CN105791283A - Circle range search method specific to encrypted spatial data - Google Patents

Circle range search method specific to encrypted spatial data Download PDF

Info

Publication number
CN105791283A
CN105791283A CN201610113032.1A CN201610113032A CN105791283A CN 105791283 A CN105791283 A CN 105791283A CN 201610113032 A CN201610113032 A CN 201610113032A CN 105791283 A CN105791283 A CN 105791283A
Authority
CN
China
Prior art keywords
search
square
cloud server
encryption
query context
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201610113032.1A
Other languages
Chinese (zh)
Other versions
CN105791283B (en
Inventor
李洪伟
任昊
陈昊
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
University of Electronic Science and Technology of China
Original Assignee
University of Electronic Science and Technology of China
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by University of Electronic Science and Technology of China filed Critical University of Electronic Science and Technology of China
Priority to CN201610113032.1A priority Critical patent/CN105791283B/en
Publication of CN105791283A publication Critical patent/CN105791283A/en
Application granted granted Critical
Publication of CN105791283B publication Critical patent/CN105791283B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
  • Storage Device Security (AREA)

Abstract

The invention belongs to the technical field of searchable encryption, and specifically relates to a circle range search method specific to encrypted spatial data. The method mainly comprises that a search user generates a search token according to a target circle search range and uploads the search token to a cloud server, wherein the search token comprises search ranges of a first square and a second square, the first square is the inscribed square of a target circle, and the second square is the circumscribed square of the target circle; the cloud server searches according to the search token, thus obtaining intermediate search results and sends the intermediate search results and the search token to a trustable third party; the trustable third party filters wrong results, encrypts the surplus final search results again and returns to the cloud server; and the cloud server sends the final search results to the search user. The method has the advantages that security and privacy are ensured, and moreover, the circle range search method specific to the encrypted spatial data is realized efficiently.

