• Complex
  • Title
  • Keyword
  • Abstract
  • Scholars
  • Journal
  • ISSN
  • Conference
成果搜索

author:

Wang, Xiangyu (Wang, Xiangyu.) [1] | Ma, Jianfeng (Ma, Jianfeng.) [2] | Li, Feng (Li, Feng.) [3] | Liu, Ximeng (Liu, Ximeng.) [4] | Miao, Yinbin (Miao, Yinbin.) [5] | Deng, Robert H. (Deng, Robert H..) [6]

Indexed by:

EI

Abstract:

Structured Encryption (STE), which allows a server to provide secure search services on encrypted data structures, has been widely investigated in recent years. To meet expressive search requirements in practical applications, a large number of STE constructions have been proposed either on textual keywords or spatial data. However, STE on spatio-textual data, which are widely used in location-based services, has not been fully investigated. In this paper, we formally define the notion of Spatial Keyword Structured Encryption (SKSE) and propose several concrete SKSE constructions with various efficiency-security trade-offs. Firstly, we propose a basic construction with linear search complexity, which only leaks the private files matching both spatial range query and all query keywords. Then, to improve the search efficiency on large-scale datasets, we present a novel tree-based construction with sub-linear search complexity. Finally, we introduce a post-validation approach to remove false positives and further improve storage and search performance. Our constructions are general in the sense that they can be constructed from any hidden vector encryption schemes, including public-key setting and symmetric-key setting, which can meet different sharing requirements. Our rigorous security analysis and comprehensive performance evaluation demonstrate that the proposed constructions are secure and outperform the start-of-the-art solutions. © 2005-2012 IEEE.

Keyword:

Cryptography Digital storage Economic and social effects Efficiency Location based services Query processing Telecommunication services

Community:

  • [ 1 ] [Wang, Xiangyu]School of Cyber Engineering, And the Shaanxi Key Laboratory of Network and System Security, Xidian University, Xi'an, China
  • [ 2 ] [Ma, Jianfeng]School of Cyber Engineering, And the Shaanxi Key Laboratory of Network and System Security, Xidian University, Xi'an, China
  • [ 3 ] [Li, Feng]School of Cyber Engineering, And the Shaanxi Key Laboratory of Network and System Security, Xidian University, Xi'an, China
  • [ 4 ] [Liu, Ximeng]College of Mathematics and Computer Science, Fuzhou University, Fuzhou, China
  • [ 5 ] [Miao, Yinbin]School of Cyber Engineering, Xidian University, Xi'an, China
  • [ 6 ] [Miao, Yinbin]Guangxi Key Laboratory of Trusted Software, Guilin University of Electronic Technology, Guilin; 541004, China
  • [ 7 ] [Miao, Yinbin]Department of Computer Science, City University of Hong Kong, Hong Kong
  • [ 8 ] [Deng, Robert H.]School of Information Systems, Singapore Management University, Singapore

Reprint 's Address:

Email:

Show more details

Related Keywords:

Related Article:

Source :

IEEE Transactions on Information Forensics and Security

ISSN: 1556-6013

Year: 2021

Volume: 16

Page: 4909-4923

7 . 2 3 1

JCR@2021

6 . 3 0 0

JCR@2023

ESI HC Threshold:106

JCR Journal Grade:1

CAS Journal Grade:1

Cited Count:

WoS CC Cited Count: 0

SCOPUS Cited Count:

ESI Highly Cited Papers on the List: 0 Unfold All

WanFang Cited Count:

Chinese Cited Count:

30 Days PV: 1

Affiliated Colleges:

Online/Total:293/10875040
Address:FZU Library(No.2 Xuyuan Road, Fuzhou, Fujian, PRC Post Code:350116) Contact Us:0591-22865326
Copyright:FZU Library Technical Support:Beijing Aegean Software Co., Ltd. 闽ICP备05005463号-1