{"id":"https://openalex.org/W7077148489","doi":"https://doi.org/10.1109/tmc.2025.3599519","title":"Security-Enhanced Spatial Range Query Over Large-Scale Encrypted Mobile Cloud Datasets","display_name":"Security-Enhanced Spatial Range Query Over Large-Scale Encrypted Mobile Cloud Datasets","publication_year":2025,"publication_date":"2025-08-15","ids":{"openalex":"https://openalex.org/W7077148489","doi":"https://doi.org/10.1109/tmc.2025.3599519"},"language":"en","primary_location":{"id":"doi:10.1109/tmc.2025.3599519","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tmc.2025.3599519","pdf_url":null,"source":{"id":"https://openalex.org/S69141925","display_name":"IEEE Transactions on Mobile Computing","issn_l":"1536-1233","issn":["1536-1233","1558-0660","2161-9875"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320439","host_organization_name":"IEEE Computer Society","host_organization_lineage":["https://openalex.org/P4310320439","https://openalex.org/P4310319808"],"host_organization_lineage_names":["IEEE Computer Society","Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Mobile Computing","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":null,"display_name":"Yinbin Miao","orcid":"https://orcid.org/0000-0001-5437-3572"},"institutions":[{"id":"https://openalex.org/I149594827","display_name":"Xidian University","ror":"https://ror.org/05s92vm98","country_code":"CN","type":"education","lineage":["https://openalex.org/I149594827"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Yinbin Miao","raw_affiliation_strings":["School of Cyber Engineering, Xidian University, Xi&#x2019;an, China"],"affiliations":[{"raw_affiliation_string":"School of Cyber Engineering, Xidian University, Xi&#x2019;an, China","institution_ids":["https://openalex.org/I149594827"]}]},{"author_position":"middle","author":{"id":null,"display_name":"Jiaqi Yu","orcid":"https://orcid.org/0009-0005-7433-9925"},"institutions":[{"id":"https://openalex.org/I149594827","display_name":"Xidian University","ror":"https://ror.org/05s92vm98","country_code":"CN","type":"education","lineage":["https://openalex.org/I149594827"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jiaqi Yu","raw_affiliation_strings":["School of Cyber Engineering, Xidian University, Xi&#x2019;an, China"],"affiliations":[{"raw_affiliation_string":"School of Cyber Engineering, Xidian University, Xi&#x2019;an, China","institution_ids":["https://openalex.org/I149594827"]}]},{"author_position":"middle","author":{"id":null,"display_name":"Jiliang Li","orcid":"https://orcid.org/0000-0001-9506-3634"},"institutions":[{"id":"https://openalex.org/I87445476","display_name":"Xi'an Jiaotong University","ror":"https://ror.org/017zhmm22","country_code":"CN","type":"education","lineage":["https://openalex.org/I87445476"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jiliang Li","raw_affiliation_strings":["School of Cyber Science and Engineering, Xi&#x2019;an Jiaotong University, Xi&#x2019;an, China"],"affiliations":[{"raw_affiliation_string":"School of Cyber Science and Engineering, Xi&#x2019;an Jiaotong University, Xi&#x2019;an, China","institution_ids":["https://openalex.org/I87445476"]}]},{"author_position":"middle","author":{"id":null,"display_name":"Xinghua Li","orcid":"https://orcid.org/0000-0002-5583-4155"},"institutions":[{"id":"https://openalex.org/I149594827","display_name":"Xidian University","ror":"https://ror.org/05s92vm98","country_code":"CN","type":"education","lineage":["https://openalex.org/I149594827"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xinghua Li","raw_affiliation_strings":["State Key Laboratory of Integrated Service Networks, School of Cyber Engineering, Xidian University, Xi&#x2019;an, China"],"affiliations":[{"raw_affiliation_string":"State Key Laboratory of Integrated Service Networks, School of Cyber Engineering, Xidian University, Xi&#x2019;an, China","institution_ids":["https://openalex.org/I149594827"]}]},{"author_position":"middle","author":{"id":null,"display_name":"Jun Feng","orcid":"https://orcid.org/0000-0001-9917-1819"},"institutions":[{"id":"https://openalex.org/I47720641","display_name":"Huazhong University of Science and Technology","ror":"https://ror.org/00p991c53","country_code":"CN","type":"education","lineage":["https://openalex.org/I47720641"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jun Feng","raw_affiliation_strings":["Hubei Key Laboratory of Distributed System Security, Hubei Engineering Research Center on Big Data Security, School of Cyber Science and Engineering, Huazhong University of Science and