An Approach for Efficient and Secure Data Encryption Scheme for Spatial Data

被引:0
|
作者
Reddy N.C.S. [1 ]
Madhuravani B. [1 ]
Sneha D.P. [1 ]
机构
[1] Department of Computer Science and Engineering, MLR Institute of Technology, Dundigal, Hyderabad
关键词
Encryption; Ex-OR operation; Location privacy; Location-based services; Spatial query processing;
D O I
10.1007/s42979-020-0095-8
中图分类号
学科分类号
摘要
This article represents a dynamic grid system (DGS), a privacy grid system defined by the user. This is the primary all-encompassing secure and spatial data satisfying basic essential necessities for confidentiality-securing snapshot and location-based services (LBSs). First, secure and spatial data are responsible for achieving simple matching operation using a semi-trusted third party. The semi-trusted third party has no information about the location of the user. Second, under the defined adversary model, we can provide a secured snapshot and uninterrupted location-based services. Third, not beyond the proximity of the user’s area, the communication cost does not rely on others ideal confidentiality location; it depends on the number of pertinent salient activities. Fourth, despite these things, it has only been targeted on the range and our system that can effectively support different spatial queries without altering the algorithms that are kept running by the semi-reliable third parties and the database servers, given that the spatial query is abstracted into spatial regions within the desired search area. The experimental assessment shows a more efficient approach towards the dynamic grid structure than the progressive confidentiality technique for uninterrupted location-based services. We offer a dual spatial data transformation and encryption scheme in which encrypted requests are executed completely on the encrypted database by the provider, and the user gets encrypted results. To attain services found on their location, location-based services want users to consistently report their locations to a potentially unreliable server which may open them to security risks. Lamentably, there were many restrictions in the existing confidentiality-securing methods for location-based services, such as the trustworthy third party requirement, confidentiality restrictions and high overhead communication. © 2020, Springer Nature Singapore Pte Ltd.
引用
收藏
相关论文
共 50 条
  • [41] A novel energy-efficient encryption algorithm for secure data in WSNs
    Hayouni, Haythem
    Hamdi, Mohamed
    JOURNAL OF SUPERCOMPUTING, 2021, 77 (05): : 4754 - 4777
  • [42] An Efficient and Secure Big Data Storage in Cloud Environment by Using Triple Data Encryption Standard
    Ramachandra, Mohan Naik
    Srinivasa Rao, Madala
    Lai, Wen Cheng
    Parameshachari, Bidare Divakarachari
    Ananda Babu, Jayachandra
    Hemalatha, Kivudujogappa Lingappa
    BIG DATA AND COGNITIVE COMPUTING, 2022, 6 (04)
  • [43] A verifiable fully homomorphic encryption scheme to secure big data in cloud computing
    El-Yahyaoui, Ahmed
    Ech-Chrif El Kettani, Mohamed Dafir
    2017 INTERNATIONAL CONFERENCE ON WIRELESS NETWORKS AND MOBILE COMMUNICATIONS (WINCOM), 2017, : 250 - 254
  • [44] A secure data fitting scheme based on CKKS homomorphic encryption for medical IoT
    Su, Yunxuan
    Xu An Wang
    Du, Weidong
    Ge, Yu
    Zhao, Kaiyang
    Lv, Ming
    JOURNAL OF HIGH SPEED NETWORKS, 2023, 29 (01) : 41 - 56
  • [45] An Encryption Scheme for Smart Home Data Link Based on Secure SD Card
    Liu, Hong Wei
    Zhang, Hong
    FRONTIERS OF MANUFACTURING SCIENCE AND MEASURING TECHNOLOGY V, 2015, : 1145 - 1150
  • [46] A New Secure and Lightweight Searchable Encryption Scheme over Encrypted Cloud Data
    Tahir, Shahzaib
    Ruj, Sushmita
    Rahulamathavan, Yogachandran
    Rajarajan, Muttukrishnan
    Glackin, Cornelius
    IEEE TRANSACTIONS ON EMERGING TOPICS IN COMPUTING, 2019, 7 (04) : 530 - 544
  • [47] A secure re-encryption scheme for data services in a cloud computing environment
    Xiong, Lizhi
    Xu, Zhengquan
    Xu, Yanyan
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2015, 27 (17): : 4573 - 4585
  • [48] A Secure Re-Encryption Scheme for Data Sharing in Unreliable Cloud Environment
    Sultan, Nazatul Haque
    Barbhuiya, Ferdous Ahmed
    PROCEEDINGS 2016 IEEE WORLD CONGRESS ON SERVICES - SERVICES 2016, 2016, : 75 - 80
  • [49] An efficient and secure data sharing scheme for cloud data using hash based quadraplet wavelet permuted cryptography approach
    Lakshmanan, Selvam
    Manimozhi, Braveen
    Ramachandran, Venkatesan
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2022, 34 (27):
  • [50] An Efficient Approach for Increasing Security to Symmetric Data Encryption
    Islam, Muhammad Nazrul
    Mia, Md. Monir Hossain
    Islam, Md. Foizul
    Matin, M. A.
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2008, 8 (04): : 16 - 20