, 2021, 119 (03) : 2675 - 2694
  • [35] Data Center Secure Communication via DNA Hyperchaotic Encryption
    Wang, Xue
    Zhang, Chongfu
    Zeng, Wenjun
    Luo, Yufeng
    JOURNAL OF LIGHTWAVE TECHNOLOGY, 2024, 42 (16) : 5564 - 5572
  • [36] A New Approach for Secure Data Transmission
    Pranesh, R.
    Harish, V.
    Vigneshwaran, M.
    Manikandan, G.
    PROCEEDINGS OF IEEE INTERNATIONAL CONFERENCE ON CIRCUIT, POWER AND COMPUTING TECHNOLOGIES (ICCPCT 2016), 2016,
  • [37] EAFS: An Efficient, Accurate, and Forward Secure Searchable Encryption Scheme Supporting Range Search
    Tian, Pengxu
    Guo, Cheng
    Choo, Kim-Kwang Raymond
    Liu, Yining
    Li, Long
    Yao, Lin
    IEEE SYSTEMS JOURNAL, 2022, 16 (02): : 3450 - 3460
  • [38] Secure and efficient outsourcing differential privacy data release scheme in Cyber-physical system
    Ye, Heng
    Liu, Jiqiang
    Wang, Wei
    Li, Ping
    Li, Tong
    Li, Jin
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2020, 108 : 1314 - 1323
  • [39] Novel Approach to Secure Data Transmission
    Lemos, Nikita
    Khanvilkar, Sushma
    Patil, Saurabh
    2018 FOURTH INTERNATIONAL CONFERENCE ON COMPUTING COMMUNICATION CONTROL AND AUTOMATION (ICCUBEA), 2018,
  • [40] Secure and Efficient Data-Privacy-Preserving Scheme for Mobile Cyber-Physical Systems
    Wang, Haoyang
    Fan, Kai
    Zhang, Kuan
    Wang, Zilong
    Li, Hui
    Yang, Yintang
    IEEE INTERNET OF THINGS JOURNAL, 2022, 9 (22) : 22375 - 22388