Skip to main content
Log in

A fog-assisted privacy preserving scheme for vehicular LBS query

  • Published:
Telecommunication Systems Aims and scope Submit manuscript

Abstract

Outsourcing encrypted data to a powerful cloud is an efficient way to provide Location Based Service (LBS) in the Internet of Vehicles (IoV) while reducing the local overhead for vehicular LBS queries. However, existing schemes do not account for the numerous concurrent connections to the cloud while querying encrypted data on cloud servers. It poses huge challenges to the privacy-preserving and request efficiency of vehicle users. The purpose of this article is to identify the privacy and request efficiency concerns. Then, a Fog-Assisted Privacy Preserving (FAPP) scheme for vehicular LBS requests is proposed. By introducing the fog device to aggregate requests, the FAPP scheme solves the congestion problem of simultaneous massive requests. Additionally, while executing a vehicular LBS query, it uses R-tree and homomorphic encryption techniques to safeguard user privacy. The experimental findings demonstrate that, in comparison to other query strategies, the FAPP scheme is more efficient for vehicular LBS query and privacy preservation.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14
Fig. 15
Fig. 16

Similar content being viewed by others

Data availability

We understand that our manuscript and associated personal data will be shared with Research Square for the delivery of the author dashboard.

References

  1. Bobed, C., Bernad, J., Ilarri, S., & Mena, E. (2017). Probabilistic location-dependent queries at different location granularities. Pervasive and Mobile Computing, 39, 304–321.

    Article  Google Scholar 

  2. Pham, H.; Woodworth, J.; Amini Salehi, M., Survey on secure search over encrypted data on the cloud. Concurrency and Computation: Practice and Experience 2019.

  3. Zhu, H., Lu, R., Huang, C., Chen, L., & Li, H. (2016). An efficient privacy-preserving location-based services query scheme in outsourced cloud. IEEE Transactions on Vehicular Technology, 65(9), 7729–7739.

    Article  Google Scholar 

  4. Li, L., Lu, R., & Huang, C. (2016). EPLQ: efficient privacy-preserving location-based query over outsourced encrypted data. IEEE Internet of Things Journal, 3(2), 206–218.

    Article  Google Scholar 

  5. Guo, Z., Zhang, H., Sun, C., Wen, Q., & Li, W. (2018). Secure multi-keyword ranked search over encrypted cloud data for multiple data owners. Journal of Systems and Software, 137, 380–395.

    Article  Google Scholar 

  6. Cassel, G. A. S., Rodrigues, V. F., da Rosa Righi, R., Bez, M. R., Nepomuceno, A. C., & André da Costa, C. (2022). Serverless computing for Internet of Things: A systematic literature review. Future Generation Computer Systems, 128, 299–316.

    Article  Google Scholar 

  7. Saroa, M. K. Aron, R., Fog. (2018). Computing and Its Role in Development of Smart Applications. In 2018 IEEE Intl Conf on Parallel & Distributed Processing with Applications, Ubiquitous Computing & Communications, Big Data & Cloud Computing, Social Computing & Networking, Sustainable Computing & Communications (ISPA/IUCC/BDCloud/SocialCom/SustainCom), 2018; pp. 1120–1127.

  8. Al-khafajiy, M., Baker, T., Al-Libawy, H., Waraich, A. (2018). Chalmers, C.; Alfandi, O. (2018) Fog computing framework for internet of things applications. In 2018 11th International Conference on Developments in eSystems Engineering (DeSE), 2018; pp. 71–77.

  9. Singh, S. P., Nayyar, A., Kumar, R., & Sharma, A. (2018). Fog computing: From architecture to edge computing and big data processing. The Journal of Supercomputing, 75(4), 2070–2105.

    Article  Google Scholar 

  10. Hacigumus, H., Iyer, B., Mehrotra, S. (2002) In Providing database as a service, Proceedings 18th International Conference on Data Engineering, IEEE: 2002; pp. 29–38.

  11. Zhang, Y., Zhou, J., Xiang, Y., Zhang, L. Y., Chen, F., Pang, S., Liao, X. (2017) Computation Outsourcing Meets Lossy Channel: Secure Sparse Robustness Decoding Service in Multi-Clouds. In IEEE Transactions on Big Data 2017, 1–1.