Description

A kind of circular scope searching method of the spatial data for encryption
Technical field
The invention belongs to and can search for encryption technology field, be specifically related to the circular scope searching method of a kind of spatial data for encryption.
Background technology
Cloud computing is the information technology (InformationTechnology of future generation that academia is paid close attention to the most with industrial quarters, IT) framework, it has and numerous up to now ripe is applied to many characteristics that the IT technology of industrial quarters does not have, such as: on-demand acquisition self-help service, ubiquitous network insertion, marry again independent of the resource pool in place, the quick-expansion of resource, pay-per-use and risk.Cloud computing summarizes huge calculating resource, storage resource and other Service Sources, has provided the user the convenient reliable service of multiple novelty, has brought huge business opportunity and interests to cloud service provider.In many services, data outsourcing service has provided the user more easy, the efficient and reliable data management mode of one due to it, and becomes the focus extensively paid close attention to industrial quarters by academia.The operations such as the mass data of oneself can be contracted out to Cloud Server by user, the inquiry that these data conducted interviews when needs.This service mode is the pressure that user releases its local datastore and maintenance, and can allow user's these data of on-demand access whenever and wherever possible.In a word, this service mode brings great convenience for user.
But, after the data of oneself are stored in Cloud Server by user, data are just completely controlled by server, then make the data being stored on cloud be faced with serious safety and privacy threats, are mainly manifested in the following aspects:
1. security threat.Although Cloud Server make use of safer memory technology and provides relatively reliable storage device, but, in actual cloud environment, there is the opponent of numerous malice, they are for respective interests, it is intended to distort or peep the user data being stored on Cloud Server.
2. privacy threats.Cloud Server is not completely believable.He perhaps can be interested for the particular content of the data of storage.Such as, for cloud service provider oneself, under the ordering about of economic interests, the data content of user is probably carried out the operations such as statistical analysis by them even can peep the sensitive data of individual.So the threat of privacy is also very big.
The safety of data and privacy concern serious constrain cloud computing service development.Further, if simple and crude adding ciphertext data with complicated AES and design strict access control mechanisms and can greatly reduce efficiency and the quality of service.Such as keyword search, range searching etc. services and even can provide.Cloud Server can become a simple expensive storage medium.
In order to solve the problems referred to above, designing one and can search for encryption method, the method must is fulfilled for several features:
1. the owner of data always on can not provide service to search user.Main storage and access task all must be provided by Cloud Server.Data owner only need to do some encryptions before outsourcing data and generate the basic operations such as index.Once data arrive Cloud Server, the owner of data only needs the regular task of doing the lightweights such as key updating
2., in order to ensure the efficiency of service, the searching algorithm under the AES of data and ciphertext all can not be too complicated.And, data must have good index structure.
3. the security and privacy of data and search content depends on AES and searching algorithm, and distinct methods has different safety and privacy intensity.In general can search for needing to balance between security privacy intensity and the efficiency of encryption method.
Based on this, can search for encryption technology and obtain research and the contribution of a lot of scholar.But great majority are all based on keyword query and the method for square range searching.Method lacking very of circular scope search.Circular scope search be a kind of be recently proposed in border circular areas return point set can search for encryption method.It and kNN inquiry are more close, but need not preset the quantity k returning Query Result.Circular scope search needs the radius (query context) of definition circle.Recently, at present it has been proposed that two symmetric keys can search for AES to support that circular scope is searched for.But, wherein the efficiency comparison of the generation of search token, data encryption and query script is low.
This method is based on rectangular extent search, and in one rectangular area of rectangular extent searching requirement return, institute is a little.The rectangular area search realized at present is all based on public key cryptography.But both method data structures are all linear, are not suitable for big data environment.In order to solve this problem, many approach application tree such as R-tree and kd-tree is as index.The inquiry of these methods is faster than the method using linear structure.But these algorithms may cause important information to lose because of the leakage of order information.Some methods ensure that order information is not revealed and but sacrifice efficiency.With the accuracy sacrificing result, some methods guarantee that order information is not revealed.
Summary of the invention
The purpose of the present invention, it is simply that for the problems referred to above, it is proposed to the circular scope searching method of a kind of spatial data for encryption.
The technical method of the present invention is: the circular scope searching method of a kind of spatial data for encryption, it is characterised in that comprise the following steps:
