LS-RQ: A Lightweight and Forward-Secure Range Query on Geographically Encrypted Data
نویسندگان
چکیده
In the era of cloud computing, to achieve convenient location-based service (LBS), consumers such as users, companies, and organizations prefer subcontracting massive geographical data public clouds after encryption for privacy security. However, numerous harmful cyber-attacks happen on those in an unpredicted hourly manner. To alleviate concerns, various secure query schemes encrypted have been proposed literature. As a fundamental LBSs, forward-secure range has not well investigated. address this issue, we propose lightweight (LS-RQ) geographically data, which soundly balances between security efficiency. Promisingly, design index mechanism manage clouds, while compromising data. Moreover, our LS-RQ provide approach on-the-fly. We also rigorously prove that is forward-secure. Finally, extensive experimental studies are performed both real synthetic datasets. By observation, highly efficient realistic environments. Particularly, datasets with about 1000000 solution takes strictly less than second.
منابع مشابه
Private Key based query on encrypted data
Nowadays, users of information systems have inclination to use a central server to decrease data transferring and maintenance costs. Since such a system is not so trustworthy, users' data usually upkeeps encrypted. However, encryption is not a nostrum for security problems and cannot guarantee the data security. In other words, there are some techniques that can endanger security of encrypted d...
متن کاملSecure Count Query on Encrypted Genomic Data
Human genomic information can yield more effective healthcare by guiding medical decisions. Therefore, genomics research is gaining popularity as it can identify potential correlations between a disease and a certain gene, which improves the safety and efficacy of drug treatment and can also develop more effective prevention strategies [1]. To reduce the sampling error and to increase the stati...
متن کاملImproved Reconstruction Attacks on Encrypted Data Using Range Query Leakage
We analyse the security of database encryption schemes supporting range queries against persistent adversaries. Security against such an adversary captures, among other things, the privacy of the client’s data with respect to the server hosting the encrypted database. The bulk of our work applies to a generic setting, where the view of the adversary is limited to the set of records or documents...
متن کاملPrivacy-Preserving Complex Query Evaluation over Semantically Secure Encrypted Data
In the last decade, several techniques have been proposed to evaluate different types of queries (e.g., range and aggregate queries) over encrypted data in a privacy-preserving manner. However, solutions supporting the privacypreserving evaluation of complex queries over encrypted data have been developed only recently. Such recent techniques, however, are either insecure or not feasible for pr...
متن کاملLightweight and Secure Two-Party Range Queries over Outsourced Encrypted Databases
With the many benefits of cloud computing, an entity may want to outsource its data and their related analytics tasks to a cloud. When data are sensitive, it is in the interest of the entity to outsource encrypted data to the cloud; however, this limits the types of operations that can be performed on the cloud side. Especially, evaluating queries over the encrypted data stored on the cloud wit...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IEEE Transactions on Dependable and Secure Computing
سال: 2022
ISSN: ['1941-0018', '1545-5971', '2160-9209']
DOI: https://doi.org/10.1109/tdsc.2020.2974218