An Approach for Efficient and Secure Data Encryption Scheme for Spatial Data

被引:0
|
作者
Reddy N.C.S. [1 ]
Madhuravani B. [1 ]
Sneha D.P. [1 ]
机构
[1] Department of Computer Science and Engineering, MLR Institute of Technology, Dundigal, Hyderabad
关键词
Encryption; Ex-OR operation; Location privacy; Location-based services; Spatial query processing;
D O I
10.1007/s42979-020-0095-8
中图分类号
学科分类号
摘要
This article represents a dynamic grid system (DGS), a privacy grid system defined by the user. This is the primary all-encompassing secure and spatial data satisfying basic essential necessities for confidentiality-securing snapshot and location-based services (LBSs). First, secure and spatial data are responsible for achieving simple matching operation using a semi-trusted third party. The semi-trusted third party has no information about the location of the user. Second, under the defined adversary model, we can provide a secured snapshot and uninterrupted location-based services. Third, not beyond the proximity of the user’s area, the communication cost does not rely on others ideal confidentiality location; it depends on the number of pertinent salient activities. Fourth, despite these things, it has only been targeted on the range and our system that can effectively support different spatial queries without altering the algorithms that are kept running by the semi-reliable third parties and the database servers, given that the spatial query is abstracted into spatial regions within the desired search area. The experimental assessment shows a more efficient approach towards the dynamic grid structure than the progressive confidentiality technique for uninterrupted location-based services. We offer a dual spatial data transformation and encryption scheme in which encrypted requests are executed completely on the encrypted database by the provider, and the user gets encrypted results. To attain services found on their location, location-based services want users to consistently report their locations to a potentially unreliable server which may open them to security risks. Lamentably, there were many restrictions in the existing confidentiality-securing methods for location-based services, such as the trustworthy third party requirement, confidentiality restrictions and high overhead communication. © 2020, Springer Nature Singapore Pte Ltd.
引用
收藏
相关论文
共 50 条
  • [41] WBMFC: Efficient and Secure Storage of Genomic Data
    Kumar, Sanjeev
    Agarwal, Suneeta
    Ranvijay
    PERTANIKA JOURNAL OF SCIENCE AND TECHNOLOGY, 2018, 26 (04): : 1913 - 1925
  • [42] Secure and Efficient Data Deduplication in JointCloud Storage
    Zhang, Di
    Le, Junqing
    Mu, Nankun
    Wu, Jiahui
    Liao, Xiaofeng
    IEEE TRANSACTIONS ON CLOUD COMPUTING, 2023, 11 (01) : 156 - 167
  • [43] Multidata-Owner Searchable Encryption Scheme Over Medical Cloud Data With Efficient Access Control
    Abdelfattah, Sherif
    Baza, Mohamed
    Mahmoud, Mohamed M. E. A.
    Fouda, Mostafa M.
    Abualsaud, Khalid A.
    Guizani, Mohsen
    IEEE SYSTEMS JOURNAL, 2022, 16 (03): : 5067 - 5078
  • [44] Watermarking and Encryption Scheme to Secure Multimedia Information
    Farah, Tarek
    Hermassi, Houcemeddine
    Rhoouma, Rhoouma
    Belghith, Safya
    WORLD CONGRESS ON COMPUTER & INFORMATION TECHNOLOGY (WCCIT 2013), 2013,
  • [45] Assessment of Encryption and Decryption Schemes for Secure Data Transmission in Healthcare Systems
    Adedeji, Kazeem B.
    Nwulu, Nnamdi I.
    Aigbavboa, Clinton
    Gbadamosi, Saheed L.
    2019 IEEE AFRICON, 2019,
  • [46] A New Chaos-based Text Encryption to Secure GPS Data
    Azzaz, M. S.
    Krimil, M. A.
    2018 INTERNATIONAL CONFERENCE ON SMART COMMUNICATIONS IN NETWORK TECHNOLOGIES (SACONET), 2018, : 294 - 299
  • [47] Image Encryption Using Separable Reversible Data Hiding Scheme
    Smitha, M.
    Jayanthi, V. E.
    Merlin, Ajitha
    2013 FOURTH INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATIONS AND NETWORKING TECHNOLOGIES (ICCCNT), 2013,
  • [48] An Improved Reversible Data Hiding Scheme Through Novel Encryption
    Manikandan, Vazhora Malayil
    Masilamani, Vedhanayagam
    2019 SECOND INTERNATIONAL CONFERENCE ON NEXT GENERATION COMPUTING APPLICATIONS 2019 (NEXTCOMP 2019), 2019,
  • [49] An efficient medical data encryption scheme using selective shuffling and inter-intra pixel diffusion IoT-enabled secure E-healthcare framework
    Ravichandran, Dhivya
    Jebarani, W. Sylvia Lilly
    Mahalingam, Hemalatha
    Meikandan, Padmapriya Velupillai
    Pravinkumar, Padmapriya
    Amirtharajan, Rengarajan
    SCIENTIFIC REPORTS, 2025, 15 (01):
  • [50] EncryScation: An Secure Approach for Data Security Using Encryption and Obfuscation Techniques for IaaS and DaaS Services in Cloud Environment
    Suthar, Krunal
    Patel, Jayesh
    PROCEEDINGS OF INTERNATIONAL CONFERENCE ON COMMUNICATION AND NETWORKS, 2017, 508 : 323 - 331