Next Article in Journal
A Synergy Cropland of China by Fusing Multiple Existing Maps and Statistics
Next Article in Special Issue
A Secure and Verifiable Outsourced Access Control Scheme in Fog-Cloud Computing
Previous Article in Journal
Secure Service Proxy: A CoAP(s) Intermediary for a Securer and Smarter Web of Things
Previous Article in Special Issue
A Source Anonymity-Based Lightweight Secure AODV Protocol for Fog-Based MANET
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

A Fine-Grained and Privacy-Preserving Query Scheme for Fog Computing-Enhanced Location-Based Service

The Information Security and National Computing Grid Laboratory, Southwest Jiaotong University, Chengdu 610031, China
*
Author to whom correspondence should be addressed.
Sensors 2017, 17(7), 1611; https://doi.org/10.3390/s17071611
Submission received: 31 May 2017 / Revised: 29 June 2017 / Accepted: 7 July 2017 / Published: 11 July 2017
(This article belongs to the Special Issue Security and Privacy Challenges in Emerging Fog Computing)

Abstract

:
Location-based services (LBS), as one of the most popular location-awareness applications, has been further developed to achieve low-latency with the assistance of fog computing. However, privacy issues remain a research challenge in the context of fog computing. Therefore, in this paper, we present a fine-grained and privacy-preserving query scheme for fog computing-enhanced location-based services, hereafter referred to as FGPQ. In particular, mobile users can obtain the fine-grained searching result satisfying not only the given spatial range but also the searching content. Detailed privacy analysis shows that our proposed scheme indeed achieves the privacy preservation for the LBS provider and mobile users. In addition, extensive performance analyses and experiments demonstrate that the FGPQ scheme can significantly reduce computational and communication overheads and ensure the low-latency, which outperforms existing state-of-the art schemes. Hence, our proposed scheme is more suitable for real-time LBS searching.

1. Introduction

With the rapid development of the Internet of Things (IoTs), fog computing has been presented by Cisco in 2012 [1] as a supplement to cloud computing. Based on its network edge computing feature, fog computing is able to provide location-awareness applications, where the location-based service (LBS) is the most popular [2,3]. With the assistance of fog computing, the LBS providers can outsource the LBS data to fog nodes and thus provide people a convenient life [4]. For instance, through the LBS provided by a local fog node, a mobile user can query and search points of interest (POIs) within a given distance to his/her location [5,6]. Actually, LBS query has become one of the killer applications in LBS, which allows mobile users to query a LBS provider (such as Google or Bing maps) to obtain the detailed information about POIs in their vicinity (e.g., restaurants, hospitals, etc.). For example, when a tourist arrives at a new place, it is very necessary to query some interesting places, such as hotels, restaurants, scenic spots and so on, based on the LBS. Hence, we focus on the LBS query in this paper.
Although LBS can benefit people a lot, the submitted queries may lead to some sensitive information about users being revealed, such as hobbies, current location and the location where mobile users will reach [7,8]. To clearly illustrate the privacy challenge in LBS query, we consider the following scenario, where a mobile user wants to find a hospital by exposing his location to a local fog node. Thus, this fog node can infer user’s location where he will reach according to his request (the content of the matched POIs). However, even worse, the health condition that is very sensitive to this user, may be disclosed. Conceivably, without the privacy assurance in fog computing, the LBS can not continue to its flourish because users’ personal trajectory and hobby may be exposed. In addition, owing to the mobility of mobile users, the low-latency is very critical for the LBS query [9]. For example, when a driver wants to find the nearest restaurant on a heavy-traffic road, he has to keep driving while waiting for the response to ensure smooth traffic. If the response is slow, the result may already not satisfy the current spatial range of this diver, i.e., the driver has traveled far away. Therefore, latency should also be taken into account.
Recently, many privacy-preserving LBS schemes have been proposed to prevent the location privacy of LBS users. For examples, location obfuscation technology has been presented to protect users’ precise locations from disclosing [10,11]. In addition, spatial cloaking technology has been proposed to conceal the precise location in a cloaking area [12,13]. However, the accuracy of the matched results in these schemes are not satisfactory, since the locations submitted by users are not precise. In order to ensure the data privacy and improve the accuracy of results simultaneously, privacy information retrieval (PIR) [14] has been applied to the LBS query [15,16]. Unfortunately, as mentioned in [17], PIR needs to transmit the entire LBS data to the mobile users, which brings about the heavy communication burden, especially for big data. In addition, a mobile user has to additionally access the LBS database’s index data in a privacy-preserving way, which leads to the linear calculations of all LBS data. Hence, the communication and computational costs are tremendous, which is not cost-efficient for mobile users. To overcome this disadvantage, some efficient cryptographic algorithm-based schemes have been developed for the LBS query, where most of these schemes focused on cloud computing, as it can offer on-demand and scalable storage and unlimited computing capacity, especially for big data processing. For examples, Li et al. [18] discussed an efficient privacy-preserving location-based query over outsourced encrypted data by coding and bilinear pairing techniques; Zhu et al. [19] proposed a new efficient and privacy-preserving LBS query scheme in the outsourced cloud; Peng et al. [20] developed the collaborative trajectory privacy-preserving scheme for the trajectory privacy of continuous queries. However, with vast LBS requests generated everyday, the transmission of the extraordinarily huge volume data to the cloud has resulted in unbearable transmission latency, which will degrade the quality of service to end users, especially mobile users [9,21,22]. As a result, privacy-preserving LBS query schemes designed for cloud computing may not satisfy the low-latency.
Hence, the content of fog computing has been introduced to make up the disadvantage of the centralized processing in the cloud [1]. As far as we know, existing schemes in fog computing mainly concentrated on location privacy in wireless sensor networks [23] or real-time navigation of vehicular ad hoc networks [24]. Nevertheless, few fog computing-based schemes considered the privacy issue in the LBS query. Moreover, almost all state-of-the-art LBS query schemes only take the location matching into consideration without considering content matching, and thus this is not fine-grained. For instance, when a mobile user wants to query a hospital within 500 m, the returned results in existing schemes are all the LBS data meeting the spatial range (within 500 m). That is, in addition to the hospital, the result may include a restaurant, a park, or a mall and so on. In fact, these results are not necessary for LBS users, and it will lead to additional communication and computational costs, e.g., users have to decrypt all the returned ciphertexts to find the point of interest.
To not only ensure the privacy-preserving and low-latency, but also achieve the fine-grained query result, in this paper, we propose a fine-grained and privacy-preserving query scheme for fog computing-enhanced location-based service (FGPQ). The contributions of this paper are threefold as follows.
  • First, we present our FGPQ scheme, which is characterized by employing the bilinear pairing [25] and the asymmetric scalar-product preserving encryption (ASPE) [26] to realize the LBS searching. In addition to satisfying the given spatial range, the searching result satisfies the given searching content, which is not considered in many up-to-date schemes.
  • Secondly, we give detailed privacy analysis to show that our proposed FGPQ indeed achieves the privacy preservation of both the LBS provider and mobile users.
  • Finally, we theoretically analyze the computational and communication overheads, and run extensive experiments to demonstrate that our FGPQ scheme is more efficient than the EPLQ scheme [18] and EPQ scheme [19]. In addition, the latency analysis shows that our FGPQ scheme is really low-latency, which is suitable for the real-time LBS query.
The remainder of this paper is organized as follows. In Section 2, we introduce our system model and design goals. Then, we describe some preliminaries in Section 3. In Section 4, we present our FGPQ scheme, followed by privacy analysis and performance analysis in Section 5 and Section 6, respectively. Finally, we draw our conclusions in Section 7.

