TY - GEN
T1 - Circular Range Search on Encrypted Spatial Data
AU - Wang, Boyang
AU - Li, Ming
AU - Wang, Haitao
AU - Li, Hui
N1 - Publisher Copyright:
© 2015 IEEE.
PY - 2015/7/22
Y1 - 2015/7/22
N2 - Searchable encryption is a promising technique enabling meaningful search operations to be performed on encrypted databases while protecting user privacy from untrusted third-party service providers. However, while most of the existing works focus on common SQL queries, geometric queries on encrypted spatial data have not been well studied. Especially, circular range search is an important type of geometric query on spatial data which has wide applications, such as proximity testing in Location-Based Services and Delaunay triangulation in computational geometry. In this poster, we propose two novel symmetric-key searchable encryption schemes supporting circular range search. Informally, both of our schemes can correctly verify whether a point is inside a circle on encrypted spatial data without revealing data privacy or query privacy to a semi-honest cloud server. We formally define the security of our proposed schemes, prove that they are secure under Selective Chosen-Plaintext Attacks, and evaluate their performance through experiments in a real-world cloud platform (Amazon EC2). To the best of our knowledge, this work represents the first study in secure circular range search on encrypted spatial data.
AB - Searchable encryption is a promising technique enabling meaningful search operations to be performed on encrypted databases while protecting user privacy from untrusted third-party service providers. However, while most of the existing works focus on common SQL queries, geometric queries on encrypted spatial data have not been well studied. Especially, circular range search is an important type of geometric query on spatial data which has wide applications, such as proximity testing in Location-Based Services and Delaunay triangulation in computational geometry. In this poster, we propose two novel symmetric-key searchable encryption schemes supporting circular range search. Informally, both of our schemes can correctly verify whether a point is inside a circle on encrypted spatial data without revealing data privacy or query privacy to a semi-honest cloud server. We formally define the security of our proposed schemes, prove that they are secure under Selective Chosen-Plaintext Attacks, and evaluate their performance through experiments in a real-world cloud platform (Amazon EC2). To the best of our knowledge, this work represents the first study in secure circular range search on encrypted spatial data.
UR - http://www.scopus.com/inward/record.url?scp=84944322225&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=84944322225&partnerID=8YFLogxK
U2 - 10.1109/ICDCS.2015.113
DO - 10.1109/ICDCS.2015.113
M3 - Conference contribution
AN - SCOPUS:84944322225
T3 - Proceedings - International Conference on Distributed Computing Systems
SP - 794
EP - 795
BT - Proceedings - 2015 IEEE 35th International Conference on Distributed Computing Systems, ICDCS 2015
PB - Institute of Electrical and Electronics Engineers Inc.
T2 - 35th IEEE International Conference on Distributed Computing Systems, ICDCS 2015
Y2 - 29 June 2015 through 2 July 2015
ER -