An Approach for Efficient and Secure Data Encryption Scheme for Spatial Data

被引:0
|
作者
Reddy N.C.S. [1 ]
Madhuravani B. [1 ]
Sneha D.P. [1 ]
机构
[1] Department of Computer Science and Engineering, MLR Institute of Technology, Dundigal, Hyderabad
关键词
Encryption; Ex-OR operation; Location privacy; Location-based services; Spatial query processing;
D O I
10.1007/s42979-020-0095-8
中图分类号
学科分类号
摘要
This article represents a dynamic grid system (DGS), a privacy grid system defined by the user. This is the primary all-encompassing secure and spatial data satisfying basic essential necessities for confidentiality-securing snapshot and location-based services (LBSs). First, secure and spatial data are responsible for achieving simple matching operation using a semi-trusted third party. The semi-trusted third party has no information about the location of the user. Second, under the defined adversary model, we can provide a secured snapshot and uninterrupted location-based services. Third, not beyond the proximity of the user’s area, the communication cost does not rely on others ideal confidentiality location; it depends on the number of pertinent salient activities. Fourth, despite these things, it has only been targeted on the range and our system that can effectively support different spatial queries without altering the algorithms that are kept running by the semi-reliable third parties and the database servers, given that the spatial query is abstracted into spatial regions within the desired search area. The experimental assessment shows a more efficient approach towards the dynamic grid structure than the progressive confidentiality technique for uninterrupted location-based services. We offer a dual spatial data transformation and encryption scheme in which encrypted requests are executed completely on the encrypted database by the provider, and the user gets encrypted results. To attain services found on their location, location-based services want users to consistently report their locations to a potentially unreliable server which may open them to security risks. Lamentably, there were many restrictions in the existing confidentiality-securing methods for location-based services, such as the trustworthy third party requirement, confidentiality restrictions and high overhead communication. © 2020, Springer Nature Singapore Pte Ltd.
引用
收藏
相关论文
共 50 条
  • [31] Secure and efficient data storage scheme for unstructured data in hybrid cloud environment
    Sridhar Reddy Vulapula
    Hima Bindu Valiveti
    Soft Computing, 2022, 26 : 13145 - 13152
  • [32] An efficient and forward-secure lattice-based searchable encryption scheme for the Big-data era
    Islam, Sk Hafizul
    Mishra, Nimish
    Biswas, Souvik
    Keswani, Bharat
    Zeadally, Sherali
    COMPUTERS & ELECTRICAL ENGINEERING, 2021, 96
  • [33] A secure and efficient electronic medical record data sharing scheme based on blockchain and proxy re-encryption
    Guijiang Liu
    Haibo Xie
    Wenming Wang
    Haiping Huang
    Journal of Cloud Computing, 13
  • [34] A secure and efficient electronic medical record data sharing scheme based on blockchain and proxy re-encryption
    Liu, Guijiang
    Xie, Haibo
    Wang, Wenming
    Huang, Haiping
    JOURNAL OF CLOUD COMPUTING-ADVANCES SYSTEMS AND APPLICATIONS, 2024, 13 (01):
  • [35] An enhanced secure, robust and efficient crypto scheme for ensuring data privacy in public cloud using obfuscation & encryption
    Yakobu D.
    Kalluri H.K.
    Dondeti V.
    Ingenierie des Systemes d'Information, 2019, 24 (06): : 603 - 609
  • [36] An Efficient Searchable Symmetric Encryption Scheme for Smart Grid Data
    Xiong, Hongyan
    Wu, Ting
    Qi, Yongxing
    Shen, Yanzhao
    Zhu, Yani
    Zhang, Peng
    Dong, Xinfeng
    SECURITY AND COMMUNICATION NETWORKS, 2022, 2022
  • [37] An Efficient Commutative Encryption and Data Hiding Scheme for HEVC Video
    Guan, Bo
    Xu, Dawen
    Li, Qian
    IEEE ACCESS, 2020, 8 : 60232 - 60245
  • [38] Asymmetric Encryption Based Secure and Efficient Data Gathering Technique in VANET
    Malik, Arun
    Pandey, Babita
    PROCEEDINGS OF THE 7TH INTERNATIONAL CONFERENCE ON CLOUD COMPUTING, DATA SCIENCE AND ENGINEERING (CONFLUENCE 2017), 2017, : 369 - 372
  • [39] A novel energy-efficient encryption algorithm for secure data in WSNs
    Haythem Hayouni
    Mohamed Hamdi
    The Journal of Supercomputing, 2021, 77 : 4754 - 4777
  • [40] Secure, Efficient and Dynamic Data Search using Searchable Symmetric Encryption
    Shaikh, Mohammed Saad
    Bavishi, Jatna
    Patel, Reema
    PROCEEDINGS OF 2020 5TH INTERNATIONAL CONFERENCE ON CLOUD COMPUTING AND ARTIFICIAL INTELLIGENCE: TECHNOLOGIES AND APPLICATIONS (CLOUDTECH'20), 2020, : 246 - 252