4.6 Article

Enabling Privacy-Preserving Geographic Range Query in Fog-Enhanced IoT Services

Related references

Note: Only part of the references are listed.
Article Computer Science, Artificial Intelligence

GraphShield: Dynamic Large Graphs for Secure Queries With Forward Privacy

Minxin Du et al.

Summary: This paper proposes GraphShield, a structured encryption scheme for graphs, which extends existing searchable symmetric encryption schemes and supports various classic graph-based queries and complex analytics, with forward privacy and adaptive security guaranteed.

IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING (2022)

Article Computer Science, Hardware & Architecture

Match in My Way: Fine-Grained Bilateral Access Control for Secure Cloud-Fog Computing

Shengmin Xu et al.

Summary: This article introduces a cloud-fog-device data sharing system based on matchmaking attribute-based encryption (MABE), which provides data confidentiality and data source identification simultaneously. The system offers secure fine-grained bilateral access control and performance optimization, outperforming related solutions in terms of functionality and performance.

IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING (2022)

Article Computer Science, Hardware & Architecture

Decentralized Blockchain-Based Trust Management Protocol for the Internet of Things

Djamel Eddine Kouicem et al.

Summary: The Internet of Things (IoT) faces various security challenges, and existing trust management solutions do not meet its requirements. This article proposes a blockchain-based trust management protocol that supports mobility and distributed dissemination of trust information. The efficiency and superiority of the protocol are confirmed through theoretical analysis and simulations.

IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING (2022)

Article Computer Science, Theory & Methods

A Privacy-Preserving Online Ride-Hailing System Without Involving a Third Trusted Server

Hongcheng Xie et al.

Summary: The increasing popularity of Online Ride-hailing services has greatly facilitated daily travel, but also raised privacy concerns. This paper proposes a new ride-matching scheme for ORH systems that allows privacy-preserving and effective distance calculation without involving a third-party server. The scheme enhances security and efficiency for ORH systems, protecting both user privacy and improving matching accuracy.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2021)

Article Computer Science, Hardware & Architecture

Providing Task Allocation and Secure Deduplication for Mobile Crowdsensing via Fog Computing

Jianbing Ni et al.

IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING (2020)

Article Computer Science, Theory & Methods

Privbus: A privacy-enhanced crowdsourced bus service via fog computing

Yuanyuan He et al.

JOURNAL OF PARALLEL AND DISTRIBUTED COMPUTING (2020)

Proceedings Paper Computer Science, Hardware & Architecture

Practical and Secure Circular Range Search on Private Spatial Data

Zhihao Zheng et al.

2020 IEEE 19TH INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM 2020) (2020)

Proceedings Paper Computer Science, Hardware & Architecture

Search Me in the Dark: Privacy-preserving Boolean Range Query over Encrypted Spatial Data

Xiangyu Wang et al.

IEEE INFOCOM 2020 - IEEE CONFERENCE ON COMPUTER COMMUNICATIONS (2020)

Article Computer Science, Theory & Methods

PriRadar: A Privacy-Preserving Framework for Spatial Crowdsourcing

Dong Yuan et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2020)

Article Computer Science, Hardware & Architecture

FastGeo: Efficient Geometric Range Queries on Encrypted Spatial Data

Boyang Wang et al.

IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING (2019)

Article Computer Science, Theory & Methods

Enabling Efficient and Geometric Range Query With Access Control Over Encrypted Spatial Data

Guowen Xu et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2019)

Article Engineering, Electrical & Electronic

Fog-Enabled Smart Health: Toward Cooperative and Secure Healthcare Service Provision

Wenjuan Tang et al.

IEEE COMMUNICATIONS MAGAZINE (2019)

Article Telecommunications

Efficient LBS queries with mutual privacy preservation in IoV

Shushu Liu et al.

