Privacy-Preserving Linear Region Search Service

被引:7
|
作者
Zhang, Hua [1 ]
Guo, Ziqing [1 ]
Zhao, Shaohua [1 ]
Wen, Qiaoyan [1 ]
机构
[1] Beijing Univ Posts & Telecommun, State Key Lab Networking & Switching Technol, Beijing 100876, Peoples R China
关键词
Cryptography; Indexes; Cloud computing; Algorithm design and analysis; Search problems; Outsourcing; Linear region search; privacy-preserving; location-based services; data outsourcing; cloud computing; RANGE QUERIES; CLOUD; SECURE;
D O I
10.1109/TSC.2017.2777970
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Due to a variety of advantages of data outsourcing, some Location Based Services (LBS) providers are motivated to outsource the geographic data and query service to commercial cloud. However, for protecting data confidentiality, the valuable data should be encrypted before outsourcing, which obstructs the utilization like geographic information query. To address this problem, some previous works regarding to secure search on encrypted database could be applied in outsourced LBS scenario directly, but none of them is tailor-made for linear region search (LRS). The LRS is a kind of LBS that widely used in navigation system, it finds the nearby points of interest (POI) for a query segment. In this paper, for the first time, we explore and solve the challenging problem of privacy-preserving linear region search. Specifically, we choose the quadtree structure to build index for POI database, then the results of LRS can be efficiently obtained by finding out the rectangular regions that query segment passes through. In order to preserve the privacy of both LBS providers and users, according to computational geometry and Asymmetric Scalar-product Preserving Encryption (ASPE) approach, we design a novel algorithm for accurately determining whether a segment intersects with a rectangle on ciphertext. Moreover, this algorithm also provides a new idea to solve other computational problems in encrypted 2-dimensional geometry space. Based on different privacy requirements of two threat models, we propose two privacy-preserving LRS schemes and corresponding dynamic update operations. Security analysis and experiments on real-world dataset show that our schemes are secure and efficient.
引用
收藏
页码:207 / 221
页数:15
相关论文
共 50 条
  • [21] Truthful and privacy-preserving generalized linear models
    Qiu, Yuan
    Liu, Jinyan
    Wang, Di
    INFORMATION AND COMPUTATION, 2024, 301
  • [22] Privacy-Preserving Group Discovery with Linear Complexity
    Manulis, Mark
    Pinkas, Benny
    Poettering, Bertram
    APPLIED CRYPTOGRAPHY AND NETWORK SECURITY, 2010, 6123 : 420 - +
  • [23] Privacy-preserving horizontally partitioned linear programs
    Olvi L. Mangasarian
    Optimization Letters, 2012, 6 : 431 - 436
  • [24] Privacy-Preserving Boosting with Random Linear Classifiers
    Sharma, Sagar
    Chen, Keke
    PROCEEDINGS OF THE 2018 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'18), 2018, : 2294 - 2296
  • [25] Privacy-preserving discovery of multivariate linear relationship
    Ning, Li
    Wu, Ningning
    Zhang, Jing
    CITSA/ISAS 2005: 2ND INTERNATIONAL CONFERENCE ON CYBERNETICS AND INFORMATION TECHNOLOGIES SYSTEMS AND APPLICATIONS: 11TH INTERNATIONAL CONFERENCE ON INFORMATION SYSTEMS ANALYSIS AND SYNTHESIS, VOL 1, 2005, : 160 - 165
  • [26] Privacy-preserving horizontally partitioned linear programs
    Mangasarian, Olvi L.
    OPTIMIZATION LETTERS, 2012, 6 (03) : 431 - 436
  • [27] Privacy-Preserving IR 2016: Differential Privacy, Search, and Social Media
    Yang, Hui
    Soboroff, Ian
    Xiong, Li
    Clarke, Charles L. A.
    Garfinkel, Simson L.
    SIGIR'16: PROCEEDINGS OF THE 39TH INTERNATIONAL ACM SIGIR CONFERENCE ON RESEARCH AND DEVELOPMENT IN INFORMATION RETRIEVAL, 2016, : 1247 - 1248
  • [28] PRIVACY-PRESERVING QUERY-BY-EXAMPLE SPEECH SEARCH
    Portelo, Jose
    Abad, Alberto
    Raj, Bhiksha
    Trancoso, Isabel
    2015 IEEE INTERNATIONAL CONFERENCE ON ACOUSTICS, SPEECH, AND SIGNAL PROCESSING (ICASSP), 2015, : 1797 - 1801
  • [29] An Efficient Privacy-Preserving Ranked Keyword Search Method
    Chen, Chi
    Zhu, Xiaojie
    Shen, Peisong
    Hu, Jiankun
    Guo, Song
    Tari, Zahir
    Zomaya, Albert Y.
    IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2016, 27 (04) : 951 - 963
  • [30] Privacy-preserving linear and nonlinear approximation via linear programming
    Fung, Glenn M.
    Mangasarian, Olvi L.
    OPTIMIZATION METHODS & SOFTWARE, 2013, 28 (01): : 207 - 216