An Approach for Efficient and Secure Data Encryption Scheme for Spatial Data

被引:0
|
作者
Reddy N.C.S. [1 ]
Madhuravani B. [1 ]
Sneha D.P. [1 ]
机构
[1] Department of Computer Science and Engineering, MLR Institute of Technology, Dundigal, Hyderabad
关键词
Encryption; Ex-OR operation; Location privacy; Location-based services; Spatial query processing;
D O I
10.1007/s42979-020-0095-8
中图分类号
学科分类号
摘要
This article represents a dynamic grid system (DGS), a privacy grid system defined by the user. This is the primary all-encompassing secure and spatial data satisfying basic essential necessities for confidentiality-securing snapshot and location-based services (LBSs). First, secure and spatial data are responsible for achieving simple matching operation using a semi-trusted third party. The semi-trusted third party has no information about the location of the user. Second, under the defined adversary model, we can provide a secured snapshot and uninterrupted location-based services. Third, not beyond the proximity of the user’s area, the communication cost does not rely on others ideal confidentiality location; it depends on the number of pertinent salient activities. Fourth, despite these things, it has only been targeted on the range and our system that can effectively support different spatial queries without altering the algorithms that are kept running by the semi-reliable third parties and the database servers, given that the spatial query is abstracted into spatial regions within the desired search area. The experimental assessment shows a more efficient approach towards the dynamic grid structure than the progressive confidentiality technique for uninterrupted location-based services. We offer a dual spatial data transformation and encryption scheme in which encrypted requests are executed completely on the encrypted database by the provider, and the user gets encrypted results. To attain services found on their location, location-based services want users to consistently report their locations to a potentially unreliable server which may open them to security risks. Lamentably, there were many restrictions in the existing confidentiality-securing methods for location-based services, such as the trustworthy third party requirement, confidentiality restrictions and high overhead communication. © 2020, Springer Nature Singapore Pte Ltd.
引用
收藏
相关论文
共 50 条
  • [21] Novel secure data protection scheme using Martino homomorphic encryption
    Rupa, Ch.
    Greeshmanth
    Shah, Mohd Asif
    JOURNAL OF CLOUD COMPUTING-ADVANCES SYSTEMS AND APPLICATIONS, 2023, 12 (01):
  • [22] Novel secure data protection scheme using Martino homomorphic encryption
    Ch. Rupa
    Mohd Asif Greeshmanth
    Journal of Cloud Computing, 12
  • [23] A secure and efficient fingerprint images encryption scheme
    Zhao, Song
    Li, Hengjian
    Yan, Xu
    PROCEEDINGS OF THE 9TH INTERNATIONAL CONFERENCE FOR YOUNG COMPUTER SCIENTISTS, VOLS 1-5, 2008, : 2803 - +
  • [24] Secure Cloud Data Encryption
    Shiraishi, Momoko
    2023 2ND ASIA-PACIFIC COMPUTER TECHNOLOGIES CONFERENCE, APCT, 2023, : 34 - 37
  • [25] An Efficient and Secure Data Aggregation Scheme in Smart Grid
    Le, Yiwen
    He, Jinghan
    INTERNATIONAL JOURNAL OF GRID AND DISTRIBUTED COMPUTING, 2017, 10 (01): : 269 - 282
  • [26] A secure data deletion scheme for IoT devices through key derivation encryption and data analysis
    Xiong, Jinbo
    Chen, Lei
    Bhuiyan, Md Zakirul Alam
    Cao, Chunjie
    Wang, Minshen
    Luo, Entao
    Liu, Ximeng
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2020, 111 : 741 - 753
  • [27] An Efficient and Secure Scheme for Dynamic Shared Data in Cloud
    Hussien, Zaid Alaa
    Abduljabbar, Zaid Ameen
    Hussain, Mohammed Abdulridha
    Al Sibahee, Mustafa A.
    Lu, Songfeng
    Al-Asadi, Hamid A.
    PROCEEDINGS OF THE THIRD INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND APPLICATION ENGINEERING (CSAE2019), 2019,
  • [28] A Novel Secure and Efficient Data Aggregation Scheme for IoT
    Li, Ruinian
    Sturtivant, Carl
    Yu, Jiguo
    Cheng, Xiuzhen
    IEEE INTERNET OF THINGS JOURNAL, 2019, 6 (02) : 1551 - 1560
  • [29] An Efficient Scheme for Secure Medical Data Sharing in the Cloud
    Jafarian, Iman
    Khorsandi, Siavash
    ISECURE-ISC INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2023, 15 (03): : 59 - 66
  • [30] Secure and efficient data storage scheme for unstructured data in hybrid cloud environment
    Vulapula, Sridhar Reddy
    Valiveti, Hima Bindu
    SOFT COMPUTING, 2022, 26 (23) : 13145 - 13152