Pystin: Enabling Secure LBS in Smart Cities With Privacy-Preserving Top- $k$ Spatial–Textual Query

The convergence of technologies like Cloud computing, mobile, and smart phone technologies has led to the rapid development of location-based services (LBS) in smart cities. For flexibility and cost savings, there is a recent trend to migrate LBS to the Cloud, however it poses a serious threat to the user privacy. In this paper, we present a new privacy preserving top-<inline-formula> <tex-math notation="LaTeX">$k$ </tex-math></inline-formula> spatio-textual keyword (<inline-formula> <tex-math notation="LaTeX">$\text{T}{k}$ </tex-math></inline-formula>SK) query scheme, called privacy-preserving spatio-textual index (Pystin), which is performed over outsourced Cloud and can enable secure LBS in smart cities. In Pystin, a query user’s accurate location is protected by the combination of Boneh–Goh–Nissim homomorphic encryption and hash bucket techniques, and the privacy of textual information are persevered by a one-way hash function. In addition, a quad-tree-based spatio-textual indexing is integrated into Pystin to further reduce the query latency. Detailed security analyzes show that the proposed Pystin scheme is indeed a privacy-preserving <inline-formula> <tex-math notation="LaTeX">$\text{T}{k}$ </tex-math></inline-formula>SK query scheme. Furthermore, extensive experiments are conducted, and results confirm the scalability, efficiency properties of our proposed Pystin scheme.

[1]  Jon Louis Bentley,et al.  Quad trees a data structure for retrieval on composite keys , 1974, Acta Informatica.

[2]  Jianliang Xu,et al.  Processing private queries over untrusted data cloud through privacy homomorphism , 2011, 2011 IEEE 27th International Conference on Data Engineering.

[3]  Cyrus Shahabi,et al.  Blind Evaluation of Nearest Neighbor Queries Using Space Transformation to Preserve Location Privacy , 2007, SSTD.

[4]  Walid G. Aref,et al.  Casper*: Query processing for location services without compromising privacy , 2006, TODS.

[5]  Gerard Salton,et al.  Term-Weighting Approaches in Automatic Text Retrieval , 1988, Inf. Process. Manag..

[6]  Wei Jiang,et al.  Secure k-nearest neighbor query over encrypted data in outsourced environments , 2013, 2014 IEEE 30th International Conference on Data Engineering.

[7]  Rafail Ostrovsky,et al.  Searchable symmetric encryption: Improved definitions and efficient constructions , 2011, J. Comput. Secur..

[8]  P. Vishvapathi,et al.  Privacy-Preserving Multi-keyword Ranked Search over Encrypted Cloud Data , 2022 .

[9]  P. Santhi Thilagam,et al.  Approaches and challenges of privacy preserving search over encrypted data , 2019, Information Systems.

[10]  W. Bruce Croft,et al.  A language modeling approach to information retrieval , 1998, SIGIR '98.

[11]  Christian S. Jensen,et al.  Spatial Keyword Query Processing: An Experimental Evaluation , 2013, Proc. VLDB Endow..

[12]  Anthony K. H. Tung,et al.  Scalable top-k spatial keyword search , 2013, EDBT '13.

[13]  Panos Kalnis,et al.  Outsourcing Search Services on Private Spatial Data , 2009, 2009 IEEE 25th International Conference on Data Engineering.

[14]  Gerard Salton,et al.  A vector space model for automatic indexing , 1975, CACM.

[15]  João B. Rocha-Junior,et al.  Efficient Processing of Top-k Spatial Keyword Queries , 2011, SSTD.

[16]  Brent Waters,et al.  Conjunctive, Subset, and Range Queries on Encrypted Data , 2007, TCC.

[17]  Tetsuji Satoh,et al.  Protection of Location Privacy using Dummies for Location-based Services , 2005, 21st International Conference on Data Engineering Workshops (ICDEW'05).

[18]  Ling Liu,et al.  Location Privacy in Mobile Systems: A Personalized Anonymization Model , 2005, 25th IEEE International Conference on Distributed Computing Systems (ICDCS'05).

[19]  Cong Wang,et al.  Secure Ranked Keyword Search over Encrypted Cloud Data , 2010, 2010 IEEE 30th International Conference on Distributed Computing Systems.

[20]  Xiang Cheng,et al.  Privacy-Preserving Top-k Spatial Keyword Queries in Untrusted Cloud Environments , 2018, IEEE Transactions on Services Computing.

[21]  Christian S. Jensen,et al.  Efficient Retrieval of the Top-k Most Relevant Spatial Web Objects , 2009, Proc. VLDB Endow..

[22]  Dan Boneh,et al.  Evaluating 2-DNF Formulas on Ciphertexts , 2005, TCC.

[23]  Marco Gruteser,et al.  USENIX Association , 1992 .

[24]  Massimo Barbaro,et al.  A Face Is Exposed for AOL Searcher No , 2006 .