A location privacy protection method based on cipher-text retrieval in cloud environment

被引:2
|
作者
Zhang, Yongbing [1 ,2 ]
Zhang, Qiuyu [1 ]
Jiang, Yilong [2 ]
Yan, Yan [1 ]
机构
[1] Lanzhou Univ Technol, Sch Comp & Commun, 287 Lan Gong Ping Rd, Lanzhou 730050, Peoples R China
[2] Gansu Inst Mech & Elect Engn, Tianshui, Gansu, Peoples R China
基金
美国国家科学基金会;
关键词
cipher-text retrieval; location privacy protection; location-based service; Morton code; top-k sorting; SERVICES;
D O I
10.1002/spy2.250
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In order to improve the efficiency of location query and the effect of privacy protection in cloud environment, a location privacy protection method based on cipher-text retrieval was proposed. Firstly, the spatial area is divided into several square grids, and the big Morton code of each location is calculated, the spatial area in the grid is divided again, and the small Morton code of each location is calculated. Secondly, the location data is encrypted by the combination of public key encryption and scrambling encryption, and then outsourced to the cloud server. When querying the location data of the interest points, the query request is sent to the data owner. After obtaining the query trapdoor and the private key, the query trapdoor is sent to the location data server for query. On the server side, the interest points in the region are found according to the cipher-text matching, and the cipher-text top-k sorting is implemented. Finally, the cipher-text query results are decrypted into plaintext by the private key. Experimental results show that the proposed method ensures the location data privacy, and improves query efficiency. At the same time, the balance between privacy protection security and query quality is achieved.
引用
收藏
页数:15
相关论文
共 50 条
  • [1] Hidden Hierarchy Based on Cipher-Text Attribute Encryption for IoT Data Privacy in Cloud
    Ibrahim, Zaid Abdulsalam
    Ilyas, Muhammad
    [J]. CMC-COMPUTERS MATERIALS & CONTINUA, 2023, 76 (01): : 939 - 956
  • [2] Location privacy protection method based on attribute-based privacy information retrieval
    Du, Gang
    Zhang, Lei
    Ma, Chunguang
    Zhang, Guoyin
    [J]. Harbin Gongcheng Daxue Xuebao/Journal of Harbin Engineering University, 2021, 42 (05): : 680 - 686
  • [3] A privacy-preserving content-based image retrieval method in cloud environment
    Xu, Yanyan
    Gong, Jiaying
    Xiong, Lizhi
    Xu, Zhengquan
    Wang, Jinwei
    Shi, Yun-qing
    [J]. JOURNAL OF VISUAL COMMUNICATION AND IMAGE REPRESENTATION, 2017, 43 : 164 - 172
  • [4] Research on Cloud-Based LBS and Location Privacy Protection
    Yan, Yan
    Wang, Wan Jun
    [J]. INDUSTRIAL ENGINEERING, MACHINE DESIGN AND AUTOMATION (IEMDA 2014) & COMPUTER SCIENCE AND APPLICATION (CCSA 2014), 2015, : 9 - 15
  • [5] A dynamic location privacy protection scheme based on Cloud storage
    Li, Li
    Lv, Zhengjuan
    Tong, Xiaohong
    Shi, Runhua
    [J]. International Journal of Network Security, 2019, 21 (05): : 828 - 834
  • [6] A Secure k-nearest Neighbor Query Processing Method Based on Extended Range of Cipher-Text Search
    Zhang, Yong-Bing
    Zhang, Qiu-Yu
    Jiang, Yi-Long
    Yang, Jun
    [J]. International Journal of Network Security, 2022, 24 (05): : 913 - 921
  • [7] BASED ON THE CHARACTER OF CLOUD STORAGE STRING ENCRYPTION AND CIPHER TEXT RETRIEVAL OF STRING RESEARCH
    Zhu, Hongliang
    Liu, Wenhan
    Wang, Jing
    Xin, Yang
    [J]. PROCEEDINGS OF 2016 4TH IEEE INTERNATIONAL CONFERENCE ON CLOUD COMPUTING AND INTELLIGENCE SYSTEMS (IEEE CCIS 2016), 2016, : 409 - 413
  • [8] Protection of Privacy Data in a Cloud Environment
    Chen, Jeang-Kuo
    Chang, Fang-Sheng
    [J]. INTELLIGENT SYSTEMS AND APPLICATIONS (ICS 2014), 2015, 274 : 964 - 971
  • [9] Research and Implementation of Security Cipher-text Clustered Index Based on B plus Tree
    Zhang, Kejun
    Zhang, Guoliang
    Jiang, Chen
    Yang, Yunsong
    [J]. 2016 INTERNATIONAL CONFERENCE ON NETWORK AND INFORMATION SYSTEMS FOR COMPUTERS (ICNISC), 2016, : 274 - 278
  • [10] A Privacy-preserving Image Retrieval Method Based on Improved BoVW Model in Cloud Environment
    Gong, Jiaying
    Xu, Yanyan
    Zhao, Xiao
    [J]. IETE TECHNICAL REVIEW, 2018, 35 : 76 - 84