A. search user produces search token according to target circle query context, and search token is uploaded to Cloud Server;Described search token includes the first square and the second foursquare query context, and the first square is for connecing square in target circle, and the second square is the external square that target is circular;
B. Cloud Server scans for obtaining intermediate search results according to search token, and intermediate search results and search token are sent to trusted third party;In described Cloud Server, storage has the spatial data of encryption;
C. intermediate search results and search token are deciphered by trusted third party, check when plaintext which result is not in target circle query context, and will will return Cloud Server after the result filtration of mistake after remaining final Search Results re-encrypted;
D. final searched result is sent to search user by Cloud Server.
Further, search for user described in step a and produce search token according to target circle query context method particularly includes: search user inputs the center of circle and the radius of circle, it is assumed that the center of circle is (X, Y), radius is R, then can obtain the first square query context QinFor { ( X - 2 2 R , Y - 2 2 R ) , ( X + 2 2 R , Y + 2 2 R ) } , Second square query context QexFor { (X-R, Y-R), (X+R, Y+R) }.
Further, described in step a, the first square and the second foursquare query context are uploaded to Cloud Server after ASPE AES is encrypted.
Further, in Cloud Server described in step b, storage has the spatial data of encryption, the concrete encryption method of spatial data is: adopt R tree as data directory structure, under environment expressly, all of data point is all used corresponding grouping strategy to be divided into bucket, bucket is the minimum enclosed rectangle of R tree, and the leaf node of R tree is corresponding to the data point of spatial database;Adopt ASPE AES that bucket is encrypted: to use V ∈ RdRepresenting the summit of minimum enclosed rectangle, and use ASPE AES to encrypt summit, the dimension of V is extended by ASPE AES, obtains V+=(VT|1)T, then pass through use matrix key M and be encrypted and obtain VE=M-1V+;Wherein, matrix key M is reversible (d+1) × (d+1) matrix;Then in Cloud Server, the spatial data of the encryption of storage at least includes the relation of encryption data point, the parent node of R tree and child nodes.
Further, the search of Cloud Server described in step b token scans for method particularly includes:
According to the first square query context generated in step a and the second square query context, judge whether four limits of query context intersect with bucket, if, then judge successively the child node of this node whether with the intersecting of query context, repeating inquiry till data point, crossing data point is also generated intermediate search results by all limits this step of backed off after random of traversal queries scope.
Beneficial effects of the present invention is, the present invention achieves the circular scope searching method of the spatial data for encryption efficiently while ensureing safety and privacy.
Accompanying drawing explanation
Fig. 1 is the schematic flow sheet of the method for the present invention;
Fig. 2 is the logical schematic of the search token that user produces;
Wherein, center represents the center of circle, and Radius represents radius.
Detailed description of the invention
Below the present invention is described in detail
In EP-CRS, adopt R tree as data directory structure.Under environment expressly, all of data point is all used corresponding grouping strategy to be divided into bucket.Bucket is the MBR (Minimumboundingrectangle, minimum enclosed rectangle) of R tree.The non-leaf nodes of R tree is all the child node of higher level node, and the leaf node of R tree all corresponds to the data point of spatial database.
The non-leaf nodes of R tree is different with the cipher mode of the leaf node of R tree.Non-leaf nodes Ri(i∈Z*) by two summit (Vm,Vn) represent, wherein m, n ∈ Z*.Use V ∈ RdRepresent the summit of MBR, and use ASPE AES to encrypt it.First the dimension of V is extended by this algorithm, obtains V+=(VT|1)T.Then, by using matrix key M, reversible (d+1) × (d+1) matrix encrypts V.Encrypted vertex representation is VE=M-1V+.In the present invention, all summits of the MBR of R tree are encrypted in an identical manner.For the consideration improving encryption efficiency, for leaf node (data point), it is possible to encrypted by any effective safe cryptographic technique.The present invention adopts Advanced Encryption Standard AES to carry out encrypted source data point.
As it is shown in figure 1, be the concrete grammar flow process of the present invention, the concrete implementation method of the present invention is as follows:
One circular space range searching generates a search token method particularly includes: in reality, user wonders nearest place (such as: the nearest hotel within 2 kilometers), so, the query context of location Based service naturally becomes a circle;User needs the geographical position (longitude and latitude) providing oneself as the center of inquiry circle;Additionally, user also needs to specify the radius of circle.Therefore, user inputs all of information should be (longitude, latitude) and radius.
As in figure 2 it is shown, the circle search scope provided according to search user, first, it is converted into two foursquare query contexts by changing circular query context.One of them connects square in circular, and another is the external square of circle.So easily calculate two square query contexts.Allow (X, Y) as the coordinate in the center of circle, and R is as the value of radius.Then, internal inquiry QinJust can be expressed as { ( X - 2 2 R , Y - 2 2 R ) , ( X + 2 2 R , Y + 2 2 R ) } , And external inquiry Qex{ (X-R, Y-R), (X+R, Y+R) } can be expressed as.Finally, it is possible to use normal rectangular extent search technique to solve QinAnd Qex.In rectangular extent is searched for, QinAnd QexShould first be converted to four half-planes.Therefore, haveQinCalculating process and QexIt is duplicate, here with QexBe calculated as example.
