Match!

MixGeo: efficient secure range queries on encrypted dense spatial data in the cloud

Published on Jun 24, 2019
· DOI :10.1145/3326285.3329064
Ruoyang Guo1
Estimated H-index: 1
(RUC: Renmin University of China),
Bo Qin1
Estimated H-index: 1
(RUC: Renmin University of China)
+ 3 AuthorsCuiping Li10
Estimated H-index: 10
(RUC: Renmin University of China)
Abstract
As the location-based applications are flourishing, we will witness soon a prodigious amount of spatial data will be stored in the public cloud with the geometric range query as one of the most fundamental search functions. The rising demand of outsourced data is moving larger-scale datasets and wider-scope query size. To protect the confidentiality of the geographic information of individuals, the outsourced data stored at the cloud server should be preserved especially when they are queried. While the problem of secure range query on outsourced encrypted data has been extensively studied, the current schemes are far from the practice in terms of efficiency and scalability. In this paper, we propose a novel solution based on Geohash and predicate symmetric searchable encryption for secure range queries named as MixGeo. We present a multi-level indexes structure tailored for efficient and large-scale spatial data lookup in the cloud server while preserving data privacy. Our experiment on a real-world spatial dataset in the cloud environment shows that it only takes less than 0.1s for once update operation over 65,128 encrypted dense data and is over 100 times faster than the existing solutions.
  • References (32)
  • Citations (2)
📖 Papers frequently viewed together
8 Citations
2017
6 Citations
1 Citations
78% of Scinapse members use related papers. After signing in, all features are FREE.
References32
Newest
#1Guowen Xu (University of Electronic Science and Technology of China)H-Index: 7
#2Hongwei Li (University of Electronic Science and Technology of China)H-Index: 21
Last. Xiaodong Lin (WLU: Wilfrid Laurier University)H-Index: 50
view all 5 authors...
As a basic query function, range query has been exploited in many scenarios such as SQL retrieves, location-based services, and computational geometry. Meanwhile, with explosive growth of data volume, users are increasingly inclining to store data on the cloud for saving local storage and computational cost. However, a long-standing problem is that the user’s data may be completely revealed to the cloud server because it has full data access right. To cope with this problem, a frequently-used me...
39 CitationsSource
#1Boyang Wang (UA: University of Arizona)H-Index: 16
#2Ming Li (UA: University of Arizona)H-Index: 32
Last. Li Xiong (Emory University)H-Index: 31
view all 3 authors...
Spatial data have wide applications, e.g., location-based services, and geometric range queries (i.e., finding points inside geometric areas, e.g., circles or polygons) are one of the fundamental search functions over spatial data. The rising demand of outsourcing data is moving large-scale datasets, including large-scale spatial datasets, to public clouds. Meanwhile, due to the concern of insider attackers and hackers on public clouds, the privacy of spatial datasets should be cautiously preser...
8 CitationsSource
Jun 14, 2017 in IWQoS (International Workshop on Quality of Service)
#1Yuchuan Luo (National University of Defense Technology)H-Index: 5
#2Shaojing Fu (National University of Defense Technology)H-Index: 7
Last. Xiaohua Jia (CityU: City University of Hong Kong)H-Index: 49
view all 5 authors...
With cloud services, users can easily host their data in the cloud and retrieve the part needed by search. Searchable encryption is proposed to conduct such process in a privacy-preserving way, which allows a cloud server to perform search over the encrypted data in the cloud according to the search token submitted by the user. However, existing works mainly focus on textual data and merely take numerical spatial data into account. Especially, geometric range search is an important queries on sp...
3 CitationsSource
Apr 19, 2017 in ICDE (International Conference on Data Engineering)
#1Mohamed SarwatH-Index: 13
#2Yuhan SunH-Index: 3
Thanks to the wide spread use of mobile and wearable devices, popular social networks, e.g., Facebook, prompts users to add spatial attributes to social entities, e.g., check-ins, traveling posts, and geotagged photos, leading to what is known as, The GeoSocial Graph. In such graph, usersmay issue a Reachability Query with Spatial Range Predicate (abbr. RangeReach). RangeReach finds whether an input vertex can reach any spatial vertex that lies within an input spatial range. The paper proposes G...
4 CitationsSource
#1Hua ZhangH-Index: 11
#2Ziqing GuoH-Index: 1
Last. Qiao-Yan WenH-Index: 41
view all 4 authors...
