4.6 Article

Leakage-Suppressed Range Query Scheme for Structured Data in IoT

期刊

IEEE SYSTEMS JOURNAL
卷 16, 期 3, 页码 3531-3542

出版社

IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
DOI: 10.1109/JSYST.2021.3090465

关键词

Indexes; Servers; Encryption; Privacy; Data models; Internet of Things; Search problems; Bloom filter; data privacy; Internet of Things (IoT); range query; structured encryption

资金

  1. Key Research and Development Program of Shaanxi [2021ZDLGY06-04, 61303217, 61502372]
  2. Guangxi Key Laboratory of Cryptography and Information Security [GCIS201802]

向作者/读者索取更多资源

This article encrypts attribute values using methods such as Bloom filters to effectively prevent inference attacks, while hiding user search patterns by multiplying by a large number to protect user privacy. The simulation evaluation showed better performance compared to existing schemes, demonstrating the effectiveness of the proposed encryption methods in protecting user data.
The structured data collected by the Internet of Things can be encrypted for protecting the user's privacy. Range query can be used to get the expected data with some specific attributes among the encrypted data, that is, given the upper and lower limits $(x, y)$ of a certain attribute, the range query will get all the records whose corresponding attribute values are in $(x, y)$. However, in the structured encryption scheme with range query, there is a certain amount of information leakage, which will lead to the so-called inference attacks, i.e., the attacker can obtain the user's attribute values. To hide attribute values and their relationship, this article transformed the problem of the numerical comparison between two attribute values into the problem of the intersection of two sets. By using the Bloom filter, the elements in the attribute value collection are recorded and determined whether the intersection of the two sets is empty. This ensures that our scheme effectively resists inference attacks. Besides, by multiplying the endpoints of the range interval by a large number, we gave an improved scheme to hide the user's search pattern. In the query process, our scheme will not leak the upper and lower limits of the range value and will not leak the relationship between the attribute value and the range interval. This will prevent the attacker from inducing the relationship of attribute values by multiple range queries. Finally, we conducted a simulation evaluation of the scheme by using the published novel coronavirus pneumonia data, and the results show that our scheme has a better performance than the existing schemes.

作者

我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。

评论

主要评分

4.6
评分不足

次要评分

新颖性
-
重要性
-
科学严谨性
-
评价这篇论文

推荐

暂无数据
暂无数据