Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Filters








2,962 Hits in 2.8 sec

GEOMETRIC RANGE SEARCH ON ENCRYPTED SPATIAL DATA

Shaik Sanheera, Mr Karimulla
2017 IIST Special Issue of International Journal of Advances in Engineering and Applied Science (IJAEAS)   unpublished
However, geometric range search on spatial data has not been fully investigated nor supported by existing searchable encryption schemes.  ...  In this paper, we design a symmetric-key searchable encryption scheme that can support geometric range queries on encrypted spatial data.  ...  The purpose of geometric range search on a spatial dataset is to retrieve points that are inside a particular geometric range Geometric range search is a critical tool for spatial data analysis, and has  ... 
fatcat:6wzl3nq4gbhlll7bz2pse5cycy

A Novel Two Level Search Scheme to Provide Security and Privacy of Encrypted Spatial Data

Ch.V.B.Neeraja ., Dept. of Computer Science and Engineering, University college of engineering JNTUK, Kakinada, India, Dept. of Computer Science and Engineering, University college of engineering JNTUK, Kakinada, India, S.S.S..Usha Devi N
2018 International Journal of Scientific Research in Computer Sciences and Engineering  
Spatial data consists of geographic and geometric data primitives. Searching on spatial data is carried by geometric range queries. FastGeo, an efficient two-level search scheme is introduced.  ...  Experimental results on spatial data can achieve sublinear search time.  ...  EXISTING SYSTEM Searchable encryption techniques concentrates on SQL queries, such as keyword queries and Boolean queries and some techniques focus on geometric range search on encrypted spatial data.  ... 
doi:10.26438/ijsrcse/v6i5.2529 fatcat:wzmjtbtsdzc23bmixb75dclkrq

Data Encryption using Geometric Range

Bhargavi Nadella
2016 Asia-pacific Journal of Convergent Research Interchange  
In any case, geometric range seek on spatial information has not been completely researched nor upheld by existing searchable encryption plans.  ...  In this paper, we outline a symmetric-key searchable encryption plot that can bolster geometric range questions on encoded spatial information.  ...  Conclusion We studied a general approach to securely search encrypted spatial data with geometric range queries. Specifically, our solution is independent with the shape of a geometric range query.  ... 
doi:10.21742/apjcri.2016.09.03 fatcat:rep7qgo6fvgwtlu34r4b2sff6y

GRSM: SECURE GEOMETRIC RANGE SEARCH OVER ENCRYPTED SPATIAL DATA

Naveen Kumar C.G .
2017 International Journal of Research in Engineering and Technology  
The data is hived away in encrypted form to prevent anonymity activities. Reachability is one of the issues faced between cloud users and LBS companies.  ...  A novel and lightweight scheme, named, Geometric  ...  In this paper, we suggest a geometric range search process over the encrypted data, so as to enhance the data privacy. Geometric queries are the queries that deal with spatial data.  ... 
doi:10.15623/ijret.2017.0601022 fatcat:usku52qo7vfyvimfx2yyzgtoji

Accurate Range Query with Privacy Preservation for Outsourced Location-Based Service in IoT

Zhaoman Liu, Lei Wu, Weizhi Meng, Hao Wang, Wei Wang
2021 IEEE Internet of Things Journal  
In addition, by dividing the region into atomic regions, ARQ can realize sub-linear search time and ensure dynamic update of spatial data.  ...  Range query is a common query in LBS, considering the situation of data outsourcing, this paper proposes an accurate range query (ARQ) scheme, which can realize efficient range query while preserving LBSP's  ...  range over encrypted dataset and FastGeo can query the spatial data in the geometric range over encrypted dataset.  ... 
doi:10.1109/jiot.2021.3068566 fatcat:uldeiz23qrcs7btwmb3irimchu

Circular Range Search on Encrypted Spatial Data

Boyang Wang, Ming Li, Haitao Wang, Hui Li
2015 2015 IEEE 35th International Conference on Distributed Computing Systems  
To the best of our knowledge, this paper represents the first study in secure circular range search on encrypted spatial data.  ...  However, while most of the existing works focus on common SQL queries, geometric queries on encrypted spatial data have not been well studied.  ...  range search on encrypted spatial data.  ... 
doi:10.1109/icdcs.2015.113 dblp:conf/icdcs/WangLWL15 fatcat:lk2exwiltzbo3hjf6dlbbimqaa

Circular range search on encrypted spatial data

Boyang Wang, Ming Li, Haitao Wang, Hui Li
2015 2015 IEEE Conference on Communications and Network Security (CNS)  
To the best of our knowledge, this paper represents the first study in secure circular range search on encrypted spatial data.  ...  However, while most of the existing works focus on common SQL queries, geometric queries on encrypted spatial data have not been well studied.  ...  range search on encrypted spatial data.  ... 
doi:10.1109/cns.2015.7346827 dblp:conf/cns/WangLWL15 fatcat:jxtvvma47ngjhambmjilq5ujqe

A Review on Searchable Encryption Functionality and the Evaluation of Homomorphic Encryption [article]

Brian Kishiyama, Izzat Alsmadi
2023 arXiv   pre-print
On the other hand, data owners may need to access their encrypted data. It may also need to be altered, updated, deleted, read, searched, or shared with others.  ...  One solution is to leave the data in its encrypted form and use Searchable Encryption (SE) which operates on encrypted data.  ...  Ranges could also include spatial attributes or geographical keyword range queries over encrypted data [24] .  ... 
arXiv:2312.14434v1 fatcat:nvmcx5a2yvge5j44fagrhoikhe

A Review on Searchable Encryption Functionality and the Evaluation of Homomorphic Encryption

Brian Kishiyama, Izzat Alsmadi
2024 International Journal of Science, Technology and Society  
While encryption enhances security, it introduces a potential challenge for data owners who may need to perform various operations on their encrypted data, such as accessing, modifying, updating, deleting  ...  One viable solution to balance the need for data security and operational functionality is the adoption of Searchable Encryption (SE).  ...  This involves geometric range queries over encrypted data, enhancing the versatility of SE [3, 26, 27] .  ... 
doi:10.11648/j.ijsts.20241202.11 fatcat:hivhgpkyc5ehzff7jc6ic5irru

Special issue ESORICS 2021

Elisa Bertino, Haya Shulman, Michael Waidner, Elisa Bertino, Haya Shulman, Michael Waidner
2022 Journal of Computer Security  
These papers cover a broad set of topics, ranging from zero-knowledge proof protocols and privacy-preserving neural network inferences to privacy-preserving searching techniques, malware sandbox evasion  ...  Based on the reviews and discussions 71 high quality papers were selected for presentation at the conference.  ...  The paper titled "Range Search on Encrypted Spatial Data with Dynamic Updates", by S. K. Kermanshahi and Xun Yi (RMIT University), R. Dowsley, R. Steinfeld, A. Sakzad, J. Liu and S.  ... 
doi:10.3233/jcs-220951 fatcat:hw5knoxbf5egpiwhstlzlckqci

Secure Hypersphere Range Query on Encrypted Data [article]

Gagandeep Singh, Akshar Kaul
2021 arXiv   pre-print
This paper focuses on the problem of Secure Circular Range Queries (SCRQ), where client submits an encrypted query (consisting of a center point and radius of the circle) and the cloud (storing encrypted  ...  Spatial queries like range queries, nearest neighbor, circular range queries etc. are the most widely used queries in the location-based applications.  ...  One of the most widely used geometric query is the circular range query.  ... 
arXiv:2103.09668v1 fatcat:ctpvz6ry55hzxp7o3sgem7te4a

Private Buddy Search: Enabling Private Spatial Queries in Social Networks

Ali Khoshgozaran, Cyrus Shahabi
2009 2009 International Conference on Computational Science and Engineering  
Our extensive experimental evaluation shows that PBS supports very efficient user operations such as location updates, as well as spatial queries such as range and k-nearest neighbor search.  ...  We propose Private Buddy Search (PBS), a framework to enable private evaluation of spatial queries predominantly used in social networks, without compromising sensitive information about its users.  ...  While we mainly focus on querying spatial data, non-spatial data can be queried in a similar manner. A.  ... 
doi:10.1109/cse.2009.337 dblp:conf/cse/KhoshgozaranS09 fatcat:o36wr2mhjfhufnyultxi75tcvu

An Image Encryption Technique Based on Logistic Sine Map and an Encrypted Image Retrieval Using DCT Frequency [chapter]

Rajana Kanakaraju, Lakshmi V, Shanmuk Srinivas Amiripalli, Sai Prasad Potharaju, R Chandrasekhar
2021 Advances in Parallel Computing  
In this paper, we propose an algorithm that uses discrete cosine transformation frequency and logistic sine map to encrypt an image, and the feature vector is computed on the encrypted image.  ...  The cloud platform is not entirely a trusted party as the data is under the control of cloud service providers, which results in privacy leaks so that the data is to be encrypted while uploading into the  ...  Thus, before storing data on the cloud server, the data should be converted into a not understandable manner.  ... 
doi:10.3233/apc210171 fatcat:xkpzkykalffltca7xlndrfmigu

Location Based Encryption

Maruti Garaje
2018 International Journal for Research in Applied Science and Engineering Technology  
We are developing banking application using Location Based Encryption.  ...  A search for all objects in a certain geographic area requires the possibility to define spatial ranges and spatial inclusion of locations.  ...  The coordinate is incorporated with a random key for data encryption.  ... 
doi:10.22214/ijraset.2018.5117 fatcat:lzxxbbnhjrasjevr7xbgwg72u4

Enabling search services on outsourced private spatial data

Man Lung Yiu, Gabriel Ghinita, Christian S. Jensen, Panos Kalnis
2009 The VLDB journal  
Cloud computing services enable organizations and individuals to outsource the management of their data to a service provider, in order to save on hardware investments and reduce maintenance costs.  ...  The paper develops a spatial transformation that re-distributes the locations in space, and a cryptographic-based transformation.  ...  Range Search. CRT employs R * -trees and it is a substantial extension over the encrypted B + -trees of Damiani et al. [9] .  ... 
doi:10.1007/s00778-009-0169-7 fatcat:otvzo7a2mffdlm3xgye36itsxu
« Previous Showing results 1 — 15 out of 2,962 results