Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Circular range query method and system in cloud environment based on position privacy protection

A privacy protection and query method technology, which is applied in the circular range query field in the cloud environment, can solve problems such as circular range query difficulties, ciphertexts cannot directly reveal query results, and limit query use, so as to reduce query time and solve security problems. Hidden dangers, the effect of improving query efficiency

Active Publication Date: 2020-08-18
SHANDONG NORMAL UNIV
View PDF8 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Since the currently effective cryptographic primitives are not suitable for performing "calculation-comparison" operations on ciphertexts, among them, the pseudo-random function (Pseudo Random Function, PRF) can only perform equivalence tests on ciphertexts, and order-preserving encryption (Order- Preserving Encryption (OPE) can only compare the size between ciphertexts, Partially Homomorphic Encryption (PHE) can only calculate addition (such as Paillier encryption) or multiplication (such as Elgamal encryption) of ciphertexts, and fully homomorphic encryption (Fully Homomorphic Encryption, FHE) can theoretically safely perform "computation-comparison" operations, but performing calculations on ciphertexts with fully homomorphic encryption cannot directly reveal query results (such as the data point is inside or outside the circle), which is limits its use on queries
Therefore, it is difficult to perform "compute-compare" operations on encrypted spatial data points in the cloud environment to perform circular range queries

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Circular range query method and system in cloud environment based on position privacy protection
  • Circular range query method and system in cloud environment based on position privacy protection
  • Circular range query method and system in cloud environment based on position privacy protection

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0057] Embodiment 1 of the present disclosure provides a method for querying a circular range in a cloud environment based on location privacy protection, which is applied to a location query terminal and includes the following steps:

[0058] The location query terminal requests the location server for the key pair of the location query terminal, the atomic area code of the area where the query location is located, and the key pair of the hash function, and obtains the atomic area code of the query area encrypted by the public key of the location query terminal;

[0059] The location query terminal uses the private key to decrypt the atomic area code of the query area, and determines the atomic area set within the query range and the atomic area set intersecting the query range boundary according to the circular query range, and the circular query range represented by the query position and radius Convert to query vector form;

[0060] The location query terminal uses the has...

Embodiment 2

[0109] Embodiment 2 of the present disclosure provides a circular range query device in a cloud environment based on location privacy protection, including a processor, including the following steps:

[0110] The processor requests the key pair of the processor, the atomic area code of the area where the query location is located, and the key pair of the hash function from the location server, and obtains the atomic area code of the query area encrypted by the public key of the processor;

[0111] The processor uses the private key to decrypt and obtain the atomic area code of the query area, determines the set of atomic areas within the query range and the set of atomic areas intersecting the boundary of the query range according to the circular query range, and converts the circular query range represented by the query position and radius to In query vector form;

[0112] The processor performs hash processing on the atomic region set within the range and the atomic region c...

Embodiment 3

[0116] Embodiment 3 of the present disclosure provides a circular range query method in a cloud environment based on location privacy protection, which is applied to a location server and includes the following steps:

[0117] The location server generates the key required for the encryption vector and the key of the hash function, and at the same time generates a unique key pair for each location query terminal;

[0118] The location server uses the Hilbert curve to divide the area to be queried into a collection of multiple atomic areas, stores and manages the spatial data points in units of atomic areas, and constructs a position vector and index for each spatial data point;

[0119] The location server encrypts the index and sends it to the cloud server, so that the cloud server judges the relationship between the query range and the spatial data according to the location vector in the encrypted index and the encrypted query vector in the token to obtain the final query res...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a circular range query method and system in a cloud environment based on position privacy protection. The method and the system belong to the technical field of location privacyprotection. The method comprises the steps of converting a relational expression between the spatial data point and a circular range which takes the query position as a circle center and r as a radius into an inner product of two vector sums, and judging a relationship between the inner product and zero by utilizing SSW confidentiality, so as to determine the relationship between the spatial datapoint and the circular range under the condition of not leaking the spatial data point and the query position; meanwhile, a Hilbert curve is used for dividing a region into atomic regions, and a spatial data set is stored and managed according to the atomic regions, so that the query efficiency is improved; the circular range query can be realized while the query privacy of the position query terminal and the data privacy of the position server are protected, and the potential safety hazard caused by spatial data outsourcing is solved.

Description

technical field [0001] The present disclosure relates to the technical field of location privacy protection, and in particular to a circular range query method and system in a cloud environment based on location privacy protection. Background technique [0002] The statements in this section merely provide background information related to the present disclosure and may not necessarily constitute prior art. [0003] With the development of wireless communication and mobile positioning technology, location services are popular in location query terminals, and inject new vitality into social networks, smart medical care, Internet of Things and other fields. When a location query terminal requests a location service from a location service provider, it needs to submit the query location and query content, which may imply information such as the home address, work location, living habits, and health status of the location query terminal. The personal and property safety of the ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/06H04L9/08H04L29/06G06F16/22G06F16/29
CPCH04L63/0428H04L9/0872H04L9/0643H04L63/06H04L63/0876G06F16/29G06F16/2237
Inventor 吴磊刘召曼
Owner SHANDONG NORMAL UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products