A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2018; you can also visit the original URL.
The file type is application/pdf
.
Filters
GEOMETRIC RANGE SEARCH ON ENCRYPTED SPATIAL DATA
2017
IIST Special Issue of International Journal of Advances in Engineering and Applied Science (IJAEAS)
unpublished
However, geometric range search on spatial data has not been fully investigated nor supported by existing searchable encryption schemes. ...
In this paper, we design a symmetric-key searchable encryption scheme that can support geometric range queries on encrypted spatial data. ...
The purpose of geometric range search on a spatial dataset is to retrieve points that are inside a particular geometric range Geometric range search is a critical tool for spatial data analysis, and has ...
fatcat:6wzl3nq4gbhlll7bz2pse5cycy
A Novel Two Level Search Scheme to Provide Security and Privacy of Encrypted Spatial Data
2018
International Journal of Scientific Research in Computer Sciences and Engineering
Spatial data consists of geographic and geometric data primitives. Searching on spatial data is carried by geometric range queries. FastGeo, an efficient two-level search scheme is introduced. ...
Experimental results on spatial data can achieve sublinear search time. ...
EXISTING SYSTEM Searchable encryption techniques concentrates on SQL queries, such as keyword queries and Boolean queries and some techniques focus on geometric range search on encrypted spatial data. ...
doi:10.26438/ijsrcse/v6i5.2529
fatcat:wzmjtbtsdzc23bmixb75dclkrq
Data Encryption using Geometric Range
2016
Asia-pacific Journal of Convergent Research Interchange
In any case, geometric range seek on spatial information has not been completely researched nor upheld by existing searchable encryption plans. ...
In this paper, we outline a symmetric-key searchable encryption plot that can bolster geometric range questions on encoded spatial information. ...
Conclusion We studied a general approach to securely search encrypted spatial data with geometric range queries. Specifically, our solution is independent with the shape of a geometric range query. ...
doi:10.21742/apjcri.2016.09.03
fatcat:rep7qgo6fvgwtlu34r4b2sff6y
GRSM: SECURE GEOMETRIC RANGE SEARCH OVER ENCRYPTED SPATIAL DATA
2017
International Journal of Research in Engineering and Technology
The data is hived away in encrypted form to prevent anonymity activities. Reachability is one of the issues faced between cloud users and LBS companies. ...
A novel and lightweight scheme, named, Geometric ...
In this paper, we suggest a geometric range search process over the encrypted data, so as to enhance the data privacy. Geometric queries are the queries that deal with spatial data. ...
doi:10.15623/ijret.2017.0601022
fatcat:usku52qo7vfyvimfx2yyzgtoji
Accurate Range Query with Privacy Preservation for Outsourced Location-Based Service in IoT
2021
IEEE Internet of Things Journal
In addition, by dividing the region into atomic regions, ARQ can realize sub-linear search time and ensure dynamic update of spatial data. ...
Range query is a common query in LBS, considering the situation of data outsourcing, this paper proposes an accurate range query (ARQ) scheme, which can realize efficient range query while preserving LBSP's ...
range over encrypted dataset and FastGeo can query the spatial data in the geometric range over encrypted dataset. ...
doi:10.1109/jiot.2021.3068566
fatcat:uldeiz23qrcs7btwmb3irimchu
Circular Range Search on Encrypted Spatial Data
2015
2015 IEEE 35th International Conference on Distributed Computing Systems
To the best of our knowledge, this paper represents the first study in secure circular range search on encrypted spatial data. ...
However, while most of the existing works focus on common SQL queries, geometric queries on encrypted spatial data have not been well studied. ...
range search on encrypted spatial data. ...
doi:10.1109/icdcs.2015.113
dblp:conf/icdcs/WangLWL15
fatcat:lk2exwiltzbo3hjf6dlbbimqaa
Circular range search on encrypted spatial data
2015
2015 IEEE Conference on Communications and Network Security (CNS)
To the best of our knowledge, this paper represents the first study in secure circular range search on encrypted spatial data. ...
However, while most of the existing works focus on common SQL queries, geometric queries on encrypted spatial data have not been well studied. ...
range search on encrypted spatial data. ...
doi:10.1109/cns.2015.7346827
dblp:conf/cns/WangLWL15
fatcat:jxtvvma47ngjhambmjilq5ujqe
A Review on Searchable Encryption Functionality and the Evaluation of Homomorphic Encryption
[article]
2023
arXiv
pre-print
On the other hand, data owners may need to access their encrypted data. It may also need to be altered, updated, deleted, read, searched, or shared with others. ...
