Abstract
Outsourcing encrypted data to a powerful cloud is an efficient way to provide Location Based Service (LBS) in the Internet of Vehicles (IoV) while reducing the local overhead for vehicular LBS queries. However, existing schemes do not account for the numerous concurrent connections to the cloud while querying encrypted data on cloud servers. It poses huge challenges to the privacy-preserving and request efficiency of vehicle users. The purpose of this article is to identify the privacy and request efficiency concerns. Then, a Fog-Assisted Privacy Preserving (FAPP) scheme for vehicular LBS requests is proposed. By introducing the fog device to aggregate requests, the FAPP scheme solves the congestion problem of simultaneous massive requests. Additionally, while executing a vehicular LBS query, it uses R-tree and homomorphic encryption techniques to safeguard user privacy. The experimental findings demonstrate that, in comparison to other query strategies, the FAPP scheme is more efficient for vehicular LBS query and privacy preservation.
Similar content being viewed by others
Data availability
We understand that our manuscript and associated personal data will be shared with Research Square for the delivery of the author dashboard.
References
Bobed, C., Bernad, J., Ilarri, S., & Mena, E. (2017). Probabilistic location-dependent queries at different location granularities. Pervasive and Mobile Computing, 39, 304–321.
Pham, H.; Woodworth, J.; Amini Salehi, M., Survey on secure search over encrypted data on the cloud. Concurrency and Computation: Practice and Experience 2019.
Zhu, H., Lu, R., Huang, C., Chen, L., & Li, H. (2016). An efficient privacy-preserving location-based services query scheme in outsourced cloud. IEEE Transactions on Vehicular Technology, 65(9), 7729–7739.
Li, L., Lu, R., & Huang, C. (2016). EPLQ: efficient privacy-preserving location-based query over outsourced encrypted data. IEEE Internet of Things Journal, 3(2), 206–218.
Guo, Z., Zhang, H., Sun, C., Wen, Q., & Li, W. (2018). Secure multi-keyword ranked search over encrypted cloud data for multiple data owners. Journal of Systems and Software, 137, 380–395.
Cassel, G. A. S., Rodrigues, V. F., da Rosa Righi, R., Bez, M. R., Nepomuceno, A. C., & André da Costa, C. (2022). Serverless computing for Internet of Things: A systematic literature review. Future Generation Computer Systems, 128, 299–316.
Saroa, M. K. Aron, R., Fog. (2018). Computing and Its Role in Development of Smart Applications. In 2018 IEEE Intl Conf on Parallel & Distributed Processing with Applications, Ubiquitous Computing & Communications, Big Data & Cloud Computing, Social Computing & Networking, Sustainable Computing & Communications (ISPA/IUCC/BDCloud/SocialCom/SustainCom), 2018; pp. 1120–1127.
Al-khafajiy, M., Baker, T., Al-Libawy, H., Waraich, A. (2018). Chalmers, C.; Alfandi, O. (2018) Fog computing framework for internet of things applications. In 2018 11th International Conference on Developments in eSystems Engineering (DeSE), 2018; pp. 71–77.
Singh, S. P., Nayyar, A., Kumar, R., & Sharma, A. (2018). Fog computing: From architecture to edge computing and big data processing. The Journal of Supercomputing, 75(4), 2070–2105.
Hacigumus, H., Iyer, B., Mehrotra, S. (2002) In Providing database as a service, Proceedings 18th International Conference on Data Engineering, IEEE: 2002; pp. 29–38.
Zhang, Y., Zhou, J., Xiang, Y., Zhang, L. Y., Chen, F., Pang, S., Liao, X. (2017) Computation Outsourcing Meets Lossy Channel: Secure Sparse Robustness Decoding Service in Multi-Clouds. In IEEE Transactions on Big Data 2017, 1–1.
Atiewi, S., Al-Rahayfeh, A., Almiani, M., Yussof, S., Alfandi, O., Abugabah, A., & Jararweh, Y. (2020). Scalable and secure big data iot system based on multifactor authentication and lightweight cryptography. IEEE Access, 8, 113498–113511.
Hiemenz, B., & Krämer, M. (2018). Dynamic searchable symmetric encryption for storing geospatial data in the cloud. International Journal of Information Security, 18(3), 333–354.
Handa, R., Rama Krishna, C., & Aggarwal, N. (2019). Efficient privacy-preserving scheme supporting disjunctive multi-keyword search with ranking. Concurrency and Computation: Practice and Experience, 32(2), e5450.
Cui, S., Song, X., Asghar, M. R., Galbraith, S. D., & Russello, G. (2021). Privacy-preserving dynamic symmetric searchable encryption with controllable leakage. ACM Transactions on Privacy and Security, 24(3), 1–35.
Ding, X., Liu, P., & Jin, H. (2019). Privacy-preserving multi-keyword top- similarity search over encrypted data. IEEE Transactions on Dependable and Secure Computing, 16(2), 344–357.
Li, S., Li, M., Xu, H., & Zhou, X. (2019). Searchable encryption scheme for personalized privacy in IoT-based big data. Sensors (Basel), 19(5), 1059.
Park, J., & Lee, D. H. (2020). Parallelly running k-nearest neighbor classification over semantically secure encrypted data in outsourced environments. IEEE Access, 8, 64617–64633.
Onesimu, J. A., Karthikeyan, J., & Sei, Y. (2021). An efficient clustering-based anonymization scheme for privacy-preserving data collection in IoT based healthcare services. Peer-to-Peer Networking and Applications, 14(3), 1629–1649.
Ma, Z., Ma, J., Miao, Y., Liu, X., Choo, K.-K.R., Gao, Y., & Deng, R. H. (2022). Verifiable data mining against malicious adversaries in industrial Internet of Things. IEEE Transactions on Industrial Informatics, 18(2), 953–964.
Zhu, Y., Xu, R., Takagi, T. (2013). In Secure k-NN computation on encrypted cloud data without sharing key with query users, In Proceedings of the 2013 international workshop on Security in cloud computing, 2013; pp. 55–60.
Elmehdwi, Y., Samanthula, B. K., Jiang, W. (2014). In Secure k-nearest neighbor query over encrypted data in outsourced environments, 2014 IEEE 30th International Conference on Data Engineering, IEEE: 2014; pp. 664–675.
Zheng, Y., Lu, R., & Shao, J. (2019). Achieving efficient and privacy-preserving k-NN query for outsourced eHealthcare data. Journal of Medical Systems, 43(5), 123.
Ren, H., Li, H., Dai, Y., Yang, K., & Lin, X. (2018). Querying in Internet of Things with privacy preserving: Challenges. Solutions and Opportunities. IEEE Network, 32(6), 144–151.
Wang, B., Li, M., & Xiong, L. (2019). FastGeo: Efficient geometric range queries on encrypted spatial data. IEEE Transactions on Dependable and Secure Computing, 16(2), 245–258.
Li, X., Zhu, Y., Wang, J., & Zhang, J. (2019). Efficient and secure multi-dimensional geometric range query over encrypted data in cloud. Journal of Parallel and Distributed Computing, 131, 44–54.
Yadav, V. K., Andola, N., Verma, S., et al. (2023). PSCLS: Provably secure certificateless signature scheme for IoT device on cloud. The Journal of Supercomputing, 79(5), 4962–4982.
Yadav, V. K., Andola, N., Verma, S., et al. (2022). EP2LBS: Efficient privacy-preserving scheme for location-based services. The Journal of Supercomputing, 78(13), 14991–15013.
Yadav, V. K., Verma, S., & Venkatesan, S. (2022). Efficient and privacy-preserving location-based services over the cloud. Cluster Computing, 25(5), 3175–3192.
Yadav, V. K., Andola, N., Verma, S., & Venkatesan, S. (2022). Anonymous and linkable location-based services. IEEE Transactions on Vehicular Technology, 71(9), 9397–9409.
Rajkumar, P. V., & Sandhu, R. (2018). Safety decidability for pre-authorization usage control with identifier attribute domains. IEEE Transactions on Dependable and Secure Computing, 17(3), 465–478.
Rajkumar, P. V., & Sandhu, R. (2015). Safety decidability for pre-authorization usage control with finite attribute domains. IEEE Transactions on Dependable and Secure Computing, 13(5), 582–590.
Rajkumar, P. V., Sandhu, R. (2016) Poster: security enhanced administrative role based access control models[C]. In Proceedings of the 2016 ACM SIGSAC conference on computer and communications security. 2016: 1802–1804.
Rajkumar, P. V., Ghosh, S. K., Dasgupta, P. (2010). Concurrent usage control implementation verification using the spin model checker[C]. In Recent Trends in Network Security and Applications: Third International Conference, CNSA 2010, Chennai, India, July 23-25, 2010. Proceedings 3. Springer Berlin Heidelberg, 2010: 214-223
Rajkumar, P. V., Ghosh, S. K., & Dasgupta, P. (2009). Application specific usage control implementation verification. International Journal of Network Security and Its Applications, 1(3), 116–128.
Rajkumar, P. V.; Ghosh, S. K.; Dasgupta, P.; An end to end correctness verification approach for application specific usage control[C]. 2009 International Conference on Industrial and Information Systems (ICIIS). IEEE, 2009: 1–6.
Paillier, P. (1999). In Public-key cryptosystems based on composite degree residuosity classes (pp. 223–238). Springer.
Goldreich, O. (2009). Foundations of cryptography: volume 2 basic applications. Cambridge University Press.
Gur, T., Liu, Y. P., & Rothblum, R. D. (2021). An exponential separation between MA and AM proofs of proximity. Computational Complexity, 30(2), 12.
Li, B., & Chen, B. (2022). An adaptive rapidly-exploring random tree. IEEE/CAA Journal of Automatica Sinica, 9(2), 283–294.
Kleppmann, M., Mulligan, D. P., Gomes, V. B. F., & Beresford, A. R. (2022). A highly-available move operation for replicated trees. IEEE Transactions on Parallel and Distributed Systems, 33(7), 1711–1724.
Funding
This research was partially supported by National Natural Science Foundation of China (61971105), Sichuan science and technology program (2022YFG0173).
Author information
Authors and Affiliations
Contributions
Conceptualization, YH, ZL and HL; methodology, YH; software, YH. and DS; validation, YH, ZL and HL; formal analysis, DS; investigation, YH. and ZL; resources, YH.; data cu-ration, YH; writing—original draft preparation, YH; writing—review and editing, YH; visu-alization, YH and HL; supervision, ZL; project administration, ZL; funding acquisition, DL. All authors have read and agreed to the published version of the manuscript.
Corresponding author
Ethics declarations
Conflict of interest
We declare that we have no financial and personal relationships with other people or organizations that can inappropriately influence our work in this paper.
Research square author dashboard
We understand that our manuscript and associated personal data will be shared with Research Square for the delivery of the author dashboard Research square author dashboard.
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.
About this article
Cite this article
He, Y., Lian, Z., Shi, D. et al. A fog-assisted privacy preserving scheme for vehicular LBS query. Telecommun Syst 84, 167–182 (2023). https://doi.org/10.1007/s11235-023-01042-0
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11235-023-01042-0