VEHICULAR COMMUNICATIONS (2019)

Article Computer Science, Theory & Methods

pRide: Privacy-Preserving Ride Matching Over Road Networks for Online Ride-Hailing Service

Yuchuan Luo et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2019)

Article Computer Science, Theory & Methods

Towards Efficient Fine-Grained Access Control and Trustworthy Data Processing for Remote Monitoring Services in IoT

Yaxing Chen et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2019)

Article Engineering, Electrical & Electronic

Toward Cloud-Assisted Industrial IoT Platform for Large-Scale Continuous Condition Monitoring

Gang Wang et al.

PROCEEDINGS OF THE IEEE (2019)

Article Computer Science, Information Systems

A New Communication-Efficient Privacy-Preserving Range Query Scheme in Fog-Enhanced IoT

Rongxing Lu

IEEE INTERNET OF THINGS JOURNAL (2019)

Article Computer Science, Information Systems

Secure and Efficient K Nearest Neighbor Query Over Encrypted Uncertain Data in Cloud-IoT Ecosystem

Cheng Guo et al.

IEEE INTERNET OF THINGS JOURNAL (2019)

Proceedings Paper Computer Science, Information Systems

Mitigating Leakage in Secure Cloud-Hosted Data Structures: Volume-Hiding for Multi-Maps via Hashing

Sarvar Patel et al.

PROCEEDINGS OF THE 2019 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'19) (2019)

Proceedings Paper Computer Science, Information Systems

Encrypted Databases: New Volume Attacks against Range Queries

Zichen Gui et al.

PROCEEDINGS OF THE 2019 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'19) (2019)

Proceedings Paper Computer Science, Theory & Methods

Learning to Reconstruct: Statistical Learning Theory and Encrypted Database Attacks

Paul Grubbs et al.

2019 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP 2019) (2019)

Proceedings Paper Computer Science, Information Systems

Computationally Volume-Hiding Structured Encryption

Seny Kamara et al.

ADVANCES IN CRYPTOLOGY - EUROCRYPT 2019, PT II (2019)

Article Computer Science, Information Systems

Securing Fog Computing for Internet of Things Applications: Challenges and Solutions

Jianbing Ni et al.

IEEE COMMUNICATIONS SURVEYS AND TUTORIALS (2018)

Article Computer Science, Hardware & Architecture

Searchable Encryption over Feature-Rich Data

Qian Wang et al.

IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING (2018)

Proceedings Paper Computer Science, Theory & Methods

Pump up the Volume: Practical Database Reconstruction from Volume Leakage on Range Queries

Paul Grubbs et al.

PROCEEDINGS OF THE 2018 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'18) (2018)

Proceedings Paper Computer Science, Theory & Methods

Improved Reconstruction Attacks on Encrypted Data Using Range Query Leakage

Marie-Sarah Lacharite et al.

2018 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP) (2018)

Article Computer Science, Hardware & Architecture

Efficient location privacy algorithm for Internet of Things (IoT) services and applications

Gang Sun et al.

JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2017)

Proceedings Paper Computer Science, Information Systems

Leakage-Abuse Attacks against Order-Revealing Encryption

Paul Grubbs et al.

2017 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP) (2017)

Article Remote Sensing

Privacy-Aware Dynamic Ride Sharing

Preeti Goel et al.

ACM TRANSACTIONS ON SPATIAL ALGORITHMS AND SYSTEMS (2016)

Proceedings Paper Computer Science, Information Systems

Practical Order-Revealing Encryption with Limited Leakage

Nathan Chenette et al.

FAST SOFTWARE ENCRYPTION (FSE 2016) (2016)

Proceedings Paper Computer Science, Information Systems

Leakage-Abuse Attacks Against Searchable Encryption

David Cash et al.

CCS'15: PROCEEDINGS OF THE 22ND ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (2015)

Article Computer Science, Information Systems

Finding your Way in the Definition Fog: Towards a Comprehensive of Fog Computing

Luis M. Vaquero et al.

ACM SIGCOMM COMPUTER COMMUNICATION REVIEW (2014)

Article Computer Science, Artificial Intelligence

Analysis of the clustering properties of the Hilbert space-filling curve

B Moon et al.

IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING (2001)