2. System Model and Design Goals

In this section, we formalize the system model used in this paper, and identify design goals.

2.1. System Model

We illustrate an overall architecture of fog computing-enhanced LBS query in Figure 1, which includes a set of mobile users, a set of fog nodes { i d 1 , i d 2 , , i d n } and an LBS provider.
  • LBS provider: the LBS provider acts as a profit company, providing the location-based services for the registered mobile users. With the advantages of fog computing, the LBS provider prefers to outsource its LBS data containing service content and the corresponding geographic location to appropriate fog nodes based on the geographic location distance, which can provide the low-latency LBS for mobile users.
  • Fog nodes { i d 1 , i d 2 , , i d n } : with the pay-as-you-use way, each fog node i d j stores the LBS data from the LBS provider and provides the fine-grained query services for mobile users.
  • Mobile users: a mobile user who acts as a registered member of the LBS provider, sends a query that contains the searching content, current location information and searching spatial range, to a local fog node for requesting the nearby POIs satisfying both the given searching content and spatial range.
Similar to the most common assumption in research literature (see [27,28]), fog nodes are considered honest-but-curious, which honestly follow the underlying scheme, but are curious about the privacy of mobile users and the LBS provider. In the LBS applications, the LBS provider or mobile users would not collude with fog nodes to obtain others’ privacy. This is because if the LBS provider agree to collude with a fog node to obtain the content of a user’ request, then this node can obtain some LBS data considered as provider’s privacy from the LBS searching. For example, if a fog node obtain a mobile user’s request (e.g., a hospital within 500 m) from the collusion attack, then it can obtain the real information of the matched LBS data, i.e., it knows that the service content of all matched LBS data is the hospital and the corresponding location is within 500 m of the current location. In other words, once the privacy of mobile users is disclosed, the privacy of the LBS provider will also be disclosed. Therefore, the LBS provider would not collude with fog nodes. Similarly, mobile users would also not collude with fog nodes. Note that, since the privacy preservation is our focus, some active attacks are beyond the scope of this work and will be discussed in the future.

2.2. Design Goals

The goals of our proposed FGPQ scheme are described as follows:
  • Privacy preservation. As a profit company, the LBS data are considered as the LBS provider’s own asset, which should be protected from disclosing. Therefore, the LBS data should be encrypted before being outsourced to fog nodes. For mobile users, a service query may contain some sensitive information, e.g., hobbies, current location and the location where mobile users will reach, which should also be protected from disclosing. Hence, mobile users should send the encrypted query request to the nearby fog node.
  • Fine-grained query result. Besides the searching spatial range, the FGPQ scheme should satisfy the searching content, e.g., a hospital or a restaurant. That is, the query result should satisfy the given searching content and searching spatial range simultaneously.
  • Efficiency. Owing to the mobility of mobile users, the low-latency is very critical for the LBS [9]. Hence, computational costs and communication delay should be as less as possible.

3. Preliminaries

In this section, we first outline the bilinear pairing [25], which will be used for generating the index of the service content to complete the content matching. Then, we describe the asymmetric scalar-product preserving encryption algorithm (ASPE) [26], which will be applied to achieve the encrypted location matching.

3.1. Bilinear Pairing

Given a security parameter κ Z + , a bilinear-parameter generation algorithm G ( κ ) outputs a tuple ( p , g , G , G T , e ) , where p is a κ -bit prime number, G and G T are two multiplicative cyclic groups of order p, g is a generator of G , and e : G × G G T is a bilinear pairing with the following properties:
  • Bilinearity: for all u , v G and a , b Z p * , we have e ( u a , v b ) = e ( u , v ) a b .
  • Non-degeneracy: e ( g , g ) 1 .
The definitions of bilinear pairing parameter generator and the related complexity assumptions are described below [25,29].
Definition 1.
(Bilinear generator) The bilinear parameter generator G e n ( · ) is a probabilistic algorithm that takes a security parameter κ as input and outputs a 5-tuple ( G , G T , p , g , e ) .
Definition 2.
(Computational Diffie–Hellman (CDH) problem) Given ( g , g a , g b ) G , for unknown a , b Z p * , compute g a b G .
Definition 3.
(Discrete logarithm (DL) problem) Given Q G , compute a Z p * such that g a = Q .

3.2. The Asymmetric Scalar-Product Preserving Encryption (ASPE)

Wong et al. [26] developed an asymmetric scalar-product preserving encryption (ASPE), which has been widely applied to the outsourced range matching in the ciphertext [30,31]. Hence, this encryption algorithm can also applied to the outsourced spatial range query in the ciphertext.
  • Key generation ( G e n ( d ) ). Given a security parameter d, two d × d invertible matrices M 1 and M 2 , and a d-dimensional binary vector S are chosen as the private key, denoted as s k = ( S , M 1 , M 2 ) . Note that the binary vector S is a splitting indicator to split the plaintext vector into two random vectors, where S [ i ] is the i-th bit in S.
  • Tuple encryption function E T ( · ) . Consider a d-dimensional vector P in a database. Firstly, split P into two d-dimensional vectors ( P a , P b ) based on the splitting indicator S. Specifically, if S [ i ] = 0 ( i = 1 , 2 , , d ) , P a [ i ] = P b [ i ] = P [ i ] ; if S [ i ] = 1 ( i = 1 , 2 , , d ) , the value of P [ i ] will be randomly split into P a [ i ] and P b [ i ] such that P [ i ] = P a [ i ] + P b [ i ] . Then, the encrypted value of P can be calculated as
    E T ( P , s k ) = ( P a M 1 , P b M 2 ) .
  • Query encryption function E Q ( · ) . Consider a d-dimensional vector Q, split it into two d-dimensional vectors ( Q a , Q b ) : if S [ i ] = 0 ( i = 1 , 2 , , d ) , the value of Q [ i ] can be randomly split into Q a [ i ] and Q b [ i ] with Q [ i ] = Q a [ i ] + Q b [ i ] ; if S [ i ] = 1 ( i = 1 , 2 , , d ) , Q a [ i ] = Q b [ i ] = Q [ i ] . The encrypted value of Q can be generated as
    E Q ( Q , s k ) = ( M 1 - 1 Q a T , M 2 - 1 Q b T ) ,
    where Q a T and Q b T denote the transpose of Q a and Q b , respectively.
  • Outsourced scalar-product calculation. With two ciphertexts E T ( P , s k ) and E Q ( Q , s k ) , the outsourced scalar-product can be calculated as
    E T ( P , s k ) · E Q ( Q , s k ) = ( P a M 1 , P b M 2 ) · ( M 1 - 1 Q a T , M 2 - 1 Q b T ) = P a M 1 · M 1 - 1 Q a T + P b M 2 · M 2 - 1 Q b T = P a · Q a T + P b · Q b T = P · Q .
    The correctness of the scalar-product calculation can be referred to [26].
  • Decryption Function D ( · ) . Consider an encrypted value ( P a M 1 , P b M 2 ) . Firstly, compute the inverse matrices M 1 - 1 and M 2 - 1 , and then extract two vectors P a and P b , i.e., P a = P a M 1 · M 1 - 1 , P b = P b M 2 · M 2 - 1 . Finally, recover the original d-dimensional vector P with the splitting indicator S:
    P [ i ] = P a [ i ] = P b [ i ] , i f S [ i ] = 0 , P a [ i ] + P b [ i ] , i f S [ i ] = 1 .
The Properties of ASPE Algorithm: For any encrypted tuple E T ( P i , s k ) and an encrypted query E Q ( Q , s k ) , the ASPE algorithm satisfies the following two properties:
  • For any P i encrypted by E T ( · ) and any query Q encrypted by E Q ( · ) :
    P i · Q = E T ( P i , s k ) · E Q ( Q , s k ) .
  • For any P i and P j encrypted by E T ( · ) :
    P i · P j E T ( P i , s k ) · E T ( P j , s k ) .
Note that the actual dimension d may be too small to resist the brute-force attack. Therefore, it is better to improve the system security by making d larger, which can be achieved by adding artificial dimensions to the data vector. In particular, extend a d-dimensional vector to a d -dimensional ( d d ) by padding artificial data such that the scalar-product over the added data is 0. In addition, d 80 is large enough to make the system security. The details can be referred to [26]. Unless other specification, the encryption E T ( P , s k ) and E Q ( Q , s k ) are denoted by E T ( P ) and E Q ( Q ) for short in the rest of this paper, respectively.

4. Proposed FGPQ Scheme

This section presents a fine-grained and privacy-preserving query scheme for fog computing-enhanced LBS (FGPQ), which mainly consists of two parts: system initialization and privacy-preserving LBS query. In particular, the LBS provider mainly initializes the LBS system in the system initialization part, which includes the generation of public and private keys, and LBS data encryption. The privacy-preserving LBS query completes the LBS query process, which includes query request generation, LBS searching and result retrieval. The details are shown as follows.

4.1. System Initialization

The LBS provider initializes the system by following steps:
  • Key generation. The LBS provider generates the public and private keys, which are used to encrypt the LBS data and the query request. Specifically, the LBS provider first generates the bilinear pairing tuple ( p , g , G , G T , e ) and the ASPE algorithm’s private key ( S , M 1 , M 2 ) , respectively. Then, it chooses a large random number α Z p * as the master-key, and a cryptographic hash function h : { 0 , 1 } * Z p * . In addition, in our proposed scheme, the actual dimension d of the ASPE algorithm is 7, which can not ensure the sufficient security; thus, we should extend d to d = 80 . To this end, the LBS provider also chooses ( d - d ) random numbers ω d + 1 , ω d + 2 , , ω d as the private key of the ASPE algorithm. After that, the LBS provider publishes ( p , g , G , G T , e , h ) as the public key. Once a mobile user is registered in the LBS provider, the LBS provider will assign the private key ( α , S , M 1 - 1 , M 2 - 1 , ω d + 1 , , ω d ) to mobile users through the secure channel.
  • LBS data encryption. As mentioned in [18,19], the LBS provider has all LBS data in the system, which can be denoted as { ( m 1 , ( X 1 , Y 1 ) ) , , ( m k , ( X k , Y k ) ) } . In particular, m i and ( X i , Y i ) denote the service content and the corresponding location for i-th service, respectively. In order to protect the privacy, the LBS provider encrypts the LBS data and separately sends them to appropriate fog nodes. Concretely, for each service item ( m i , ( X i , Y i ) ) , where i = 1 , 2 , , k , the LBS provider conducts the following calculations.
    • For the service content m i , the LBS provider chooses a random number r i Z p * , and generates the ciphertext as
      E ( m i ) = ( g α h ( m i ) r i , g r i ) .
    • For the location information ( X i , Y i ) , the LBS provider first generates a 7-dimensional vector as W ( i ) = ( 1 , 1 , X i 2 , Y i 2 , - 2 X i , - 2 Y i , - 1 ) , and extends it to a d -dimensional vector W ( i ) ^ , where the first seven dimensions are copied from W ( i ) , and for j = 8 to d - 1 , set W ( i ) ^ [ j ] = r j ( r j is a random number), and W ( i ) ^ [ d ] = - j = 8 d - 1 ω j r j ω d , i.e., W ( i ) ^ = ( 1 , 1 , X i 2 , Y i 2 , - 2 X i , - 2 Y i , - 1 , r 8 , r 9 , , r d - 1 , - j = 8 d - 1 ω j r j ω d ) . Then, the LBS provider encrypts W ( i ) ^ with the private key ( S , M 1 , M 2 ) by means of the tuple encryption function E T ( · ) (the Equation (1)), that is,
      E T ( W ( i ) ^ ) = ( W a ( i ) ^ · M 1 , W b ( i ) ^ · M 2 ) ,
      where W a ( i ) ^ and W b ( i ) ^ are two split vectors of W ( i ) ^ .
Finally, based on the geographic location distance, the LBS provider outsources all k encrypted LBS data ( E ( m i ) , E T ( W ( i ) ^ ) ) , where i = 1 , 2 , , k , to appropriate fog nodes.

4.2. Privacy-Preserving LBS Query

This section achieves the privacy-preserving LBS query by means of the bilinear pairing and the ASPE algorithm, which includes LBS query request generation, LBS searching and request result decryption. Before that, we first define a range query used for location range matching.
Definition 4.
Given the location coordinate ( x * , y * ) and the searching spatial range T, a location coordinate ( x i , y i ) is within the searching spatial range if and only if
R = ( x * - x i ) 2 + ( y * - y i ) 2 T ,
where R is the Euclidean distance used to compute the distance between two coordinates [32].

4.2.1. LBS Query Request Generation

When a mobile user wants to search for a POI within a certain range, e.g., a hospital within 1000 m of the current location, he should send the query request that contains the searching content m * (a hospital), the current location ( X * , Y * ) and the searching spatial range T * (within 1000 m), to a local fog node (denoted as i d j ). In order to ensure the privacy, he encrypts the request information ( m * , ( X * , Y * ) , T * ) firstly, and then sends the encrypted query request to the fog node i d j . The details are described as follows.
  • For the searching content m * , the user chooses a random number r * Z p * , and generates the ciphertext as
    E ( m * ) = ( g α h ( m * ) r * , g r * ) .
  • For the location information ( X * , Y * ) and the searching spatial range T * , the user first generates a 7-dimensional vector as L = ( X * 2 , Y * 2 , 1 , 1 , X * , Y * , T * 2 ) , and extends it to a d -dimensional vector L ^ where the first seven dimensions are copied from L, and for i = 8 to d , set L ^ [ i ] = ω i , i.e., L ^ = ( X * 2 , Y * 2 , 1 , 1 , X * , Y * , T * 2 , ω 8 , ω 9 , , ω d ) . Then, the user chooses a random large positive number β to confuse L ^ , and computes L ^ = β · L ^ . After that, the user encrypts L ^ with the private key ( S , M 1 - 1 , M 2 - 1 ) by means of the query encryption function E Q ( · ) (the Equation (2)) as
    E Q ( L ^ ) = ( M 1 - 1 · L ^ a , M 2 - 1 · L ^ b ) ,
    where L ^ a and L ^ b are two column vectors split from L ^ .
Finally, the user sends the encrypted query request { E ( m * ) , E Q ( L ^ ) } to the fog node i d j .

4.2.2. LBS Searching

After receiving the encrypted query request { E ( m * ) , E Q ( L ^ ) } , the fog node i d j completes the LBS searching to find the most matched LBS item, which not only meets both the searching content and spatial range, but also has the shortest distance from the user’s location. Specifically, suppose the fog node i d j receives k j encrypted LBS items from the LBS provider, denoted as { ( E ( m 1 ) , E T ( W ( 1 ) ^ ) ) , ( E ( m 2 ) , E T ( W ( 2 ) ^ ) ) , , ( E ( m k j ) , E T ( W ( k j ) ^ ) ) } . For each ( E ( m i ) , E T ( W ( i ) ^ ) ) , where i = 1 , 2 , , k j , the fog node i d j executes the following operations.
  • For E T ( W ( i ) ^ ) , the fog node i d j first computes
    R i = E T ( W ( i ) ^ ) · E Q ( L ^ ) = ( W a ( i ) ^ M 1 , W b ( i ) ^ M 2 ) · ( M 1 - 1 L ^ a , M 2 - 1 L ^ b ) = W a ( i ) ^ M 1 · M 1 - 1 L ^ a + W b ( i ) ^ M 2 · M 2 - 1 L ^ b = W a ( i ) ^ L ^ a + W b ( i ) ^ L ^ b = W ( i ) ^ · L ^ = β ( ( X * - X i ) 2 + ( Y * - Y i ) 2 - T * 2 + ω 8 r 8 + + ω d - 1 r d - 1 - j = 8 d - 1 ω j r j ) = β ( ( X * - X i ) 2 + ( Y * - Y i ) 2 - T * 2 ) .
    Then, it checks whether R i 0 holds. If not, it means that the LBS item ( E ( m i ) , E T ( W ( i ) ^ ) ) does not satisfy the searching spatial range.
  • If R i 0 holds, similarly to [33], the fog node i d j checks whether
    e ( g α h ( m i ) r i , g r * ) = e ( g α h ( m * ) r * , g r i )
    holds. If not, it means that the service content m i does not satisfy the given searching content m * . Otherwise, the LBS item ( m i , ( X i , Y i ) ) satisfy the searching condition given by mobile users.
Eventually, the fog node i d j sends the matched result E T ( W ( i ) ^ ) to the user. Note that if the service m * has multi-matched locations, the fog node i d j always returns the nearest location from the user (the location with the smallest R i ).

4.2.3. Request Result Decryption

After receiving the result, e.g., E T ( W ( i ) ^ ) = ( W a ( i ) ^ M 1 , W b ( i ) ^ M 2 ) , the user recovers the vector W ( i ) ^ by means of the decryption function D, and then extracts the first seven dimensions in it, i.e., W ( i ) = ( 1 , 1 , X i 2 , Y i 2 , - 2 X i , - 2 Y i , - 1 ) . According to W ( i ) , the user can obtain the matched location ( X i , Y i ) about the searching content m * .

5. Privacy Analysis

Following our design goals, we discuss how the proposed FGPQ scheme achieves the privacy preservation of the LBS provider and mobile users.
The privacy preservation of mobile users: When a mobile user wants to search the POI satisfying the special spatial range and searching content, he or she sends an encrypted request ( E ( m * ) , E Q ( L ^ ) ) to the fog node i d j . In particular, the ciphertext E ( m * ) is computed as E ( m * ) = ( g α h ( m * ) r * , g r * ) . Hence, based on hard problems of the CDH and DL in bilinear pairing (Definitions 2 and 3), the fog node i d j can not obtain any plaintext information from E ( m * ) without knowing r * and α . As E Q ( L ^ ) is a ciphertext of the ASPE algorithm, the privacy-preserving totally depends on the security of the ASPE algorithm. As analysed in [26], once the vector dimension d satisfies d 80 , it is generally very difficult for an attacker to successfully attack the ASPE algorithm. Therefore, under the parameter setting in Section 4.1, the location can be protected from disclosing. In other words, fog nodes can not obtain any plaintext information from the request ( E ( m * ) , E Q ( L ^ ) ) . In addition, even if the value of scalar-product (see Formula (6)) has been obtained, the fog node i d j cannot get the location, since a large random number β has been applied to confuse the real scalar-product value. Note that fog nodes do not collude with the LBS provider in this paper, so they will not directly forward users’ encrypted requests to the LBS provider, thereby, the LBS provider will not obtain users’ privacy. Consequently, the privacy-preserving of mobile users can be achieved.
The privacy preservation of the LBS provider: Under the aforementioned scheme, the LBS provider would encrypt all LBS data before outsourcing. Thus, fog nodes can only obtain the encrypted LBS items. Similarly, the fog node i d j can not obtain any plaintext information from the stored content information E ( m i ) ( i = 1 , 2 , , k j ) based on the CDH and DL problems. In addition, according to properties of the ASPE algorithm (Formulas (3) and (4)), even though the fog node i d j manages k j encrypted LBS items, it can not obtain any plaintext information about locations. Conceivably, the privacy preservation of the LBS provider can be achieved.

6. Performance Analysis

In this section, we evaluate our proposed FGPQ scheme in terms of the communication overhead, computational costs and latency, respectively. Moreover, we give a comparison with the EPLQ scheme [18] and EPQ scheme [19].

6.1. Computational Costs

In our FGPQ scheme, the LBS provider needs to encrypt k LBS data, where each service content m i is encrypted by the bilinear pairing technology, i.e., e ( g α h ( m i ) r i , g r i ) , and the correponding location ( X i , Y i ) is encrypted by the tuple encryption function E T of the ASPE algorithm. According to the empirical evaluation in [26,30], the computational costs for the ASPE algorithm are microseconds, which are considered negligible compared to the exponentiation and pairing operations. Hence, the computational costs of the LBS provider are 2 k exponentiations in G . When a mobile user wants to request the LBS searching, he or she encrypts the query request ( m * , ( X * , Y * ) , T * ) , which costs two exponentiations in G . After receiving the encrypted request, for each encrypted LBS item ( E ( m i ) , E T ( W ( i ) ^ ) ) , where i = 1 , 2 , , k j , the fog node i d j first computes the Formula (6) to select the LBS items meeting the spatial range. After retrieving f LBS items matched the spatial range, it verifies the Equation (7), where each verification requires two pairing operations. Since the computational costs of the ASPE algorithm are negligible, the computational costs of the fog node i d j are 2 f pairing operations. Finally, the total computational costs for the LBS provider, a mobile user and a fog node i d j will be 2 k exponentiations in G , two exponentiations in G and 2 f pairing operations, respectively, in the proposed FGPQ scheme.
In the EPLQ scheme [18], to generate a query, a mobile user needs to encode the location and the searching spatial range into two N-dimensional vectors, and then encrypt these two vectors as K i = ( g u i , 1 , g u i , 2 , , g u i , N , e ( g , g ) h i ) , where ( u i , 1 , u i , 2 , , u i , N ) is the encoded vector. Hence, the corresponding computational costs are about 2 N exponentiations in G . In order to ensure the privacy, the LBS provider also needs to encode the location of each LBS into a N-dimensional vectors, and then encrypt it as C j = ( g v j , 1 , g v j , 2 , , g v j , N , e ( g , g ) s j ) , which requires N exponentiations in G and one exponentiation in G T . For all k LBS items, it totally spends N * k exponentiations in G and k exponentiations in G T to complete the encryption. In addition, to assist the cloud in checking the spatial range, the LBS provider still needs to compute τ 2 - τ 1 values Ω i = H a s h ( e ( g , g ) ( α × p e r m ( i ) + β ) d ) , where i [ τ 1 , τ 2 ] . That is, the computational costs are about ( τ 2 - τ 1 ) exponentiations in G T . Hence, the total computational costs for the LBS provider are about N * k exponentiations in G and k + ( τ 2 - τ 1 ) exponentiations in G T . To determine whether the encrypted LBS items match the given query or not, it requires the cloud to compute c h e c k ( K i , C j ) , which costs N pairing operations and N multiplications in G T . Note that searching s s ^ -tree to find the matched LBS items requires traversing through about log k + f tree nodes with k LBS items and f items matched the spatial range. Therefore, the total computational costs for the cloud are about ( log k + f ) N pairing operations and ( log k + f ) N multiplications in G T .
In the EPQ scheme [19], the LBS provider outsources all encrypted LBS items to the cloud, where each location index is encrypted as l s 1 = e ( g , g ) q 1 x s 0 2 , l s 2 = e ( g , g ) q 1 y s 0 2 , l s 3 = g x s 0 · h r s 1 and l s 4 = g x s 0 · h r s 2 . The corresponding computational costs for all k LBS items are about 4 k exponentiations in G , 2 k exponentiations in G T and 2 k multiplications in G . To request a LBS query, a mobile user generates an encrypted query ( r q 1 , r q 2 , r q 3 , r q 4 ) = ( e ( g , g ) q 1 ( x s 0 2 - d 2 ) , e ( g , g ) q 1 y 0 2 , g q 1 · 2 x 0 , g q 1 · 2 y 0 ) , which requires two exponentiations in G and two exponentiations in G T . After receiving the query from the user, the cloud computes the search criteria T s for each LBS item stored in it, which requires 2 k pairing operations and 5 k multiplications in G T .
We present the computational costs comparison of our FGPQ scheme, the EPLQ scheme [18] and the EPQ scheme [19] in Table 1, where k and f denote the number of LBS data items and the matched LBS data items, respectively. Obviously, k and f satisfy f k , and the codeword length N satisfies N 7 [18]. Note that C e , C e t , C p , C m t and C m denote the computational costs of an exponentiation in G , an exponentiation in G T , a pairing operation, a multiplication in G T and a multiplication in G , respectively. From the table, it is obvious that the FGPQ scheme largely reduces the computational costs compared to the EPLQ scheme [18] and the EPQ scheme [19]. Moreover, for mobile users, the efficiency of our FGPQ scheme is better than the others. Thus, as declared in [18,19], it is convincing that our FGPQ scheme is more suitable for energy-poor mobile devices.

6.2. Communication Overhead

In our FGPQ scheme, the communication overhead can be divided into two parts: LBS provider-to-fog and user-to-fog. We first discuss the LBS provider-to-fog communication, where the LBS provider delivers all encrypted LBS items to each fog node i d j ( j = 1 , 2 , , n ) . The encrypted LBS item is in the form of { E ( m i ) , E T ( W ( i ) ^ ) } i = 1 , 2 , , k j for the fog node i d j , and its size should be ( 1024 + | E T ( W ( i ) ^ ) | ) k j bits if we choose 512-bit G . As mentioned in [30], each dimension in the ASPE algorithm is a float number (the size of each float number is 32 bits). Thus, the total size of E T ( W ( i ) ^ ) = ( W a ( i ) ^ M 1 , W b ( i ) ^ M 2 ) is 5120 bits if the dimension is 80 (see Section 4.1). Accordingly, the communication overheads for LBS provider-to-fog communication are j = 1 n ( 6144 · k j ) bits. As mentioned in Section 4.2.2, since all k encrypted LBS items are distributed to n fog nodes, we can obtain j = 1 n k j = k , where k j denotes the number of fog node i d j ’s LBS items received from the LBS provider. That is, the value j = 1 n ( 6144 · k j ) can be implicitly simplified as ( 6144 · k ) . Next, we consider the user-to-fog communication. Firstly, a mobile user sends an encrypted request { E ( m * ) , E Q ( L ^ ) } to a fog node, which requires 6144 bits to transmit. Then, this fog node performs the LBS searching and returns the most matched encrypted location E T ( W ( i ) ^ ) to this user, which costs 5120 bits. Therefore, the total communication overheads for user-to-fog communication are about 11,264 bits.
In the EPLQ scheme [18], the LBS provider outsources all encrypted LBS items to the cloud. The communication overheads are ( N + 1 ) k · 512 + k · 128 + 128 · ( τ 2 - τ 1 ) bits if the bit length of p, standard symmetric encryption (e.g., AES) and the hash value h a s h ( ) satisfy | p | = 512 bit, | A E S | = 128 bit and | h a s h ( ) | = 128 bit, respectively. To achieve the LBS searching, a mobile user sends two encrypted tokens to the cloud, which requires 2 ( N + 1 ) · 512 bits. After receiving the LBS searching request, the cloud performs LBS checking to find the LBS items matched the given spatial range. After that, the cloud returns the matched LBS data items to this user. If the number of matched LBS items is f, then the communication overheads are about f · 128 bits, where each ciphertext of the symmetric encryption is 128 bits. Therefore, the LBS provider-to-cloud communication and the user-to-cloud communication require ( 512 · ( N + 1 ) k + 128 · k + 128 × 10 8 ) bits and ( 1024 · ( N + 1 ) + 128 · f ) bits, respectively.
In the EPQ scheme [19], in order to enjoy the location-based services, a mobile user sends an encrypted LBS query request to the cloud. The encrypted LBS query request is in the form of ( I D L B S | | E L Q R | | U i | | T S | | S i g i ) , and its size is about 5280 bits if we set I D L B S | | U i | | T S = 160 bits. To provide the better quality of services, the LBS provider outsources all encrypted LBS data to the cloud. Since each outsourced LBS item is in the form of ( I D L B S | | T j | | l s 1 | | l s 2 | | l s 3 | | l s 4 | | E s ) , the communication overheads for all k LBS items are about 4384 · k bits. In addition, in order to help the cloud to complete the query in the ciphertexts, the LBS provider also sends the evaluation data set E D S = { E D 0 , E D 1 , , E D i , , E D 10 , 000 , 000 , 000 } to the cloud, where E D i = H ( P B i ) . If the bit length of hash H ( ) is set as | H ( ) | = 128 bit, then the size of the set E D S is about 128 × 10 10 bits. Hence, the communication overheads for the LBS provider are about ( 4384 · k + 128 × 10 10 ) bits. After finding f matched LBS items, the cloud returns the query result ( E r q 1 ( T R L ) | | I D C S | | T S | | S i g C S ) to the user, which requires ( 128 · f + 1184 ) bits to transmit. Hence, the total communication overheads between a mobile user and the cloud are about ( 128 · f + 6464 ) bits.
We present the communication overhead comparison of our FGPQ scheme, the EPLQ scheme [18] and the EPQ scheme [19] in Table 2, where “LBS provider-to-cloud (fog nodes)” and “ User-to-cloud (a fog node) ” denote the communication between the LBS provider and the cloud (or fog nodes) and the communication between a mobile user and the cloud (or a fog node), respectively. As described in the EPLQ scheme [18], the codeword length N satisfies N 7 , since the original dimension of the location vector is 7. Therefore, from Table 2, we can know that the communication overheads between the LBS provider and the cloud (or fog nodes) in these three schemes are about the same. However, in the user-to-cloud (a fog node) communication, the communication overhead of our FGPQ scheme is much less than that of other two schemes, as the number of LBS items matched the given spatial range is usually more than a few dozen, i.e., f is more than a few dozen, and f is likely to increase with k or the searching spatial range increasing.

6.3. Latency

In order to demonstrate the advantage of fog computing, this section discusses the latency of LBS searching, and gives a comparison with cloud computing-based schemes, e.g., the schemes proposed in [18,19]. In general, the service latency is a time interval from a user sending a request to receiving the feedback, which contains the online computing delay and communication delay. In our FGPQ scheme, since fog nodes are local, the communication delay between mobile users and fog nodes can be neglected, and thus the latency absolutely depends on the online computing time in fog nodes. As shown in Table 1, the online computing time of the fog node i d j is 2 f · C p seconds, that is, the latency of our FGPQ scheme is 2 f · C p seconds. Alternatively, if the cloud computing system is adopted, the latency depends on the online computing time in the cloud and the communication delay between users and the cloud. Specifically, in the EPLQ scheme [18], the online computing time in the cloud is ( log k + f ) · N · ( C p + C m t ) seconds (See Table 1). In addition, based on Table 2, the communication overheads between each user and a fog node are 128 · f + 1024 ( N + 1 ) bits. Therefore, if l mobile users send requests to the cloud at the same time, the total network traffic is about ( 128 · f + 1024 ( N + 1 ) ) · l bits. As analysed in [34], the communication delay for uploading 10 MB data takes about 28 s, thereby, the communication delay of the EPLQ scheme [18] is about ( 128 · f + 1024 ( N + 1 ) ) · l ÷ 8388608 s (1 MB =8,388,608 bits). Finally, the latency of the EPLQ scheme [18] is about ( ( log k + f ) · N · ( C p + C m t ) + ( 128 · f + 1024 ( N + 1 ) ) · l ÷ 8388608 ) s. Similarity, based on Table 1 and Table 2, the latency of the EPQ scheme [19] is about ( 2 k · C p + 5 k · C m t + ( 128 f + 6464 ) l ÷ 8388608 ) s.
Furthermore, we conduct the experiments with the pairing-based cryptograph library (PBC) [35] and the GNU multiple precision arithmetic library (GMP) [36] running on a 2 . 6 GHz-processor computer to study the latency. To this end, we set the security parameter | κ | = 512 bits. Furthermore, similar to [18], we set N = 37 . With the exact operation costs, we depict the variation of computational costs in terms of the number of LBS items k, the number of matched LBS items and the number of mobile uses l who request LBS searching at the same time, in Figure 2. From the figure, it is obvious that our FGPQ scheme largely reduces the latency compared to the EPLQ scheme [18] and EPQ scheme [19]. In particular, in Figure 2a, our FGPQ scheme remains unchanged when k increases. This is because our FGPQ scheme takes advantage of a very efficient ASPE algorithm, and uses this algorithm to originally select f encrypted LBS items matched the spatial range. In addition, in practice, the number of LBS data stored in each fog node is far less than the total LBS data (i.e., k j k ). Therefore, the latency of our FGPQ scheme only depends on the time verifying whether f LBS data satisfy the searching content, i.e., 2 f pairing operations. In Figure 2c, our FGPQ scheme still remains unchanged when l increases. The main reason is that the communication delay between mobile users and local fog nodes can be neglected, and the computing operations for l users can be performed in parallel. According to Figure 2b, the latency of these three schemes increase with f increasing, but our scheme increase significantly slower.
From the above analyses, our FGPQ scheme is indeed efficient in terms of computational and communication overheads, and also low-latency in fog computing-enhanced system, which is suitable for the real-time LBS searching for mobile users.

7. Conclusions

Fog computing-enhanced location-based services have been widely developed in the Internet of Things. In this paper, we have proposed a fine-grained and privacy-preserving query scheme in fog computing-enhanced location-based services. In our proposed scheme, mobile users can obtain the fine-grained searching result satisfying not only the given spatial range but also the searching content. Detailed privacy analysis shows that our proposed scheme indeed achieves the privacy preservation for the LBS provider and mobile users. In addition, extensive performance analyses and experiments demonstrate that our proposed scheme can significantly reduce computational and communication overheads and ensure low-latency, which outperforms existing state-of-the art schemes. Hence, our proposed scheme is more suitable for real-time LBS searching. In future work, we will consider a stronger adversarial model and design new solutions under the new model. In order to achieve more fine-grained LBS queries, we will consider the extensibility, such as searching the closest restaurant that opens now and satisfies the five-star service score or has good sales volume, which makes the LBS query be more practical.

Acknowledgments

This work was supported in part by the National Science Foundation of China under Grant 61325005 and the Major Frontier Project of Sichuan Province under Grant 2015JY0282.

Author Contributions

The work presented in this paper was a collaboration of all authors. X.Y. conceived and designed the scheme, analyzed the data and wrote the paper; F.Y. performed the experiments; and X.T. commented on the work and modified the paper.

Conflicts of Interest

The authors declare no conflict of interest. The founding sponsors had no role in the design of the study; in the collection, analyses, or interpretation of data; in the writing of the manuscript, and in the decision to publish the results.

References

  1. Bonomi, F.; Milito, R.A.; Zhu, J.; Addepalli, S. Fog computing and its role in the internet of things. In Proceedings of the First Edition of the MCC Workshop on Mobile Cloud Computing, Helsinki, Finland, 17 August 2012; pp. 13–16. [Google Scholar]
  2. Dinh, T.; Kim, Y.; Lee, H. A Location-Based Interactive Model of Internet of Things and Cloud (IoT-Cloud) for Mobile Cloud Computing Applications. Sensors 2017, 17, 489. [Google Scholar] [CrossRef] [PubMed]
  3. Ryu, K.; Koizumi, Y.; Hasegawa, T. Name-based geographical routing/forwarding support for location-basedr IoT services. In Proceedings of the 24th IEEE International Conference on Network Protocols, Singapore, 8–11 November 2016; pp. 1–6. [Google Scholar]
  4. Lu, R.; Lin, X.; Shen, X.S. SPOC: A Secure and Privacy-Preserving Opportunistic Computing Framework for Mobile-Healthcare Emergency. IEEE Trans. Parallel Distrib. Syst. 2013, 24, 614–624. [Google Scholar] [CrossRef]
  5. Freeman, H.; Zhang, T. The emerging era of fog computing and networking [The President’s Page]. IEEE Commun. Mag. 2016, 54, 4–5. [Google Scholar] [CrossRef]
  6. Yannuzzi, M.; Milito, R.A.; Serral-Gracià, R.; Montero, D.; Nemirovsky, M. Key ingredients in an IoT recipe: Fog Computing, Cloud computing, and more Fog Computing. In Proceedings of the 19th IEEE International Workshop on Computer Aided Modeling and Design of Communication Links and Networks, Athens, Greece, 1–3 December 2014; pp. 325–329. [Google Scholar]
  7. Stojmenovic, I.; Wen, S. The Fog Computing Paradigm: Scenarios and Security Issues. In Proceedings of the 2014 Federated Conference on Computer Science and Information Systems, Warsaw, Poland, 7–10 September 2014; pp. 1–8. [Google Scholar]
  8. Yi, S.; Li, C.; Li, Q. A Survey of Fog Computing: Concepts, Applications and Issues. In Proceedings of the 2015 Workshop on Mobile Big Data, Mobidata@MobiHoc 2015, Hangzhou, China, 21 June 2015; pp. 37–42. [Google Scholar]
  9. Deng, R.; Lu, R.; Lai, C.; Luan, T.H.; Liang, H. Optimal Workload Allocation in Fog-Cloud Computing Toward Balanced Delay and Power Consumption. IEEE Internet Things J. 2016, 3, 1171–1181. [Google Scholar] [CrossRef]
  10. Ardagna, C.A.; Cremonini, M.; Damiani, E.; di Vimercati, S.D.C.; Samarati, P. Location Privacy Protection Through Obfuscation-Based Techniques. In Proceedings of the 21st Annual IFIP WG 11.3 Working Conference on Data and Applications Security, Redondo Beach, CA, USA, 8–11 July 2007; pp. 47–60. [Google Scholar]
  11. Kido, H.; Yanagisawa, Y.; Satoh, T. An anonymous communication technique using dummies for location-based services. In Proceedings of the International Conference on Pervasive Services 2005, Santorini, Greece, 11–14 July 2005; pp. 88–97. [Google Scholar]
  12. Gruteser, M.; Grunwald, D. Anonymous Usage of Location-Based Services Through Spatial and Temporal Cloaking. In Proceedings of the First International Conference on Mobile Systems, Applications, and Services, San Francisco, CA, USA, 5–8 May 2003. [Google Scholar]
  13. Mokbel, M.F.; Chow, C.; Aref, W.G. The New Casper: Query Processing for Location Services without Compromising Privacy. In Proceedings of the 32nd International Conference on Very Large Data Bases, Seoul, Korea, 12–15 September 2006; pp. 763–774. [Google Scholar]
  14. Chor, B.; Kushilevitz, E.; Goldreich, O.; Sudan, M. Private Information Retrieval. J. ACM 1998, 45, 965–981. [Google Scholar] [CrossRef]
  15. Ghinita, G.; Kalnis, P.; Khoshgozaran, A.; Shahabi, C.; Tan, K. Private queries in location based services: Anonymizers are not necessary. In Proceedings of the ACM SIGMOD International Conference on Management of Data, Vancouver, BC, Canada, 10–12 June 2008; pp. 121–132. [Google Scholar]
  16. Yi, X.; Paulet, R.; Bertino, E.; Varadharajan, V. Practical k nearest neighbor queries with location privacy. In Proceedings of the IEEE 30th International Conference on Data Engineering, Chicago, IL, USA, 31 March–4 April 2014; pp. 640–651. [Google Scholar]
  17. Olumofin, F.G.; Goldberg, I. Revisiting the Computational Practicality of Private Information Retrieval. In Proceedings of the 15th International Conference on Financial Cryptography and Data Security, Gros Islet, St. Lucia, 28 February–4 March 2011; pp. 158–172. [Google Scholar]
  18. Li, L.; Lu, R.; Huang, C. EPLQ: Efficient Privacy-Preserving Location-Based Query Over Outsourced Encrypted Data. IEEE Internet Things J. 2016, 3, 206–218. [Google Scholar] [CrossRef]
  19. Zhu, H.; Lu, R.; Huang, C.; Chen, L.; Li, H. An Efficient Privacy-Preserving Location-Based Services Query Scheme in Outsourced Cloud. IEEE Trans. Veh. Technol. 2016, 65, 7729–7739. [Google Scholar] [CrossRef]
  20. Peng, T.; Liu, Q.; Meng, D.; Wang, G. Collaborative trajectory privacy preserving scheme in location-based services. Inf. Sci. 2017, 387, 165–179. [Google Scholar] [CrossRef]
  21. Lai, C.; Lu, R.; Zheng, D.; Li, H.; Shen, X.S. Toward secure large-scale machine-to-machine comm unications in 3GPP networks: Challenges and solutions. IEEE Commun. Mag. 2015, 53, 12–19. [Google Scholar] [CrossRef]
  22. Dastjerdi, A.V.; Buyya, R. Fog Computing: Helping the Internet of Things Realize Its Potential. IEEE Comput. 2016, 49, 112–116. [Google Scholar] [CrossRef]
  23. Huang, C.; Ma, M.; Liu, Y.; Liu, A. Preserving Source Location Privacy for Energy Harvesting WSNs. Sensors 2017, 17, 724. [Google Scholar] [CrossRef] [PubMed]
  24. Wang, L.; Liu, G.; Sun, L. A Secure and Privacy-Preserving Navigation Scheme Using Spatial Crowdsourcing in Fog-Based VANETs. Sensors 2017, 17, 668. [Google Scholar] [CrossRef] [PubMed]
  25. Boneh, D.; Franklin, M.K. Identity-Based Encryption from the Weil Pairing. In Proceedings of the 21st Annual International Cryptology Conference on Advances in Cryptology, Santa Barbara, CA, USA, 19–23 August 2001; pp. 213–229. [Google Scholar]
  26. Wong, W.K.; Cheung, D.W.; Kao, B.; Mamoulis, N. Secure kNN computation on encrypted databases. In Proceedings of the ACM SIGMOD International Conference on Management of Data, Providence, RI, USA, 29 June–2 July 2009; pp. 139–152. [Google Scholar]
  27. Lu, R.; Heung, K.; Lashkari, A.H.; Ghorbani, A.A. A Lightweight Privacy-Preserving Data Aggregation Scheme for Fog Computing-Enhanced IoT. IEEE Access 2017, 5, 3302–3312. [Google Scholar] [CrossRef]
  28. Yang, X.; Lu, R.; Liang, H.; Tang, X. SFPM: A Secure and Fine-Grained Privacy-Preserving Matching Protocol for Mobile Social Networking. Big Data Res. 2016, 3, 2–9. [Google Scholar] [CrossRef]
  29. Boneh, D.; Lynn, B.; Shacham, H. Short Signatures from the Weil Pairing. J. Cryptol. 2004, 17, 297–319. [Google Scholar] [CrossRef]
  30. Li, H.; Yang, Y.; Luan, T.H.; Liang, X.; Zhou, L.; Shen, X.S. Enabling Fine-Grained Multi-Keyword Search Supporting Classified Sub-Dictionaries over Encrypted Cloud Data. IEEE Trans. Dependable Secur. Comput. 2016, 13, 312–325. [Google Scholar] [CrossRef]
  31. Cao, N.; Wang, C.; Li, M.; Ren, K.; Lou, W. Privacy-Preserving Multi-Keyword Ranked Search over Encrypted Cloud Data. IEEE Trans. Parallel Distrib. Syst. 2014, 25, 222–233. [Google Scholar] [CrossRef]
  32. Liu, L.; Tamer Özsu, M. Lp Distances. In Encyclopedia of Database Systems; Springer: New York, NY, USA, 2009; p. 1662. [Google Scholar]
  33. Jiang, T.; Chen, X.; Wu, Q.; Ma, J.; Susilo, W.; Lou, W. Secure and Efficient Cloud Data Deduplication with Randomized Tag. IEEE Trans. Inf. Forensic. Sec. 2017, 12, 532–543. [Google Scholar] [CrossRef]
  34. Aazam, M.; Huh, E. Fog Computing and Smart Gateway Based Communication for Cloud of Things. In Proceedings of the 2014 International Conference on Future Internet of Things and Cloud, Barcelona, Spain, 27–29 August 2014; pp. 464–470. [Google Scholar]
  35. Lynn, B. PBC Library. Available online: https://crypto.stanford.edu/pbc/thesis.html (accessed on 19 April 2017).
  36. Granlund, T. The Gnu MP Bignum Library. Available online: https://gmplib.org/ (accessed on 19 April 2017).
Figure 1. System model under consideration.
Figure 1. System model under consideration.
Sensors 17 01611 g001
Figure 2. The comparison of latency for location-based service searching.
Figure 2. The comparison of latency for location-based service searching.
Sensors 17 01611 g002
Table 1. Comparison of computational costs.
Table 1. Comparison of computational costs.
Mobile UserLBS ProviderCloud/Fog Node
EPLQ [18] 2 N · C e N · k · C e + ( k + τ 2 - τ 1 ) · C e t ( log k + f ) N · ( C p + C m t )
EPQ [19] 2 · ( C e + C e t ) 4 k · C e + 2 k · ( C e t + C m ) 2 k · C p + 5 k · C m t
FGPQ 2 · C e 2 k · C e 2 f · C p
Table 2. Comparison of communication overhead (Bits).
Table 2. Comparison of communication overhead (Bits).
LBS Provider-to-Cloud (Fog Nodes)User-to-Cloud (A Fog Node)
EPLQ [18] 512 · ( N + 1 ) k + 128 · k + 128 · ( τ 2 - τ 1 ) 1024 · ( N + 1 ) + 128 · f
EPQ [19] 4384 · k + 128 × 10 10 128 · f + 6464
FGPQ 6144 · k 11264

Share and Cite

MDPI and ACS Style

Yang, X.; Yin, F.; Tang, X. A Fine-Grained and Privacy-Preserving Query Scheme for Fog Computing-Enhanced Location-Based Service. Sensors 2017, 17, 1611. https://doi.org/10.3390/s17071611

AMA Style

Yang X, Yin F, Tang X. A Fine-Grained and Privacy-Preserving Query Scheme for Fog Computing-Enhanced Location-Based Service. Sensors. 2017; 17(7):1611. https://doi.org/10.3390/s17071611

Chicago/Turabian Style

Yang, Xue, Fan Yin, and Xiaohu Tang. 2017. "A Fine-Grained and Privacy-Preserving Query Scheme for Fog Computing-Enhanced Location-Based Service" Sensors 17, no. 7: 1611. https://doi.org/10.3390/s17071611

APA Style

Yang, X., Yin, F., & Tang, X. (2017). A Fine-Grained and Privacy-Preserving Query Scheme for Fog Computing-Enhanced Location-Based Service. Sensors, 17(7), 1611. https://doi.org/10.3390/s17071611

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop