Efficient Privacy-Preserving Range Query With Leakage Suppressed for Encrypted Data in Cloud-Based Internet of Things
Data owners are increasingly drawn to outsource their data due to the massive processing capabilities and scalable storage offered by cloud-based Internet of Things (IoT) solutions. To protect user privacy, the acquired data may be encrypted; however, this often presents challenges for efficiently s...
Saved in:
| Main Authors: | , |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
IEEE
2024-01-01
|
| Series: | IEEE Access |
| Subjects: | |
| Online Access: | https://ieeexplore.ieee.org/document/10792901/ |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
| _version_ | 1850251050419748864 |
|---|---|
| author | Sultan Basudan Abdulrahman Alamer |
| author_facet | Sultan Basudan Abdulrahman Alamer |
| author_sort | Sultan Basudan |
| collection | DOAJ |
| description | Data owners are increasingly drawn to outsource their data due to the massive processing capabilities and scalable storage offered by cloud-based Internet of Things (IoT) solutions. To protect user privacy, the acquired data may be encrypted; however, this often presents challenges for efficiently searching the data. Although encrypted range queries are among the most commonly used techniques and have been extensively studied, several issues persist within current systems. Specifically, these systems may inadvertently disclose the order relationship between the encrypted index and the upper and lower bounds of a range query, rendering them vulnerable to inference attacks that enable an attacker to uncover the user’s attribute values. To address these challenges, we propose an effective privacy-preserving range query with leakage suppressed approach. The proposed method transforms range comparisons into set intersections, thereby successfully concealing the relationship between the encrypted index and the upper and lower bounds. Consequently, to perform range queries safely and efficiently, we construct an encrypted bloom filter. This ensures that the proposed plan can effectively thwart inference attacks. Furthermore, we incorporate a point-value function polynomial technique into the proposed protocol to facilitate straightforward verification of the query results. A comprehensive security analysis demonstrates the effectiveness of our approach in achieving the stated design goals. Performance evaluations illustrate the practical applicability of the proposed scheme by demonstrating its scalability and feasibility. |
| format | Article |
| id | doaj-art-7aed33a955fc48b682e5afd608e0684b |
| institution | OA Journals |
| issn | 2169-3536 |
| language | English |
| publishDate | 2024-01-01 |
| publisher | IEEE |
| record_format | Article |
| series | IEEE Access |
| spelling | doaj-art-7aed33a955fc48b682e5afd608e0684b2025-08-20T01:58:00ZengIEEEIEEE Access2169-35362024-01-011218765218766410.1109/ACCESS.2024.351504210792901Efficient Privacy-Preserving Range Query With Leakage Suppressed for Encrypted Data in Cloud-Based Internet of ThingsSultan Basudan0https://orcid.org/0000-0001-5874-2478Abdulrahman Alamer1https://orcid.org/0000-0002-1061-7093Computer Science Department, Jazan University, Jazan, Saudi ArabiaComputer Science Department, Jazan University, Jazan, Saudi ArabiaData owners are increasingly drawn to outsource their data due to the massive processing capabilities and scalable storage offered by cloud-based Internet of Things (IoT) solutions. To protect user privacy, the acquired data may be encrypted; however, this often presents challenges for efficiently searching the data. Although encrypted range queries are among the most commonly used techniques and have been extensively studied, several issues persist within current systems. Specifically, these systems may inadvertently disclose the order relationship between the encrypted index and the upper and lower bounds of a range query, rendering them vulnerable to inference attacks that enable an attacker to uncover the user’s attribute values. To address these challenges, we propose an effective privacy-preserving range query with leakage suppressed approach. The proposed method transforms range comparisons into set intersections, thereby successfully concealing the relationship between the encrypted index and the upper and lower bounds. Consequently, to perform range queries safely and efficiently, we construct an encrypted bloom filter. This ensures that the proposed plan can effectively thwart inference attacks. Furthermore, we incorporate a point-value function polynomial technique into the proposed protocol to facilitate straightforward verification of the query results. A comprehensive security analysis demonstrates the effectiveness of our approach in achieving the stated design goals. Performance evaluations illustrate the practical applicability of the proposed scheme by demonstrating its scalability and feasibility.https://ieeexplore.ieee.org/document/10792901/Internet of Thingscloud dataprivacy-preservationbloom filterrange query |
| spellingShingle | Sultan Basudan Abdulrahman Alamer Efficient Privacy-Preserving Range Query With Leakage Suppressed for Encrypted Data in Cloud-Based Internet of Things IEEE Access Internet of Things cloud data privacy-preservation bloom filter range query |
| title | Efficient Privacy-Preserving Range Query With Leakage Suppressed for Encrypted Data in Cloud-Based Internet of Things |
| title_full | Efficient Privacy-Preserving Range Query With Leakage Suppressed for Encrypted Data in Cloud-Based Internet of Things |
| title_fullStr | Efficient Privacy-Preserving Range Query With Leakage Suppressed for Encrypted Data in Cloud-Based Internet of Things |
| title_full_unstemmed | Efficient Privacy-Preserving Range Query With Leakage Suppressed for Encrypted Data in Cloud-Based Internet of Things |
| title_short | Efficient Privacy-Preserving Range Query With Leakage Suppressed for Encrypted Data in Cloud-Based Internet of Things |
| title_sort | efficient privacy preserving range query with leakage suppressed for encrypted data in cloud based internet of things |
| topic | Internet of Things cloud data privacy-preservation bloom filter range query |
| url | https://ieeexplore.ieee.org/document/10792901/ |
| work_keys_str_mv | AT sultanbasudan efficientprivacypreservingrangequerywithleakagesuppressedforencrypteddataincloudbasedinternetofthings AT abdulrahmanalamer efficientprivacypreservingrangequerywithleakagesuppressedforencrypteddataincloudbasedinternetofthings |