An Approach for Efficient and Secure Data Encryption Scheme for Spatial Data

被引:0
|
作者
Reddy N.C.S. [1 ]
Madhuravani B. [1 ]
Sneha D.P. [1 ]
机构
[1] Department of Computer Science and Engineering, MLR Institute of Technology, Dundigal, Hyderabad
关键词
Encryption; Ex-OR operation; Location privacy; Location-based services; Spatial query processing;
D O I
10.1007/s42979-020-0095-8
中图分类号
学科分类号
摘要
This article represents a dynamic grid system (DGS), a privacy grid system defined by the user. This is the primary all-encompassing secure and spatial data satisfying basic essential necessities for confidentiality-securing snapshot and location-based services (LBSs). First, secure and spatial data are responsible for achieving simple matching operation using a semi-trusted third party. The semi-trusted third party has no information about the location of the user. Second, under the defined adversary model, we can provide a secured snapshot and uninterrupted location-based services. Third, not beyond the proximity of the user’s area, the communication cost does not rely on others ideal confidentiality location; it depends on the number of pertinent salient activities. Fourth, despite these things, it has only been targeted on the range and our system that can effectively support different spatial queries without altering the algorithms that are kept running by the semi-reliable third parties and the database servers, given that the spatial query is abstracted into spatial regions within the desired search area. The experimental assessment shows a more efficient approach towards the dynamic grid structure than the progressive confidentiality technique for uninterrupted location-based services. We offer a dual spatial data transformation and encryption scheme in which encrypted requests are executed completely on the encrypted database by the provider, and the user gets encrypted results. To attain services found on their location, location-based services want users to consistently report their locations to a potentially unreliable server which may open them to security risks. Lamentably, there were many restrictions in the existing confidentiality-securing methods for location-based services, such as the trustworthy third party requirement, confidentiality restrictions and high overhead communication. © 2020, Springer Nature Singapore Pte Ltd.
引用
收藏
相关论文
共 50 条
  • [1] Efficient and Secure Data Retrieval Scheme Using Searchable Encryption in Cloud Storage
    Xu, Lei
    Xu, Chungen
    2015 INTERNATIONAL SYMPOSIUM ON SECURITY AND PRIVACY IN SOCIAL NETWORKS AND BIG DATA (SOCIALSEC 2015), 2015, : 15 - 21
  • [2] A hybrid encryption approach for efficient and secure data transmission in IoT devices
    Zhang, Limin
    Wang, Li
    Journal of Engineering and Applied Science, 2024, 71 (01):
  • [3] Hybrid Encryption Scheme (HES): An Approach for Transmitting Secure Data over Internet
    Singh, Rashmi
    Panchbhaiya, Isha
    Pandey, Abhishek
    Goudar, R. H.
    INTERNATIONAL CONFERENCE ON COMPUTER, COMMUNICATION AND CONVERGENCE (ICCC 2015), 2015, 48 : 51 - 57
  • [4] An enhanced searchable encryption scheme for secure data outsourcing
    Rui ZHANG
    Jiabei WANG
    Zishuai SONG
    Xi WANG
    Science China(Information Sciences), 2020, 63 (03) : 120 - 139
  • [5] An enhanced searchable encryption scheme for secure data outsourcing
    Rui Zhang
    Jiabei Wang
    Zishuai Song
    Xi Wang
    Science China Information Sciences, 2020, 63
  • [6] An enhanced searchable encryption scheme for secure data outsourcing
    Zhang, Rui
    Wang, Jiabei
    Song, Zishuai
    Wang, Xi
    SCIENCE CHINA-INFORMATION SCIENCES, 2020, 63 (03)
  • [7] SES2: A Secure and Efficient Symmetric Searchable Encryption Scheme for Structured Data
    Gong, Yanwei
    Chang, Xiaolin
    Misic, Jelena
    Misic, Vojislav B.
    Yao, Yingying
    Wang, Liwei
    IEEE CONFERENCE ON GLOBAL COMMUNICATIONS, GLOBECOM, 2023, : 2190 - 2195
  • [8] A Fully Secure Spatial Encryption Scheme
    Moriyama, Daisuke
    Doi, Hiroshi
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2011, E94A (01) : 28 - 35
  • [9] An Efficient Scheme of Authenticated Encryption with Associated Data
    Zhang, Shaolan
    Xing, Guobo
    Yang, Yixian
    2010 CHINESE CONTROL AND DECISION CONFERENCE, VOLS 1-5, 2010, : 4217 - +
  • [10] Efficient and Provably-Secure Certificateless Proxy Re-encryption Scheme for Secure Cloud Data Sharing
    王亮亮
    陈克非
    毛贤平
    王永涛
    Journal of Shanghai Jiaotong University(Science), 2014, 19 (04) : 398 - 405