  12. Atiewi, S., Al-Rahayfeh, A., Almiani, M., Yussof, S., Alfandi, O., Abugabah, A., & Jararweh, Y. (2020). Scalable and secure big data iot system based on multifactor authentication and lightweight cryptography. IEEE Access, 8, 113498–113511.

    Article  Google Scholar 

  13. Hiemenz, B., & Krämer, M. (2018). Dynamic searchable symmetric encryption for storing geospatial data in the cloud. International Journal of Information Security, 18(3), 333–354.

    Article  Google Scholar 

  14. Handa, R., Rama Krishna, C., & Aggarwal, N. (2019). Efficient privacy-preserving scheme supporting disjunctive multi-keyword search with ranking. Concurrency and Computation: Practice and Experience, 32(2), e5450.

    Article  Google Scholar 

  15. Cui, S., Song, X., Asghar, M. R., Galbraith, S. D., & Russello, G. (2021). Privacy-preserving dynamic symmetric searchable encryption with controllable leakage. ACM Transactions on Privacy and Security, 24(3), 1–35.

    Article  Google Scholar 

  16. Ding, X., Liu, P., & Jin, H. (2019). Privacy-preserving multi-keyword top- similarity search over encrypted data. IEEE Transactions on Dependable and Secure Computing, 16(2), 344–357.

    Article  Google Scholar 

  17. Li, S., Li, M., Xu, H., & Zhou, X. (2019). Searchable encryption scheme for personalized privacy in IoT-based big data. Sensors (Basel), 19(5), 1059.

    Article  Google Scholar 

  18. Park, J., & Lee, D. H. (2020). Parallelly running k-nearest neighbor classification over semantically secure encrypted data in outsourced environments. IEEE Access, 8, 64617–64633.

    Article  Google Scholar 

  19. Onesimu, J. A., Karthikeyan, J., & Sei, Y. (2021). An efficient clustering-based anonymization scheme for privacy-preserving data collection in IoT based healthcare services. Peer-to-Peer Networking and Applications, 14(3), 1629–1649.

    Article  Google Scholar 

  20. Ma, Z., Ma, J., Miao, Y., Liu, X., Choo, K.-K.R., Gao, Y., & Deng, R. H. (2022). Verifiable data mining against malicious adversaries in industrial Internet of Things. IEEE Transactions on Industrial Informatics, 18(2), 953–964.

    Article  Google Scholar 

  21. Zhu, Y., Xu, R., Takagi, T. (2013). In Secure k-NN computation on encrypted cloud data without sharing key with query users, In Proceedings of the 2013 international workshop on Security in cloud computing, 2013; pp. 55–60.

  22. Elmehdwi, Y., Samanthula, B. K., Jiang, W. (2014). In Secure k-nearest neighbor query over encrypted data in outsourced environments, 2014 IEEE 30th International Conference on Data Engineering, IEEE: 2014; pp. 664–675.

  23. Zheng, Y., Lu, R., & Shao, J. (2019). Achieving efficient and privacy-preserving k-NN query for outsourced eHealthcare data. Journal of Medical Systems, 43(5), 123.

    Article  Google Scholar 

  24. Ren, H., Li, H., Dai, Y., Yang, K., & Lin, X. (2018). Querying in Internet of Things with privacy preserving: Challenges. Solutions and Opportunities. IEEE Network, 32(6), 144–151.

    Article  Google Scholar 

  25. Wang, B., Li, M., & Xiong, L. (2019). FastGeo: Efficient geometric range queries on encrypted spatial data. IEEE Transactions on Dependable and Secure Computing, 16(2), 245–258.

    Article  Google Scholar 

  26. Li, X., Zhu, Y., Wang, J., & Zhang, J. (2019). Efficient and secure multi-dimensional geometric range query over encrypted data in cloud. Journal of Parallel and Distributed Computing, 131, 44–54.

    Article  Google Scholar 

  27. Yadav, V. K., Andola, N., Verma, S., et al. (2023). PSCLS: Provably secure certificateless signature scheme for IoT device on cloud. The Journal of Supercomputing, 79(5), 4962–4982.

    Article  Google Scholar 

  28. Yadav, V. K., Andola, N., Verma, S., et al. (2022). EP2LBS: Efficient privacy-preserving scheme for location-based services. The Journal of Supercomputing, 78(13), 14991–15013.

    Article  Google Scholar 

  29. Yadav, V. K., Verma, S., & Venkatesan, S. (2022). Efficient and privacy-preserving location-based services over the cloud. Cluster Computing, 25(5), 3175–3192.

    Article  Google Scholar 

  30. Yadav, V. K., Andola, N., Verma, S., & Venkatesan, S. (2022). Anonymous and linkable location-based services. IEEE Transactions on Vehicular Technology, 71(9), 9397–9409.

    Article  Google Scholar 

  31. Rajkumar, P. V., & Sandhu, R. (2018). Safety decidability for pre-authorization usage control with identifier attribute domains. IEEE Transactions on Dependable and Secure Computing, 17(3), 465–478.

    Google Scholar 

  32. Rajkumar, P. V., & Sandhu, R. (2015). Safety decidability for pre-authorization usage control with finite attribute domains. IEEE Transactions on Dependable and Secure Computing, 13(5), 582–590.

    Article  Google Scholar 

  33. Rajkumar, P. V., Sandhu, R. (2016) Poster: security enhanced administrative role based access control models[C]. In Proceedings of the 2016 ACM SIGSAC conference on computer and communications security. 2016: 1802–1804.

  34. Rajkumar, P. V., Ghosh, S. K., Dasgupta, P. (2010). Concurrent usage control implementation verification using the spin model checker[C]. In Recent Trends in Network Security and Applications: Third International Conference, CNSA 2010, Chennai, India, July 23-25, 2010. Proceedings 3. Springer Berlin Heidelberg, 2010: 214-223

  35. Rajkumar, P. V., Ghosh, S. K., & Dasgupta, P. (2009). Application specific usage control implementation verification. International Journal of Network Security and Its Applications, 1(3), 116–128.

    Google Scholar 

  36. Rajkumar, P. V.; Ghosh, S. K.; Dasgupta, P.; An end to end correctness verification approach for application specific usage control[C]. 2009 International Conference on Industrial and Information Systems (ICIIS). IEEE, 2009: 1–6.

  37. Paillier, P. (1999). In Public-key cryptosystems based on composite degree residuosity classes (pp. 223–238). Springer.

    Google Scholar 

  38. Goldreich, O. (2009). Foundations of cryptography: volume 2 basic applications. Cambridge University Press.

    Google Scholar 

  39. Gur, T., Liu, Y. P., & Rothblum, R. D. (2021). An exponential separation between MA and AM proofs of proximity. Computational Complexity, 30(2), 12.

    Article  Google Scholar 

  40. Li, B., & Chen, B. (2022). An adaptive rapidly-exploring random tree. IEEE/CAA Journal of Automatica Sinica, 9(2), 283–294.

    Article  Google Scholar 

  41. Kleppmann, M., Mulligan, D. P., Gomes, V. B. F., & Beresford, A. R. (2022). A highly-available move operation for replicated trees. IEEE Transactions on Parallel and Distributed Systems, 33(7), 1711–1724.

    Article  Google Scholar 

Download references

Funding

This research was partially supported by National Natural Science Foundation of China (61971105), Sichuan science and technology program (2022YFG0173).

Author information

Authors and Affiliations

Authors

Contributions

Conceptualization, YH, ZL and HL; methodology, YH; software, YH. and DS; validation, YH, ZL and HL; formal analysis, DS; investigation, YH. and ZL; resources, YH.; data cu-ration, YH; writing—original draft preparation, YH; writing—review and editing, YH; visu-alization, YH and HL; supervision, ZL; project administration, ZL; funding acquisition, DL. All authors have read and agreed to the published version of the manuscript.

Corresponding author

Correspondence to Yijie He.

Ethics declarations

Conflict of interest

We declare that we have no financial and personal relationships with other people or organizations that can inappropriately influence our work in this paper.

Research square author dashboard

We understand that our manuscript and associated personal data will be shared with Research Square for the delivery of the author dashboard Research square author dashboard.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

He, Y., Lian, Z., Shi, D. et al. A fog-assisted privacy preserving scheme for vehicular LBS query. Telecommun Syst 84, 167–182 (2023). https://doi.org/10.1007/s11235-023-01042-0

Download citation

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11235-023-01042-0

Keywords

Navigation