Four hyperplane of square query context there are eight anchor points.Owing to four hyperplane are all of equal value, with one of them some H1Be calculated as example.H1It is by the determination of two parameter a and b.Randomly choose an anchor pointWhereinIt isThe anchor point of opposite side.According to linear algebra, allow A:Then there is B:Obviously, solve equation A and B to obtainIn this manner it is possible to be that each hyperplane generates two anchor points, the anchor point of all hyperplane in like manner can be obtained.
Followed by query context encryption expressly.Before encryption first by one-dimensional for anchor point vector extensions: α=((α)T(-0.5||α||2))TWithThen, key M is used to encrypt αAnd α>: with α E > = M T α + > .
Finally, it is thus achieved that the ciphertext of H is H E = r ( α E ≤ - α E > ) , Wherein r is a random normal number.
On the basis of above-mentioned analysis, it is possible to obtain to QexSearch token is (H1E,H2E,H3E,H4E), wherein H1EIt is H1Ciphertext.Additionally, in order to protect one-dimensional inquiry privacy, four elements of random alignment search token vector.This operation is without influence on Query Result.QinThe search generation of token and QexIt is duplicate.Search token is by userGenerate.
Cloud Server carries out the search under ciphertext and calculates: Cloud Server achieves rectangular extent search (Qex,Qin).Cloud Server stores following information: encryption searching algorithm, the parent node of encryption data point and R tree and the relation of child nodes.And, the relation of parent node and child nodes is not encrypted.
First method to carry out intersection judgement.Obviously, it is impossible in inquiry rectangle, only whether judge the crossing instances of rectangle by testing the summit of an index rectangle.On the contrary, it should determine that summit is whether in suitable query context.And, the actual cross-mode having more than three kinds.Therefore, it is difficult to check all of cross-mode, and determine searching route.So, the present invention analyzes this problem from opposite angles.If the summit of an index range is at identical scope H>In, it can be deduced that such conclusion: query context rectangle and index rectangle are non-intersect.Check that four hyperplane of inquiry rectangle judge whether index rectangle does not intersect with query context one by one.The present invention provides a Not_In_Halfspace (V by nameE,HiE), the function of i=1,2,3,4 is as intersecting descriminator.The input of this function is a pass point VEEncryption hyperplane H with an inquiryiE.Its one bit of output showsWhether set up.Function needs to calculate HiE·VEExport result.Specifically it is calculated as follows:
H i E · V E = r ( α E ≤ - α E > ) · V E = r ( ( M T α + ≤ ) - ( M T α + > ) ) T M - 1 V + = r ( α + ≤ - α + > ) T V + = r ( | | α > - V | | - | | α ≤ - V | | )
WhereinWithIt is hyperplane HiEThe anchor point encrypted.Parameter r is non-negative random integers and VEIt it is the ciphertext of V.If HiE·VE< 0, then V does not existIn.If V does not existOn, it is possible to allow function export 1,
If as it has been described above, two summits of index rectangle are at identical half spaceMay determine that, inquiry matrix does not intersect with index matrix.When exporting four 0, matrix intersects.The details of crossing instances evaluation algorithm is as follows:
Cloud Server adopts above-mentioned algorithm to complete remaining search operation as basic tool.Γ is allowed to add overstocked R tree and Σ is Search Results.In the method for the invention, application BFT algorithm search Γ.First, the root of this algorithm accesses Γ and apply algorithm 1 to detect whether query context intersects with root node.If intersecting, the child that it will travel through all of from left to right.Otherwise, this algorithm stops and returning 0.For there being the node of grandchild node, if query context is non-intersect with it, algorithm will not access child nodes.But, when algorithm returns 1, this algorithm will travel through all of child nodes, and each child is carried out same operation.If the child of node is data point and algorithm return 1, searching algorithm will return all of child the element as Σ.Otherwise, other nodes of the Γ that this algorithm continues search for.
Γ is respectively adopted above-mentioned searching algorithm and calculates QexAnd Qin.Σ ex and Σ in respectively QexAnd QinDisaggregation.Therefore, if a data point occurs in Σ ex and Σ in, it should put into last disaggregation Σ *.Otherwise, data point will be placed in intermediate object program set Σ+.Then, Σ+and search token QexAnd QinIt is sent to TTP.TTP can filter out Σ+in erroneous point and return remaining point to Cloud Server.Finally, Cloud Server is put into remaining point in last results set Σ * and returns to user.
TTP filters out the method for error result:
TTP is overall situation trusted third party, so TTP holds ASPE key and AES key.TTP receives intermediate object program Σ+or Σ ex and search token Q from Cloud Server thereexAnd sQin
First TTP with matrix key M deciphering search token, can obtain connecing and external square in circular query context.Then euclidean geometry is utilized can to obtain the equation of circular query context.Then, TTP AES key is deciphered all of data point and the equation of the value substitution circle of point being judged, whether this point is in circle.If, this point is put into final disaggregation Σ * and otherwise filters out this point.
Finally, TTP by final disaggregation Σ * encrypting and transmitting to Cloud Server.
In sum, this method achieves the circular scope searching method of the spatial data for encryption efficiently while ensureing safety and privacy.

