Fine-Grained Query Authorization With Integrity Verification Over Encrypted Spatial Data in Cloud Storage

被引:0
|
作者
Tian, Feng [1 ]
Wu, Zhenqiang [1 ]
Gui, Xiaolin [2 ]
Ni, Jianbing [3 ]
Shen, Xuemin [4 ]
机构
[1] Shaanxi Normal Univ, Sch Comp Sci, Xian 710062, Shaanxi, Peoples R China
[2] Xi An Jiao Tong Univ, Sch Elect & Informat Engn, Xian 710049, Shaanxi, Peoples R China
[3] Queens Univ, Dept Elect & Comp Engn, Kingston, ON K7L 3N6, Canada
[4] Univ Waterloo, Dept Elect & Comp Engn, Waterloo, ON N2L 3G1, Canada
基金
加拿大自然科学与工程研究理事会;
关键词
Cloud storage; spatial data; integrity verification; location-based services; space filling curve; EFFICIENT; QUADTREE; SCHEME; WINDOW;
D O I
10.1109/TCC.2020.310915
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this article, a fine-grained query authorization scheme with integrity verification is proposed over encrypted spatial data for location-based services (LBS). The fine-grained query authorization is enabled based on a distribution of the spatial data by employing a non-uniform partition in the spatial domain to generate a density-based space filling curve (DSC), which can be used to generate index values for querying and transformation keys. The transformation keys can be used to generate query tokens for a secure spatial query as well as construct a transformation key tree whose subtree can be distributed by the LBS provider to an authorized user as transformation key for query tokens generation. Furthermore, the proposed scheme constructs a Merkle quad tree (MO-tree) to support integrity verification by aggregating a digest of the spatial data based on the DSC and employing the MQ-tree as a verification structure. The LBS provider can share a subtree of the MO-tree to authorized user as his verification structure, which corresponds to the transformation key of the authorized user. In this way, the authorized user can only generate the valid query tokens and verify the query results in his authorized region. The security properties of the proposed scheme is discussed, and extensive experimental results demonstrate the high efficiency of verification structure generation and verification operations.
引用
收藏
页码:1831 / 1847
页数:17
相关论文
共 50 条
  • [1] Achieving Secure, Universal, and Fine-Grained Query Results Verification for Secure Search Scheme Over Encrypted Cloud Data
    Yin, Hui
    Qin, Zheng
    Zhang, Jixin
    Ou, Lu
    Li, Keqin
    [J]. IEEE TRANSACTIONS ON CLOUD COMPUTING, 2021, 9 (01) : 27 - 39
  • [2] Comment on "Achieving Secure, Universal, and Fine-Grained Query Results Verification for Secure Search Scheme Over Encrypted Cloud Data"
    Qin, Zhiguang
    Wu, Yan
    Xiong, Hu
    [J]. IEEE TRANSACTIONS ON CLOUD COMPUTING, 2021, 9 (04) : 1675 - 1677
  • [3] Fuzzy Keyword Search over Encrypted Cloud Data with Dynamic Fine-grained Access Control
    Shan, Boshen
    Yao, Yuanzhi
    Li, Weihai
    Zuo, Xiaodong
    Yu, Nenghai
    [J]. 2022 IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS, TRUSTCOM, 2022, : 1340 - 1347
  • [4] Lightweight Fine-Grained Multiowner Search over Encrypted Data in Cloud-Edge Computing
    Liu, XueYan
    Huan, LiJuan
    Sun, RuiRui
    Wang, Jing
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2023, 2023
  • [5] Fine-grained Audit Privilege Control for Integrity Audit on Cloud Storage
    Ruan, He-Ming
    Lei, Chin-Laung
    [J]. 2014 NINTH ASIA JOINT CONFERENCE ON INFORMATION SECURITY (ASIA JCIS), 2014, : 156 - 163
  • [6] Achieving fine-grained access control and integrity auditing in cloud storage
    [J]. Yuan, S. (ysm1005@163.com), 1600, Binary Information Press, P.O. Box 162, Bethel, CT 06801-0162, United States (09):
  • [7] A Secure and Efficient Fine-Grained Deletion Approach over Encrypted Data
    Lavania, Kushagra
    Gupta, Gaurang
    Kumar, D. V. N. Siva
    [J]. 2022 IEEE 46TH ANNUAL COMPUTERS, SOFTWARE, AND APPLICATIONS CONFERENCE (COMPSAC 2022), 2022, : 1123 - 1128
  • [8] Fine-Grained Encrypted Image Retrieval in Cloud Environment
    Chen, Yi-Hui
    Huang, Min-Chun
    Liu, Lingfeng
    [J]. MATHEMATICS, 2024, 12 (01)
  • [9] Enabling Efficient and Fine-Grained DNA Similarity Search with Access Control over Encrypted Cloud Data
    Li, Hongwei
    Xu, Guowen
    Tang, Qiang
    Lin, Xiaodong
    Shen, Xuemin
    [J]. WIRELESS ALGORITHMS, SYSTEMS, AND APPLICATIONS (WASA 2018), 2018, 10874 : 236 - 248
  • [10] TF-BIV: Transparent and Fine-grained Binary Integrity Verification in the Cloud
    Jiang, Fangjie
    Cai, Quanwei
    Lin, Jingqiang
    Luo, Bo
    Guan, Le
    Ma, Ziqiang
    [J]. 35TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE (ACSA), 2019, : 57 - 69