1 CitationsSource
#1Hui Zhu (Xidian University)H-Index: 11
#2Rongxing Lu (NTU: Nanyang Technological University)H-Index: 58
Last. Hui Li (Xidian University)H-Index: 39
view all 5 authors...
With the pervasiveness of location-aware mobile electronic devices and the advances of wireless communications, location-based services (LBS), which can help people enjoy a convenient life, has attracted considerable interest recently. However, the privacy issues of LBS are still challenging today. Aiming at the challenges, in this paper, we present a new efficient and privacy-preserving LBS query scheme in outsourced cloud, i.e., EPQ, for pervasive smartphones. In the EPQ scheme, the LBS provid...
30 CitationsSource
#1Hongwei Li (University of Electronic Science and Technology of China)H-Index: 21
#2Yi Yang (University of Electronic Science and Technology of China)H-Index: 3
Last. Xuemin Shen (UW: University of Waterloo)H-Index: 85
view all 6 authors...
Using cloud computing, individuals can store their data on remote servers and allow data access to public users through the cloud servers. As the outsourced data are likely to contain sensitive privacy information, they are typically encrypted before uploaded to the cloud. This, however, significantly limits the usability of outsourced data due to the difficulty of searching over the encrypted data. In this paper, we address this issue by developing the fine-grained multi-keyword search schemes ...
156 CitationsSource
#1Boyang Wang (UA: University of Arizona)H-Index: 16
#2Ming Li (UA: University of Arizona)H-Index: 32
Last. Haitao Wang (USU: Utah State University)H-Index: 13
view all 3 authors...
Geometric range search is a fundamental primitive for spatial data analysis in SQL and NoSQL databases. It has extensive applications in location-based services, computer-aided design, and computational geometry. Due to the dramatic increase in data size, it is necessary for companies and organizations to outsource their spatial data sets to third-party cloud services (e.g., Amazon) in order to reduce storage and query processing costs, but, meanwhile, with the promise of no privacy leakage to t...
46 CitationsSource
#1Zhihua Xia (NUIST: Nanjing University of Information Science and Technology)H-Index: 13
#2Xinhui Wang (NUIST: Nanjing University of Information Science and Technology)H-Index: 4
Last. Qian Wang (WHU: Wuhan University)H-Index: 33
view all 4 authors...
Due to the increasing popularity of cloud computing, more and more data owners are motivated to outsource their data to cloud servers for great convenience and reduced cost in data management. However, sensitive data should be encrypted before outsourcing for privacy requirements, which obsoletes data utilization like keyword-based document retrieval. In this paper, we present a secure multi-keyword ranked search scheme over encrypted cloud data, which simultaneously supports dynamic update oper...
723 CitationsSource
Dec 7, 2015 in CNS (Communications and Networking Symposium)
#1Boyang Wang (USU: Utah State University)H-Index: 16
#2Ming Li (USU: Utah State University)H-Index: 32
Last. Hui Li (Xidian University)H-Index: 39
view all 4 authors...
Searchable encryption is a promising technique enabling meaningful search operations to be performed on encrypted databases while protecting user privacy from untrusted third-party service providers. However, while most of the existing works focus on common SQL queries, geometric queries on encrypted spatial data have not been well studied. Especially, circular range search is an important type of geometric query on spatial data which has wide applications, such as proximity testing in Location-...
15 CitationsSource
Cited By2
Newest
#1Gabriel Ghinita (University of Massachusetts Boston)H-Index: 28
#2Kien Nguyen (SC: University of Southern California)H-Index: 2
Last. Cyrus Shahabi (SC: University of Southern California)H-Index: 52
view all 4 authors...
Monitoring location updates from mobile users has important applications in many areas, ranging from public health (e g , COVID-19 contact tracing) and national security to social networks and advertising However, sensitive information can be derived from movement patterns, thus protecting the privacy of mobile users is a major concern Users may only be willing to disclose their locations when some condition is met, for instance in proximity of a disaster area or an event of interest Currently, ...
Source
#1Gabriel Ghinita (University of Massachusetts Boston)H-Index: 28
#2Kien C. NguyenH-Index: 6
Last. Cyrus Shahabi (SC: University of Southern California)H-Index: 52
view all 4 authors...
Monitoring location updates from mobile users has important applications in many areas, ranging from public safety and national security to social networks and advertising. However, sensitive information can be derived from movement patterns, thus protecting the privacy of mobile users is a major concern. Users may only be willing to disclose their locations when some condition is met, for instance in proximity of a disaster area or an event of interest. Currently, such functionality can be achi...