Skip to main content
Top

2018 | OriginalPaper | Chapter

Efficient and Privacy-Preserving Query on Outsourced Spherical Data

Authors : Yueyue Zhou, Tao Xiang, Xiaoguo Li

Published in: Algorithms and Architectures for Parallel Processing

Publisher: Springer International Publishing

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Outsourcing spatial database to the cloud becomes a paradigm for many applications such as location-bases service (LBS). At the same time, the security of outsourced data and its query becomes a serious issue. In this paper, we consider 3D spherical data that has wide applications in geometric information systems (GIS), and investigate its privacy-preserving query problem. By using an approximately distance-preserving 3D-2D projection method, we first project 3D spatial points to six possible 2D planes. Then we utilize secure Hilbert space-filling curve to encode the 2D points into 1D Hilbert values. After that, we build an encrypted spatial index tree using B\(^+\)-tree and order-preserving encryption (OPE). Our scheme supports efficient point query, arbitrary polygon query, as well as dynamic updating in the encrypted domain. Theoretical analysis and experimental results on real-word datasets demonstrate its satisfactory tradeoff between security and efficiency.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
4.
go back to reference Agrawal, R., Kiernan, J., Srikant, R., Xu, Y.: Order preserving encryption for numeric data. In: Proceedings of ACM SIGMOD International Conference on Management of Data (SIGMOD), pp. 563–574 (2004) Agrawal, R., Kiernan, J., Srikant, R., Xu, Y.: Order preserving encryption for numeric data. In: Proceedings of ACM SIGMOD International Conference on Management of Data (SIGMOD), pp. 563–574 (2004)
6.
7.
go back to reference Kamel, I., Talha, A.M., Aghbari, Z.A.: Dynamic spatial index for efficient query processing on the cloud. J. Cloud Comput. 6(1), 5 (2017)CrossRef Kamel, I., Talha, A.M., Aghbari, Z.A.: Dynamic spatial index for efficient query processing on the cloud. J. Cloud Comput. 6(1), 5 (2017)CrossRef
9.
go back to reference Kim, H.I., Hong, S.T., Chang, J.W.: Hilbert-curve based cryptographic transformation scheme for protecting data privacy on outsourced private spatial data, pp. 77–82 (2014) Kim, H.I., Hong, S.T., Chang, J.W.: Hilbert-curve based cryptographic transformation scheme for protecting data privacy on outsourced private spatial data, pp. 77–82 (2014)
10.
11.
go back to reference Lewi, K., Wu, D.J.: Order-revealing encryption: new constructions, applications, and lower bounds. In: Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, pp. 1167–1178 (2016) Lewi, K., Wu, D.J.: Order-revealing encryption: new constructions, applications, and lower bounds. In: Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, pp. 1167–1178 (2016)
12.
go back to reference Lung, M.Y., Ghinita, G., Jensen, C.S., Kalnis, P.: Outsourcing search services on private spatial data, pp. 1140–1143 (2009) Lung, M.Y., Ghinita, G., Jensen, C.S., Kalnis, P.: Outsourcing search services on private spatial data, pp. 1140–1143 (2009)
13.
go back to reference Lung, M.Y., Ghinita, G., Jensen, C.S., Kalnis, P.: Enabling search services on outsourced private spatial data. VLDB J. 19(3), 363–384 (2010)CrossRef Lung, M.Y., Ghinita, G., Jensen, C.S., Kalnis, P.: Enabling search services on outsourced private spatial data. VLDB J. 19(3), 363–384 (2010)CrossRef
14.
go back to reference Luo, Y., Fu, S., Wang, D., Xu, M., Jia, X.: Efficient and generalized geometric range search on encrypted spatial data in the cloud. In: IEEE/ACM Conference on Quality of Service (IWQoS), pp. 1–10 (2017) Luo, Y., Fu, S., Wang, D., Xu, M., Jia, X.: Efficient and generalized geometric range search on encrypted spatial data in the cloud. In: IEEE/ACM Conference on Quality of Service (IWQoS), pp. 1–10 (2017)
15.
go back to reference Ren, H., Li, H., Chen, H., Kpiebaareh, M., Zhao, L.: Efficient privacy-preserving circular range search on outsourced spatial data. In: IEEE Conference on Communications (ICC), pp. 1–7 (2016) Ren, H., Li, H., Chen, H., Kpiebaareh, M., Zhao, L.: Efficient privacy-preserving circular range search on outsourced spatial data. In: IEEE Conference on Communications (ICC), pp. 1–7 (2016)
16.
go back to reference Talha, A.M., Kamel, I., Aghbari, Z.A.: Enhancing confidentiality and privacy of outsourced spatial data, pp. 13–18 (2015) Talha, A.M., Kamel, I., Aghbari, Z.A.: Enhancing confidentiality and privacy of outsourced spatial data, pp. 13–18 (2015)
17.
go back to reference Wang, B., Li, M., Wang, H., Li, H.: Circular range search on encrypted spatial data. In: IEEE Conference on Distributed Computing Systems (ICDCS), pp. 794–795 (2015) Wang, B., Li, M., Wang, H., Li, H.: Circular range search on encrypted spatial data. In: IEEE Conference on Distributed Computing Systems (ICDCS), pp. 794–795 (2015)
18.
go back to reference Yi, X., Paulet, R., Bertino, E., Varadharajan, V.: Practical approximate k nearest neighbor queries with location and query privacy. IEEE Trans. Knowl. Data Eng. 28(6), 1546–1559 (2016)CrossRef Yi, X., Paulet, R., Bertino, E., Varadharajan, V.: Practical approximate k nearest neighbor queries with location and query privacy. IEEE Trans. Knowl. Data Eng. 28(6), 1546–1559 (2016)CrossRef
19.
go back to reference Zhu, H., Liu, F., Li, H.: Efficient and privacy-preserving polygons spatial query framework for location-based services. IEEE Internet Things J. 4(2), 536–545 (2017)CrossRef Zhu, H., Liu, F., Li, H.: Efficient and privacy-preserving polygons spatial query framework for location-based services. IEEE Internet Things J. 4(2), 536–545 (2017)CrossRef
20.
go back to reference Zhu, H., Lu, R., Huang, C., Chen, L., Li, H.: An efficient privacy-preserving location-based services query scheme in outsourced cloud. IEEE Trans. Veh. Technol. 65(9), 7729–7739 (2016)CrossRef Zhu, H., Lu, R., Huang, C., Chen, L., Li, H.: An efficient privacy-preserving location-based services query scheme in outsourced cloud. IEEE Trans. Veh. Technol. 65(9), 7729–7739 (2016)CrossRef
Metadata
Title
Efficient and Privacy-Preserving Query on Outsourced Spherical Data
Authors
Yueyue Zhou
Tao Xiang
Xiaoguo Li
Copyright Year
2018
DOI
https://doi.org/10.1007/978-3-030-05063-4_12

Premium Partner