A Bitmap based Data Encryption Scheme in Cloud Computing

被引:0
|
作者
Yoon, Min [1 ]
Jang, Miyoung [1 ]
Shin, Young-Sung [1 ]
Chang, Jae-Woo [1 ]
机构
[1] Chonbuk Natl Univ, Dept Comp Engn, Jeonju 561756, South Korea
关键词
cloud computing; location data protection; grid index; outsourced databases; density aware;
D O I
10.14257/ijsia.2015.9.5.34
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the development of cloud computing, the interest on spatial database outsourcing has been sharply increasing. Therefore, researches on data encryption methods for protecting location data privacy in outsourced databases have been actively performed. However, the existing data encryption schemes do not consider data distribution when generating data clusters and they use a tree-based index for processing k-nearest neighbor queries. As a result, the performance of query processing algorithm can fluctuate depending on the tree depth. To solve these problems, we propose a density-aware data encryption scheme and a query processing algorithm for database outsourcing. Our density-aware data encryption scheme uses a grid index to generate clusters and transforms the original data information into a bitmap. To provide efficient query processing, we use an algebraic coding based hash index to reduce the data retrieval time. Finally, in performance analysis, we show that the proposed scheme provides better query processing performance and guarantees the privacy of users, compared with the existing schemes.
引用
收藏
页码:345 / 359
页数:15
相关论文
共 50 条
  • [1] Identity Based Encryption and Biometric Authentication Scheme for Secure Data Access in Cloud Computing
    Cheng Hongbing
    Rong Chunming
    Tan Zhenghua
    Zeng Qingkai
    [J]. CHINESE JOURNAL OF ELECTRONICS, 2012, 21 (02) : 254 - 259
  • [2] Policy Based on Homomorphic Encryption and Retrieval Scheme in Cloud Computing
    Ding, Yong
    Li, Xiumin
    [J]. 2017 IEEE INTERNATIONAL CONFERENCE ON COMPUTATIONAL SCIENCE AND ENGINEERING (CSE) AND IEEE/IFIP INTERNATIONAL CONFERENCE ON EMBEDDED AND UBIQUITOUS COMPUTING (EUC), VOL 1, 2017, : 568 - 571
  • [3] Homomorphic Cloud Computing Scheme Based on Hybrid Homomorphic Encryption
    Song, Xidan
    Wang, Yulin
    [J]. PROCEEDINGS OF 2017 3RD IEEE INTERNATIONAL CONFERENCE ON COMPUTER AND COMMUNICATIONS (ICCC), 2017, : 2450 - 2453
  • [4] A cross encryption scheme for data security storage in cloud computing environment
    Kang, Haiyan
    Deng, Jie
    [J]. INTERNATIONAL JOURNAL OF INTERNET PROTOCOL TECHNOLOGY, 2023, 16 (01) : 1 - 10
  • [5] A Speech Homomorphic Encryption Scheme with Less Data Expansion in Cloud Computing
    Shi, Canghong
    Wang, Hongxia
    Hu, Yi
    Qian, Qing
    Zhao, Hong
    [J]. KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2019, 13 (05): : 2588 - 2609
  • [6] An environmental monitoring data sharing scheme based on attribute encryption in cloud-fog computing
    Yang, Xiaodong
    Xi, Wanting
    Chen, Aijia
    Wang, Caifen
    [J]. PLOS ONE, 2021, 16 (09):
  • [7] Security analyses of a data collaboration scheme with hierarchical attribute-based encryption in cloud computing
    Tai, Wei-Liang
    Chang, Ya-Fen
    Huang, Wen-Hsin
    [J]. International Journal of Network Security, 2020, 22 (02): : 212 - 217
  • [8] Secure scheme on mobile multi cloud computing based on homomorphic encryption
    Zkik, Karim
    Orhanou, Ghizlane
    El Hajji, Said
    [J]. 2016 INTERNATIONAL CONFERENCE ON ENGINEERING & MIS (ICEMIS), 2016,
  • [9] A verifiable fully homomorphic encryption scheme to secure big data in cloud computing
    El-Yahyaoui, Ahmed
    Ech-Chrif El Kettani, Mohamed Dafir
    [J]. 2017 INTERNATIONAL CONFERENCE ON WIRELESS NETWORKS AND MOBILE COMMUNICATIONS (WINCOM), 2017, : 250 - 254
  • [10] A Density-aware Data Encryption Scheme for Outsourced Databases in Cloud Computing
    Yoon, Min
    Jang, Miyoung
    Shin, Young-Sung
    Chang, Jae-Woo
    [J]. 2014 IEEE INTERNATIONAL CONFERENCE ON HIGH PERFORMANCE COMPUTING AND COMMUNICATIONS, 2014 IEEE 6TH INTL SYMP ON CYBERSPACE SAFETY AND SECURITY, 2014 IEEE 11TH INTL CONF ON EMBEDDED SOFTWARE AND SYST (HPCC,CSS,ICESS), 2014, : 1097 - 1104