Efficient Privacy-Preserving Range Query With Leakage Suppressed for Encrypted Data in Cloud-Based Internet of Things

Data owners are increasingly drawn to outsource their data due to the massive processing capabilities and scalable storage offered by cloud-based Internet of Things (IoT) solutions. To protect user privacy, the acquired data may be encrypted; however, this often presents challenges for efficiently s...

Full description

Saved in:
Bibliographic Details
Main Authors: Sultan Basudan, Abdulrahman Alamer
Format: Article
Language:English
Published: IEEE 2024-01-01
Series:IEEE Access
Subjects:
Online Access:https://ieeexplore.ieee.org/document/10792901/
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1850251050419748864
author Sultan Basudan
Abdulrahman Alamer
author_facet Sultan Basudan
Abdulrahman Alamer
author_sort Sultan Basudan
collection DOAJ
description Data owners are increasingly drawn to outsource their data due to the massive processing capabilities and scalable storage offered by cloud-based Internet of Things (IoT) solutions. To protect user privacy, the acquired data may be encrypted; however, this often presents challenges for efficiently searching the data. Although encrypted range queries are among the most commonly used techniques and have been extensively studied, several issues persist within current systems. Specifically, these systems may inadvertently disclose the order relationship between the encrypted index and the upper and lower bounds of a range query, rendering them vulnerable to inference attacks that enable an attacker to uncover the user’s attribute values. To address these challenges, we propose an effective privacy-preserving range query with leakage suppressed approach. The proposed method transforms range comparisons into set intersections, thereby successfully concealing the relationship between the encrypted index and the upper and lower bounds. Consequently, to perform range queries safely and efficiently, we construct an encrypted bloom filter. This ensures that the proposed plan can effectively thwart inference attacks. Furthermore, we incorporate a point-value function polynomial technique into the proposed protocol to facilitate straightforward verification of the query results. A comprehensive security analysis demonstrates the effectiveness of our approach in achieving the stated design goals. Performance evaluations illustrate the practical applicability of the proposed scheme by demonstrating its scalability and feasibility.
format Article
id doaj-art-7aed33a955fc48b682e5afd608e0684b
institution OA Journals
issn 2169-3536
language English
publishDate 2024-01-01
publisher IEEE
record_format Article
series IEEE Access
spelling doaj-art-7aed33a955fc48b682e5afd608e0684b2025-08-20T01:58:00ZengIEEEIEEE Access2169-35362024-01-011218765218766410.1109/ACCESS.2024.351504210792901Efficient Privacy-Preserving Range Query With Leakage Suppressed for Encrypted Data in Cloud-Based Internet of ThingsSultan Basudan0https://orcid.org/0000-0001-5874-2478Abdulrahman Alamer1https://orcid.org/0000-0002-1061-7093Computer Science Department, Jazan University, Jazan, Saudi ArabiaComputer Science Department, Jazan University, Jazan, Saudi ArabiaData owners are increasingly drawn to outsource their data due to the massive processing capabilities and scalable storage offered by cloud-based Internet of Things (IoT) solutions. To protect user privacy, the acquired data may be encrypted; however, this often presents challenges for efficiently searching the data. Although encrypted range queries are among the most commonly used techniques and have been extensively studied, several issues persist within current systems. Specifically, these systems may inadvertently disclose the order relationship between the encrypted index and the upper and lower bounds of a range query, rendering them vulnerable to inference attacks that enable an attacker to uncover the user’s attribute values. To address these challenges, we propose an effective privacy-preserving range query with leakage suppressed approach. The proposed method transforms range comparisons into set intersections, thereby successfully concealing the relationship between the encrypted index and the upper and lower bounds. Consequently, to perform range queries safely and efficiently, we construct an encrypted bloom filter. This ensures that the proposed plan can effectively thwart inference attacks. Furthermore, we incorporate a point-value function polynomial technique into the proposed protocol to facilitate straightforward verification of the query results. A comprehensive security analysis demonstrates the effectiveness of our approach in achieving the stated design goals. Performance evaluations illustrate the practical applicability of the proposed scheme by demonstrating its scalability and feasibility.https://ieeexplore.ieee.org/document/10792901/Internet of Thingscloud dataprivacy-preservationbloom filterrange query
spellingShingle Sultan Basudan
Abdulrahman Alamer
Efficient Privacy-Preserving Range Query With Leakage Suppressed for Encrypted Data in Cloud-Based Internet of Things
IEEE Access
Internet of Things
cloud data
privacy-preservation
bloom filter
range query
title Efficient Privacy-Preserving Range Query With Leakage Suppressed for Encrypted Data in Cloud-Based Internet of Things
title_full Efficient Privacy-Preserving Range Query With Leakage Suppressed for Encrypted Data in Cloud-Based Internet of Things
title_fullStr Efficient Privacy-Preserving Range Query With Leakage Suppressed for Encrypted Data in Cloud-Based Internet of Things
title_full_unstemmed Efficient Privacy-Preserving Range Query With Leakage Suppressed for Encrypted Data in Cloud-Based Internet of Things
title_short Efficient Privacy-Preserving Range Query With Leakage Suppressed for Encrypted Data in Cloud-Based Internet of Things
title_sort efficient privacy preserving range query with leakage suppressed for encrypted data in cloud based internet of things
topic Internet of Things
cloud data
privacy-preservation
bloom filter
range query
url https://ieeexplore.ieee.org/document/10792901/
work_keys_str_mv AT sultanbasudan efficientprivacypreservingrangequerywithleakagesuppressedforencrypteddataincloudbasedinternetofthings
AT abdulrahmanalamer efficientprivacypreservingrangequerywithleakagesuppressedforencrypteddataincloudbasedinternetofthings