Technology, Wuhan, China"],"affiliations":[{"raw_affiliation_string":"Hubei Key Laboratory of Distributed System Security, Hubei Engineering Research Center on Big Data Security, School of Cyber Science and Engineering, Huazhong University of Science and Technology, Wuhan, China","institution_ids":["https://openalex.org/I47720641"]}]},{"author_position":"middle","author":{"id":null,"display_name":"Zhiquan Liu","orcid":"https://orcid.org/0000-0002-3934-2177"},"institutions":[{"id":"https://openalex.org/I159948400","display_name":"Jinan University","ror":"https://ror.org/02xe5ns62","country_code":"CN","type":"education","lineage":["https://openalex.org/I159948400"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zhiquan Liu","raw_affiliation_strings":["College of Cyber Security, Jinan University, Guangzhou, China"],"affiliations":[{"raw_affiliation_string":"College of Cyber Security, Jinan University, Guangzhou, China","institution_ids":["https://openalex.org/I159948400"]}]},{"author_position":"last","author":{"id":null,"display_name":"Robert H. Deng","orcid":"https://orcid.org/0000-0003-3491-8146"},"institutions":[{"id":"https://openalex.org/I79891267","display_name":"Singapore Management University","ror":"https://ror.org/050qmg959","country_code":"SG","type":"education","lineage":["https://openalex.org/I79891267"]}],"countries":["SG"],"is_corresponding":false,"raw_author_name":"Robert H. Deng","raw_affiliation_strings":["School of Information Systems, Singapore Management University, Singapore"],"affiliations":[{"raw_affiliation_string":"School of Information Systems, Singapore Management University, Singapore","institution_ids":["https://openalex.org/I79891267"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":7,"corresponding_author_ids":[],"corresponding_institution_ids":["https://openalex.org/I149594827"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.28571145,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"25","issue":"1","first_page":"1184","last_page":"1199"},"is_retracted":false,"is_paratext":false,"is_xpac":true,"primary_topic":{"id":"https://openalex.org/T12157","display_name":"Geochemistry and Geologic Mapping","score":0.3921000063419342,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12157","display_name":"Geochemistry and Geologic Mapping","score":0.3921000063419342,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T13177","display_name":"Geological and Geophysical Studies","score":0.042899999767541885,"subfield":{"id":"https://openalex.org/subfields/1907","display_name":"Geology"},"field":{"id":"https://openalex.org/fields/19","display_name":"Earth and Planetary Sciences"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T13067","display_name":"Geological Modeling and Analysis","score":0.03229999914765358,"subfield":{"id":"https://openalex.org/subfields/1906","display_name":"Geochemistry and Petrology"},"field":{"id":"https://openalex.org/fields/19","display_name":"Earth and Planetary Sciences"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.6708999872207642},{"id":"https://openalex.org/keywords/range-query","display_name":"Range query (database)","score":0.6524999737739563},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.5954999923706055},{"id":"https://openalex.org/keywords/spatial-query","display_name":"Spatial query","score":0.5898000001907349},{"id":"https://openalex.org/keywords/plaintext","display_name":"Plaintext","score":0.5094000101089478},{"id":"https://openalex.org/keywords/bloom-filter","display_name":"Bloom filter","score":0.49380001425743103},{"id":"https://openalex.org/keywords/homomorphic-encryption","display_name":"Homomorphic encryption","score":0.4848000109195709},{"id":"https://openalex.org/keywords/query-optimization","display_name":"Query optimization","score":0.4724999964237213},{"id":"https://openalex.org/keywords/web-search-query","display_name":"Web search query","score":0.4212999939918518},{"id":"https://openalex.org/keywords/mobile-device","display_name":"Mobile device","score":0.4018000066280365}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8715999722480774},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.6708999872207642},{"id":"https://openalex.org/C136736807","wikidata":"https://www.wikidata.org/wiki/Q818943","display_name":"Range query (database)","level":5,"score":0.6524999737739563},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.5954999923706055},{"id":"https://openalex.org/C172722865","wikidata":"https://www.wikidata.org/wiki/Q2302053","display_name":"Spatial