One solution is to leave the data in its encrypted form and use Searchable Encryption (SE) which operates on encrypted data. ...
Ranges could also include spatial attributes or geographical keyword range queries over encrypted data [24] . ...
arXiv:2312.14434v1
fatcat:nvmcx5a2yvge5j44fagrhoikhe
A Review on Searchable Encryption Functionality and the Evaluation of Homomorphic Encryption
2024
International Journal of Science, Technology and Society
While encryption enhances security, it introduces a potential challenge for data owners who may need to perform various operations on their encrypted data, such as accessing, modifying, updating, deleting ...
One viable solution to balance the need for data security and operational functionality is the adoption of Searchable Encryption (SE). ...
This involves geometric range queries over encrypted data, enhancing the versatility of SE [3, 26, 27] . ...
doi:10.11648/j.ijsts.20241202.11
fatcat:hivhgpkyc5ehzff7jc6ic5irru
Special issue ESORICS 2021
2022
Journal of Computer Security
These papers cover a broad set of topics, ranging from zero-knowledge proof protocols and privacy-preserving neural network inferences to privacy-preserving searching techniques, malware sandbox evasion ...
Based on the reviews and discussions 71 high quality papers were selected for presentation at the conference. ...
The paper titled "Range Search on Encrypted Spatial Data with Dynamic Updates", by S. K. Kermanshahi and Xun Yi (RMIT University), R. Dowsley, R. Steinfeld, A. Sakzad, J. Liu and S. ...
doi:10.3233/jcs-220951
fatcat:hw5knoxbf5egpiwhstlzlckqci
Secure Hypersphere Range Query on Encrypted Data
[article]
2021
arXiv
pre-print
This paper focuses on the problem of Secure Circular Range Queries (SCRQ), where client submits an encrypted query (consisting of a center point and radius of the circle) and the cloud (storing encrypted ...
Spatial queries like range queries, nearest neighbor, circular range queries etc. are the most widely used queries in the location-based applications. ...
One of the most widely used geometric query is the circular range query. ...
arXiv:2103.09668v1
fatcat:ctpvz6ry55hzxp7o3sgem7te4a
Private Buddy Search: Enabling Private Spatial Queries in Social Networks
2009
2009 International Conference on Computational Science and Engineering
Our extensive experimental evaluation shows that PBS supports very efficient user operations such as location updates, as well as spatial queries such as range and k-nearest neighbor search. ...
We propose Private Buddy Search (PBS), a framework to enable private evaluation of spatial queries predominantly used in social networks, without compromising sensitive information about its users. ...
While we mainly focus on querying spatial data, non-spatial data can be queried in a similar manner.
A. ...
doi:10.1109/cse.2009.337
dblp:conf/cse/KhoshgozaranS09
fatcat:o36wr2mhjfhufnyultxi75tcvu
An Image Encryption Technique Based on Logistic Sine Map and an Encrypted Image Retrieval Using DCT Frequency
[chapter]
2021
Advances in Parallel Computing
In this paper, we propose an algorithm that uses discrete cosine transformation frequency and logistic sine map to encrypt an image, and the feature vector is computed on the encrypted image. ...
The cloud platform is not entirely a trusted party as the data is under the control of cloud service providers, which results in privacy leaks so that the data is to be encrypted while uploading into the ...
Thus, before storing data on the cloud server, the data should be converted into a not understandable manner. ...
doi:10.3233/apc210171
fatcat:xkpzkykalffltca7xlndrfmigu
Location Based Encryption
2018
International Journal for Research in Applied Science and Engineering Technology
We are developing banking application using Location Based Encryption. ...
A search for all objects in a certain geographic area requires the possibility to define spatial ranges and spatial inclusion of locations. ...
The coordinate is incorporated with a random key for data encryption. ...
doi:10.22214/ijraset.2018.5117
fatcat:lzxxbbnhjrasjevr7xbgwg72u4
Enabling search services on outsourced private spatial data
2009
The VLDB journal
Cloud computing services enable organizations and individuals to outsource the management of their data to a service provider, in order to save on hardware investments and reduce maintenance costs. ...
The paper develops a spatial transformation that re-distributes the locations in space, and a cryptographic-based transformation. ...
Range Search. CRT employs R * -trees and it is a substantial extension over the encrypted B + -trees of Damiani et al. [9] . ...
doi:10.1007/s00778-009-0169-7
fatcat:otvzo7a2mffdlm3xgye36itsxu
« Previous
Showing results 1 — 15 out of 2,962 results