Full Paper View Go Back

A Novel Two Level Search Scheme to Provide Security and Privacy of Encrypted Spatial Data

Ch.V.B.Neeraja 1 , S.S.S..Usha Devi N2

  1. Dept. of Computer Science and Engineering, University college of engineering JNTUK, Kakinada, India.
  2. Dept. of Computer Science and Engineering, University college of engineering JNTUK, Kakinada, India.

Section:Research Paper, Product Type: Isroset-Journal
Vol.6 , Issue.5 , pp.25-29, Oct-2018


CrossRef-DOI:   https://doi.org/10.26438/ijsrcse/v6i5.2529


Online published on Oct 31, 2018


Copyright © Ch.V.B.Neeraja, S.S.S.N.Usha Devi N . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
 

View this paper at   Google Scholar | DPI Digital Library


XML View     PDF Download

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: Ch.V.B.Neeraja, S.S.S.N.Usha Devi N, “A Novel Two Level Search Scheme to Provide Security and Privacy of Encrypted Spatial Data,” International Journal of Scientific Research in Computer Science and Engineering, Vol.6, Issue.5, pp.25-29, 2018.

MLA Style Citation: Ch.V.B.Neeraja, S.S.S.N.Usha Devi N "A Novel Two Level Search Scheme to Provide Security and Privacy of Encrypted Spatial Data." International Journal of Scientific Research in Computer Science and Engineering 6.5 (2018): 25-29.

APA Style Citation: Ch.V.B.Neeraja, S.S.S.N.Usha Devi N, (2018). A Novel Two Level Search Scheme to Provide Security and Privacy of Encrypted Spatial Data. International Journal of Scientific Research in Computer Science and Engineering, 6(5), 25-29.

BibTex Style Citation:
@article{N_2018,
author = {Ch.V.B.Neeraja, S.S.S.N.Usha Devi N},
title = {A Novel Two Level Search Scheme to Provide Security and Privacy of Encrypted Spatial Data},
journal = {International Journal of Scientific Research in Computer Science and Engineering},
issue_date = {10 2018},
volume = {6},
Issue = {5},
month = {10},
year = {2018},
issn = {2347-2693},
pages = {25-29},
url = {https://www.isroset.org/journal/IJSRCSE/full_paper_view.php?paper_id=856},
doi = {https://doi.org/10.26438/ijcse/v6i5.2529}
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v6i5.2529}
UR - https://www.isroset.org/journal/IJSRCSE/full_paper_view.php?paper_id=856
TI - A Novel Two Level Search Scheme to Provide Security and Privacy of Encrypted Spatial Data
T2 - International Journal of Scientific Research in Computer Science and Engineering
AU - Ch.V.B.Neeraja, S.S.S.N.Usha Devi N
PY - 2018
DA - 2018/10/31
PB - IJCSE, Indore, INDIA
SP - 25-29
IS - 5
VL - 6
SN - 2347-2693
ER -

523 Views    294 Downloads    159 Downloads
  
  

Abstract :
Spatial data consists of geographic and geometric data primitives. Searching on spatial data is carried by geometric range queries. FastGeo, an efficient two-level search scheme is introduced. The major contributions focus on two aspects. First, enrich search functionalities by designing new solutions to carry out fundamental geometric search queries, which are supported over encrypted data. Second, minimize the gap between theory and practice by building novel schemes to perform geometric queries with highly efficient search time and updates over large scale spatial data. Spatial data and geometric range queries are converted into a new form, denoted as equality-vector form and perform two-level search to verify whether a point is inside a geometric range. FastGeo is implemented using java as programming language on Net Beans IDE. An honest-but-curious server efficiently performs geometric range queries and returns data points that are inside the geometric region to the client without learning query or sensitive information. Better privacy can be achieved which cannot drop or create a new message. Experimental results on spatial data can achieve sublinear search time.

Key-Words / Index Term :
Geometric range queries, Spatial Data, Encrypted data

References :
[1] Boyang Wang, Ming Li, and Li Xiong, “FastGeo: Efficient Geometric Range Queries on Encrypted Spatial Data” IEEE Transactions on Dependable and Secure Computing, 2017.
[2] B. Wang, M. Li, and H. Wang, “Geometric Range Search on Encrypted Spatial Data”, IEEE Transactions on Information Forensics and Security, vol. 11, no. 4, pp. 704–719, 2016.
[3] Shashi Shekhar, Stenven k. Feiner, and Walid G. Aref, “Spatial Computing,” Communications of the ACM, 2016.
[4] Erik-Oliver Blass, Travis Mayberry, and Guevara Noubir, “Practical Forward Secure Range and Sort Queries with Updated-Oblivious Linked Lists”, Proceedings of Privacy Enhancing Technology Symposium, 2015.
[5] Florian Kerschbaum, “Frequency-Hiding Order-Preserving Encryption”, Proceedings of ACM, 2015.
[6] B. Wang, M. Li, H. Wang, and H. Li, “Circular Range Search on Encrypted Spatial Data”, Proceedings of IEEE CNS, 2015.
[7] H. Zhu, R. Lu, C. Huang, L. Chen, and H. Li, “An Efficient Privacy Preserving Location Based Services Query Scheme in Outsourced Cloud,” IEEE Transactions on Vehicular Technology, 2015.
[8] V. Pappas, F. Krell, B. Vo, V. Kolesnikov, T. Malkin, S. G. Choi, W. George, A. Keromytis, and S. Bellovin, “Blind Seer: A Searchable Private DBMS,” Proceedings of IEEE (S&P), 2014.
[9] J. Sedenka and P. Gasti, “Privacy-Preserving Distance Computation and Proximity Testing on Earth, Done Right,” Proceedings of ACM ASIA Conference on Information, Computer and Communications Security (ASIACCS), 2014.
[10] B. Wang, Y. Hou, M. Li, H. Wang, and H. Li, “Maple: Scalable Multi-Dimensional Range Search over Encrypted Cloud Data with Tree-based Index,” Proceedings of ACM, 2014.
[11] G. Ghinita and R. Rughinis, “An Efficient Privacy-Preserving System for Monitoring Mobile Users: Making Searchable Encryption Practical,” Proceedings of ACM Conference on Data and Application Security and Privacy (CODASPY), 2014.
[12] E. Shen, E. Shi, and B. Waters, “Predicate Privacy in Encryption Systems,” Proceedings of Transactions on cloud computing (TCC), 2009.

Authorization Required

 

You do not have rights to view the full text article.
Please contact administration for subscription to Journal or individual article.
Mail us at  support@isroset.org or view contact page for more details.

Go to Navigation