query","level":5,"score":0.5898000001907349},{"id":"https://openalex.org/C92717368","wikidata":"https://www.wikidata.org/wiki/Q1162538","display_name":"Plaintext","level":3,"score":0.5094000101089478},{"id":"https://openalex.org/C147224247","wikidata":"https://www.wikidata.org/wiki/Q885373","display_name":"Bloom filter","level":2,"score":0.49380001425743103},{"id":"https://openalex.org/C158338273","wikidata":"https://www.wikidata.org/wiki/Q2154943","display_name":"Homomorphic encryption","level":3,"score":0.4848000109195709},{"id":"https://openalex.org/C157692150","wikidata":"https://www.wikidata.org/wiki/Q2919848","display_name":"Query optimization","level":2,"score":0.4724999964237213},{"id":"https://openalex.org/C164120249","wikidata":"https://www.wikidata.org/wiki/Q995982","display_name":"Web search query","level":3,"score":0.4212999939918518},{"id":"https://openalex.org/C186967261","wikidata":"https://www.wikidata.org/wiki/Q5082128","display_name":"Mobile device","level":2,"score":0.4018000066280365},{"id":"https://openalex.org/C144543869","wikidata":"https://www.wikidata.org/wiki/Q2738570","display_name":"Mobile computing","level":2,"score":0.39969998598098755},{"id":"https://openalex.org/C203689450","wikidata":"https://www.wikidata.org/wiki/Q2302053","display_name":"Spatial database","level":3,"score":0.39739999175071716},{"id":"https://openalex.org/C192939062","wikidata":"https://www.wikidata.org/wiki/Q104840822","display_name":"Sargable","level":4,"score":0.3962000012397766},{"id":"https://openalex.org/C93996380","wikidata":"https://www.wikidata.org/wiki/Q44127","display_name":"Server","level":2,"score":0.3952000141143799},{"id":"https://openalex.org/C118689300","wikidata":"https://www.wikidata.org/wiki/Q7978614","display_name":"Web query classification","level":4,"score":0.390500009059906},{"id":"https://openalex.org/C123201435","wikidata":"https://www.wikidata.org/wiki/Q456632","display_name":"Information privacy","level":2,"score":0.37209999561309814},{"id":"https://openalex.org/C127353759","wikidata":"https://www.wikidata.org/wiki/Q6887091","display_name":"Mobile database","level":4,"score":0.33980000019073486},{"id":"https://openalex.org/C75165309","wikidata":"https://www.wikidata.org/wiki/Q2258979","display_name":"Search engine indexing","level":2,"score":0.3292999863624573},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.323199987411499},{"id":"https://openalex.org/C99016210","wikidata":"https://www.wikidata.org/wiki/Q5488129","display_name":"Query expansion","level":2,"score":0.3231000006198883},{"id":"https://openalex.org/C2779201187","wikidata":"https://www.wikidata.org/wiki/Q2775060","display_name":"Information leakage","level":2,"score":0.3215000033378601},{"id":"https://openalex.org/C93974786","wikidata":"https://www.wikidata.org/wiki/Q1589480","display_name":"Ciphertext","level":3,"score":0.3181999921798706},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.30640000104904175},{"id":"https://openalex.org/C159620131","wikidata":"https://www.wikidata.org/wiki/Q1938983","display_name":"Spatial analysis","level":2,"score":0.30630001425743103},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.305400013923645},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.3050000071525574},{"id":"https://openalex.org/C77088390","wikidata":"https://www.wikidata.org/wiki/Q8513","display_name":"Database","level":1,"score":0.30390000343322754},{"id":"https://openalex.org/C38369872","wikidata":"https://www.wikidata.org/wiki/Q7445009","display_name":"Security analysis","level":2,"score":0.30090001225471497},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.2976999878883362},{"id":"https://openalex.org/C10511746","wikidata":"https://www.wikidata.org/wiki/Q899388","display_name":"Data security","level":3,"score":0.28630000352859497},{"id":"https://openalex.org/C47487241","wikidata":"https://www.wikidata.org/wiki/Q5227230","display_name":"Data access","level":2,"score":0.2669999897480011},{"id":"https://openalex.org/C106131492","wikidata":"https://www.wikidata.org/wiki/Q3072260","display_name":"Filter (signal processing)","level":2,"score":0.26350000500679016},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.25529998540878296},{"id":"https://openalex.org/C99221444","wikidata":"https://www.wikidata.org/wiki/Q1532069","display_name":"Private information retrieval","level":2,"score":0.2515999972820282}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tmc.2025.3599519","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tmc.2025.3599519","pdf_url":null,"source":{"id":"https://openalex.org/S69141925","display_name":"IEEE Transactions on Mobile