Claims (5)

1. the circular scope searching method for the spatial data of encryption, it is characterised in that comprise the following steps:
A. search user produces search token according to target circle query context, and search token is uploaded to Cloud Server;Described search token includes the first square and the second foursquare query context, and the first square is for connecing square in target circle, and the second square is the external square that target is circular;
B. Cloud Server scans for obtaining intermediate search results according to search token, and intermediate search results and search token are sent to trusted third party;In described Cloud Server, storage has the spatial data of encryption;
C. intermediate search results and search token are deciphered by trusted third party, check when plaintext which result is not in target circle query context, and will will return Cloud Server after the result filtration of mistake after remaining final Search Results re-encrypted;
D. final searched result is sent to search user by Cloud Server.
2. the circular scope searching method of a kind of spatial data for encryption according to claim 1, it is characterized in that, search for user described in step a and produce search token according to target circle query context method particularly includes: search user inputs the center of circle and the radius of circle, assume that the center of circle is for (X, Y), radius is R, then can obtain the first square query context QinFor { ( X - 2 2 R , Y - 2 2 R ) , ( X + 2 2 R , Y + 2 2 R ) } , Second square query context QexFor { (X-R, Y-R), (X+R, Y+R) }.
3. the circular scope searching method of a kind of spatial data for encryption according to claim 2, it is characterised in that described in step a, the first square and the second foursquare query context are uploaded to Cloud Server after ASPE AES is encrypted.
4. the circular scope searching method of a kind of spatial data for encryption according to claim 3, it is characterized in that, in Cloud Server described in step b, storage has the spatial data of encryption, the concrete encryption method of spatial data is: adopt R tree as data directory structure, under environment expressly, all of data point is all used corresponding grouping strategy to be divided into bucket, and bucket is the minimum enclosed rectangle of R tree, and the leaf node of R tree is corresponding to the data point of spatial database;Adopt ASPE AES that bucket is encrypted: to use V ∈ RdRepresenting the summit of minimum enclosed rectangle, and use ASPE AES to encrypt summit, the dimension of V is extended by ASPE AES, obtains V+=(VT|1)T, then pass through use matrix key M and be encrypted and obtain VE=M-1V+;Wherein, matrix key M is reversible (d+1) × (d+1) matrix;Then in Cloud Server, the spatial data of the encryption of storage at least includes the relation of encryption data point, the parent node of R tree and child nodes.
5. the circular scope searching method of a kind of spatial data for encryption according to claim 4, it is characterised in that the search token of Cloud Server described in step b scans for method particularly includes:
According to the first square query context generated in step a and the second square query context, judge whether four limits of query context intersect with bucket, if, then judge successively the child node of this node whether with the intersecting of query context, repeating inquiry till data point, crossing data point is also generated intermediate search results by all limits this step of backed off after random of traversal queries scope.
CN201610113032.1A 2016-02-29 2016-02-29 A kind of circular scope searching method for encrypted spatial data Active CN105791283B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610113032.1A CN105791283B (en) 2016-02-29 2016-02-29 A kind of circular scope searching method for encrypted spatial data

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610113032.1A CN105791283B (en) 2016-02-29 2016-02-29 A kind of circular scope searching method for encrypted spatial data

Publications (2)

Publication Number Publication Date
CN105791283A true CN105791283A (en) 2016-07-20
CN105791283B CN105791283B (en) 2018-09-21

Family

ID=56386742

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610113032.1A Active CN105791283B (en) 2016-02-29 2016-02-29 A kind of circular scope searching method for encrypted spatial data

Country Status (1)

Country Link
CN (1) CN105791283B (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109992995A (en) * 2019-03-05 2019-07-09 华南理工大学 A kind of protection of support position and inquiry privacy can search for encryption method
CN111026754A (en) * 2019-12-05 2020-04-17 中国科学院软件研究所 Safe and efficient circular range data uploading and querying method, corresponding storage medium and electronic device
CN111555861A (en) * 2020-04-30 2020-08-18 山东师范大学 Circular range query method and system in cloud environment based on position privacy protection
CN111597582A (en) * 2020-05-18 2020-08-28 北京思特奇信息技术股份有限公司 Method for constructing encrypted reverse order rectangular tree and space keyword query method

