Efficient and Privacy-Preserving Query on Outsourced Spherical Data

  • Yueyue Zhou
  • Tao XiangEmail author
  • Xiaoguo Li
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 11337)


Outsourcing spatial database to the cloud becomes a paradigm for many applications such as location-bases service (LBS). At the same time, the security of outsourced data and its query becomes a serious issue. In this paper, we consider 3D spherical data that has wide applications in geometric information systems (GIS), and investigate its privacy-preserving query problem. By using an approximately distance-preserving 3D-2D projection method, we first project 3D spatial points to six possible 2D planes. Then we utilize secure Hilbert space-filling curve to encode the 2D points into 1D Hilbert values. After that, we build an encrypted spatial index tree using B\(^+\)-tree and order-preserving encryption (OPE). Our scheme supports efficient point query, arbitrary polygon query, as well as dynamic updating in the encrypted domain. Theoretical analysis and experimental results on real-word datasets demonstrate its satisfactory tradeoff between security and efficiency.


Outsourcing Privacy-preserving query Spherical data B\(^+\)-tree Hilbert curve 



This work was supported by the National Natural Science Foundation of China (No. 61672118) and Graduate Scientific Research and Innovation Foundation of Chongqing, China (No. CYB16046).


  1. 1.
  2. 2.
  3. 3.
  4. 4.
    Agrawal, R., Kiernan, J., Srikant, R., Xu, Y.: Order preserving encryption for numeric data. In: Proceedings of ACM SIGMOD International Conference on Management of Data (SIGMOD), pp. 563–574 (2004)Google Scholar
  5. 5.
    Boldyreva, A., Chenette, N., Lee, Y., O’Neill, A.: Order-preserving symmetric encryption. In: Joux, A. (ed.) EUROCRYPT 2009. LNCS, vol. 5479, pp. 224–241. Springer, Heidelberg (2009). Scholar
  6. 6.
    Hilbert, D.: Über die stetige abbildung einer linie auf ein flächenstück. Math. Ann. 38, 459–460 (1891)MathSciNetCrossRefGoogle Scholar
  7. 7.
    Kamel, I., Talha, A.M., Aghbari, Z.A.: Dynamic spatial index for efficient query processing on the cloud. J. Cloud Comput. 6(1), 5 (2017)CrossRefGoogle Scholar
  8. 8.
    Khoshgozaran, A., Shahabi, C.: Blind evaluation of nearest neighbor queries using space transformation to preserve location privacy. In: Papadias, D., Zhang, D., Kollios, G. (eds.) SSTD 2007. LNCS, vol. 4605, pp. 239–257. Springer, Heidelberg (2007). Scholar
  9. 9.
    Kim, H.I., Hong, S.T., Chang, J.W.: Hilbert-curve based cryptographic transformation scheme for protecting data privacy on outsourced private spatial data, pp. 77–82 (2014)Google Scholar
  10. 10.
    Ku, W.-S., Hu, L., Shahabi, C., Wang, H.: Query integrity assurance of location-based services accessing outsourced spatial databases. In: Mamoulis, N., Seidl, T., Pedersen, T.B., Torp, K., Assent, I. (eds.) SSTD 2009. LNCS, vol. 5644, pp. 80–97. Springer, Heidelberg (2009). Scholar
  11. 11.
    Lewi, K., Wu, D.J.: Order-revealing encryption: new constructions, applications, and lower bounds. In: Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, pp. 1167–1178 (2016)Google Scholar
  12. 12.
    Lung, M.Y., Ghinita, G., Jensen, C.S., Kalnis, P.: Outsourcing search services on private spatial data, pp. 1140–1143 (2009)Google Scholar
  13. 13.
    Lung, M.Y., Ghinita, G., Jensen, C.S., Kalnis, P.: Enabling search services on outsourced private spatial data. VLDB J. 19(3), 363–384 (2010)CrossRefGoogle Scholar
  14. 14.
    Luo, Y., Fu, S., Wang, D., Xu, M., Jia, X.: Efficient and generalized geometric range search on encrypted spatial data in the cloud. In: IEEE/ACM Conference on Quality of Service (IWQoS), pp. 1–10 (2017)Google Scholar
  15. 15.
    Ren, H., Li, H., Chen, H., Kpiebaareh, M., Zhao, L.: Efficient privacy-preserving circular range search on outsourced spatial data. In: IEEE Conference on Communications (ICC), pp. 1–7 (2016)Google Scholar
  16. 16.
    Talha, A.M., Kamel, I., Aghbari, Z.A.: Enhancing confidentiality and privacy of outsourced spatial data, pp. 13–18 (2015)Google Scholar
  17. 17.
    Wang, B., Li, M., Wang, H., Li, H.: Circular range search on encrypted spatial data. In: IEEE Conference on Distributed Computing Systems (ICDCS), pp. 794–795 (2015)Google Scholar
  18. 18.
    Yi, X., Paulet, R., Bertino, E., Varadharajan, V.: Practical approximate k nearest neighbor queries with location and query privacy. IEEE Trans. Knowl. Data Eng. 28(6), 1546–1559 (2016)CrossRefGoogle Scholar
  19. 19.
    Zhu, H., Liu, F., Li, H.: Efficient and privacy-preserving polygons spatial query framework for location-based services. IEEE Internet Things J. 4(2), 536–545 (2017)CrossRefGoogle Scholar
  20. 20.
    Zhu, H., Lu, R., Huang, C., Chen, L., Li, H.: An efficient privacy-preserving location-based services query scheme in outsourced cloud. IEEE Trans. Veh. Technol. 65(9), 7729–7739 (2016)CrossRefGoogle Scholar

Copyright information

© Springer Nature Switzerland AG 2018

Authors and Affiliations

  1. 1.College of Computer ScienceChongqing UniversityChongqingChina

Personalised recommendations