Computing","issn_l":"1536-1233","issn":["1536-1233","1558-0660","2161-9875"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320439","host_organization_name":"IEEE Computer Society","host_organization_lineage":["https://openalex.org/P4310320439","https://openalex.org/P4310319808"],"host_organization_lineage_names":["IEEE Computer Society","Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Mobile Computing","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":36,"referenced_works":["https://openalex.org/W1934398053","https://openalex.org/W1977899329","https://openalex.org/W2004957971","https://openalex.org/W2037357643","https://openalex.org/W2041480327","https://openalex.org/W2051847955","https://openalex.org/W2059094657","https://openalex.org/W2123845384","https://openalex.org/W2150307013","https://openalex.org/W2154496743","https://openalex.org/W2156030242","https://openalex.org/W2282819945","https://openalex.org/W2401976587","https://openalex.org/W2523401173","https://openalex.org/W2602391684","https://openalex.org/W2603469204","https://openalex.org/W2616664865","https://openalex.org/W2639926268","https://openalex.org/W2738359623","https://openalex.org/W2795217733","https://openalex.org/W2883089683","https://openalex.org/W2889349423","https://openalex.org/W2941575019","https://openalex.org/W2950815277","https://openalex.org/W2951475536","https://openalex.org/W3013864829","https://openalex.org/W3048022338","https://openalex.org/W3130906774","https://openalex.org/W3132125973","https://openalex.org/W3132342948","https://openalex.org/W3160147183","https://openalex.org/W3168841635","https://openalex.org/W3175913714","https://openalex.org/W4200549905","https://openalex.org/W4309997698","https://openalex.org/W4387544226"],"related_works":[],"abstract_inverted_index":{"Privacy-preserving":[0],"spatial":[1,13,222],"range":[2],"query":[3,36,173,199],"allows":[4],"users":[5],"to":[6,53,122,203],"obtain":[7,132],"valid":[8],"data":[9,47],"based":[10,78,125],"on":[11,79,126,174],"specific":[12],"attributes":[14],"or":[15],"geographical":[16],"location":[17],"while":[18],"ensuring":[19],"privacy.":[20],"However,":[21,107],"many":[22],"existing":[23],"Privacy-Preserving":[24],"Spatial":[25,71],"Range":[26,72],"Query":[27,73],"(PSRQ)":[28],"schemes":[29,185,196,217],"generally":[30],"face":[31],"the":[32,111,115,120,127,158,164,198,215],"problems":[33],"of":[34,160,166],"low":[35],"efficiency":[37,200],"and":[38,49,69,97,130,168,190],"insufficient":[39],"security":[40,165,179],"when":[41,207],"dealing":[42],"with":[43,209],"large-scale":[44,175],"mobile":[45,82,153,225],"cloud":[46,83,116,176,226],"sets,":[48],"it":[50],"is":[51,77],"difficult":[52],"resist":[54],"Indistinguishability":[55],"under":[56],"Chosen-Plaintext":[57],"Attack":[58],"(IND-CPA).":[59],"To":[60],"solve":[61],"these":[62],"challenges,":[63],"we":[64,138],"first":[65],"propose":[66,140],"an":[67,141],"Efficient":[68],"Secure":[70],"scheme":[74,143],"(ESSRQ),":[75],"which":[76,145],"a":[80,103],"dual":[81],"architecture":[84],"by":[85,201],"integrating":[86],"Geohash":[87],"algorithm,":[88],"Circular":[89],"Shift":[90],"Coalesce":[91],"Zero-Sum":[92],"Garbled":[93],"Bloom":[94],"Filter":[95],"(CSC-ZGBF)":[96],"Symmetric":[98],"Homomorphic":[99],"Encryption":[100],"(SHE),":[101],"achieving":[102],"constant":[104],"search":[105],"complexity.":[106],"ESSRQ":[108,167],"cannot":[109],"protect":[110],"access":[112,161],"patterns,":[113,162],"where":[114],"server":[117],"still":[118],"has":[119],"potential":[121],"infer":[123],"attacks":[124],"index":[128],"position":[129],"even":[131],"plaintext":[133],"queries.":[134],"On":[135],"this":[136],"basis,":[137],"further":[139],"extended":[142],"ESSRQ-PIR,":[144],"introduces":[146],"Private":[147],"Information":[148],"Retrieval":[149],"(PIR)":[150],"into":[151],"single":[152],"cloud-based":[154],"architecture,":[155],"effectively":[156],"prevents":[157],"leakage":[159],"enhances":[163],"can":[169],"also":[170],"realize":[171],"efficient":[172],"datasets.":[177],"Formal":[178],"analysis":[180],"proves":[181],"that":[182,194],"our":[183,195],"proposed":[184,216],"are":[186],"secure":[187],"against":[188],"IND-CPA,":[189],"extensive":[191],"experiments":[192],"demonstrate":[193],"improve":[197],"up":[202],"nearly":[204],"20":[205],"times":[206],"compared":[208],"previous":[210],"solutions.":[211],"These":[212],"features":[213],"make":[214],"particularly":[218],"suitable":[219],"for":[220],"privacy-preserving":[221],"queries":[223],"in":[224],"computing":[227],"environments.":[228]},"counts_by_year":[],"updated_date":"2025-12-28T23:10:05.387466","created_date":"2025-10-10T00:00:00"}