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2008005809A2 (en) * 2006-06-30 2008-01-10 Tele Atlas North America, Inc. Nearest search on adaptive index with variable compression
CN103258007A (en) * 2013-04-16 2013-08-21 中国科学院地理科学与资源研究所 Map annotation method and device by means of conflict detection mechanism
CN103984728A (en) * 2014-05-16 2014-08-13 西安交通大学 Range query integrity verification method for outsourcing space database
CN105307111A (en) * 2014-07-07 2016-02-03 南京理工大学常熟研究院有限公司 Position privacy protection method based on incremental neighbour inquiry

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2008005809A2 (en) * 2006-06-30 2008-01-10 Tele Atlas North America, Inc. Nearest search on adaptive index with variable compression
CN103258007A (en) * 2013-04-16 2013-08-21 中国科学院地理科学与资源研究所 Map annotation method and device by means of conflict detection mechanism
CN103984728A (en) * 2014-05-16 2014-08-13 西安交通大学 Range query integrity verification method for outsourcing space database
CN105307111A (en) * 2014-07-07 2016-02-03 南京理工大学常熟研究院有限公司 Position privacy protection method based on incremental neighbour inquiry

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
BOYANG WANG: ""Cicular Range Search on Encrypted Spatial Data"", 《IEEE CNS》 *

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109992995A (en) * 2019-03-05 2019-07-09 华南理工大学 A kind of protection of support position and inquiry privacy can search for encryption method
CN111026754A (en) * 2019-12-05 2020-04-17 中国科学院软件研究所 Safe and efficient circular range data uploading and querying method, corresponding storage medium and electronic device
CN111026754B (en) * 2019-12-05 2022-12-02 中国科学院软件研究所 Safe and efficient circular range data uploading and querying method, corresponding storage medium and electronic device
CN111555861A (en) * 2020-04-30 2020-08-18 山东师范大学 Circular range query method and system in cloud environment based on position privacy protection
CN111597582A (en) * 2020-05-18 2020-08-28 北京思特奇信息技术股份有限公司 Method for constructing encrypted reverse order rectangular tree and space keyword query method

Also Published As

Publication number Publication date
CN105791283B (en) 2018-09-21

Similar Documents

Publication Publication Date Title
Yiu et al. Enabling search services on outsourced private spatial data
Yiu et al. Design and analysis of a ranking approach to private location-based services
Liu et al. Accurate range query with privacy preservation for outsourced location-based service in IOT
CN109344640B (en) Subgraph matching method based on homomorphic encryption and polynomial computation
Li et al. An efficient blind filter: Location privacy protection and the access control in FinTech
CN105791283A (en) Circle range search method specific to encrypted spatial data
Palmieri et al. Spatial bloom filters: Enabling privacy in location-aware applications
Xiangyang et al. MUSE: an efficient and accurate verifiable privacy-preserving multikeyword text search over encrypted cloud data
Song et al. Privacy-preserving threshold-based image retrieval in cloud-assisted internet of things
Yang et al. Lightweight privacy-preserving spatial keyword query over encrypted cloud data
Zeng et al. P3GQ: a practical privacy-preserving generic location-based services query scheme
CN106250453A (en) The cipher text retrieval method of numeric type data based on cloud storage and device
Li et al. Secure semantic-aware search over dynamic spatial data in VANETs
Zhang et al. Blockchain-assisted data sharing supports deduplication for cloud storage
Guo et al. LuxGeo: Efficient and Security-Enhanced Geometric Range Queries
Sharma et al. MapSafe: A complete tool for achieving geospatial data sovereignty
Jacquez et al. Geospatial cryptography: enabling researchers to access private, spatially referenced, human subjects data for cancer control and prevention
Wang et al. Search ranges efficiently and compatibly as keywords over encrypted data
Talha et al. Facilitating secure and efficient spatial query processing on the cloud
Ren et al. Efficient privacy-preserving circular range search on outsourced spatial data
Cheng et al. Enabling secure and efficient kNN query processing over encrypted spatial data in the cloud
Song et al. Privacy-preserving reachability query over graphs with result verifiability
Song et al. Achieving Efficient and Privacy-Preserving Location-Based Task Recommendation in Spatial Crowdsourcing
Xu et al. Practical and privacy-preserving geo-social-based POI recommendation
Zhou et al. Efficient and Privacy-Preserving Query on Outsourced Spherical Data

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant