ANALYSIS OF APPROACHES TO ENSURING CONFIDENTIALITY OF SPATIAL COMPUTING IN THE UNTRUSTED COMPUTING ENVIRONMENT
Abstract and keywords
Abstract:
The article discusses a general problem of ensuring data confidentiality in a cloud environment and highlights a specific problem of ensuring the confidentiality of spatial computing in this kind of environment, shows the reasons for this specialty and suggests a possible solution. The purpose of this research is to analyze the approaches for ensuring the confidentiality of spatial computing in the untrusted computing environment. The relevance of the study is determined by the increasingly widespread use of various wearable devices, such as smart glasses or mixed reality headsets, which can combine digital information from the computer system and from the external environment in the user’s field of view, allowing him to interact with the digital world while maintaining awareness of the physical world. To perceive, analyze and interpret spatial information coming from the physical environment, it is necessary to perform spatial computing, not only by a wearable device itself, but also in a cloud environment. The idea of the solution for ensuring the confidentiality of spatial computing in the untrusted computing environment is proposed by the author and is based on encryption of a spatial index constructed in the form of the R*-tree.

Keywords:
data confidentiality, cloud model of distributed computing, spatial computing
References

1. Hämäläinen M. Urban development with dynamic digital twins in Helsinki city. IET Smart Cities. 2021;3(4): 201–210. DOIhttps://doi.org/10.1049/smc2.12015.

2. Hao H, Wang Y. Smart Curb Digital Twin: Inventorying Curb Environments Using Computer Vision and Street Imagery. IEEE Journal of Radio Frequency Identification. 2022;7: 168–172. DOIhttps://doi.org/10.1109/JRFID.2022.3225733.

3. He X, Ai Q, Wang J, et al. Situation Awareness of Energy Internet of Thing in Smart City Based on Digital Twin: From Digitization to Informatization. IEEE Internet Things Journal. 2023;10(9): 7439–7458. DOIhttps://doi.org/10.1109/JIOT.2022.3203823.

4. Informacionnaja bezopasnost' cifrovogo prostranstva [Information security of the digital space]. Ed. Stelmashonok EV, Vasilevoj IN. Saints-Peterburgh: SPbGEU; 2019. 155 p. (In Russian).

5. Damiani E, De Capitani, Vimercati S, et al. Balancing confidentiality and efficiency in untrusted relational DBMSs. Proceedings of the 10th ACM conference on Computer and communications security (CCS '03). 2003; 93–102. DOIhttps://doi.org/10.1145/948109.948124.

6. Goldreich O, Ostrovsky R. Software protection and simulation on oblivious RAMs. Journal of the ACM. 1996;3: 431–473.

7. Hacigümüş H, Iyer B, Li C, Mehrotra S. Executing SQL over encrypted data in the data-base-service-provider model. Proceedings of the ACM SIGMOD International Conference on Management of Data (SIGMOD '02). 2002; 216–227.

8. Agrawal R, Kiernan J, Srikant R, Xu Y. Order preserving encryption for numeric data. Proceedings of the ACM SIGMOD International Conference on Management of Data (SIGMOD '04). 2004; 563–574.

9. Huang RW, Gui XL, Yu S, Zhuang W. Study of privacy-preserving framework for cloud storage. Computer Science and Information Systems. 2011;8(3): 801–819.

10. Materuhin AV. Teoreticheskie osnovy i metodologija obrabotki potokov prostranstvenno-vremennyh dannyh [Theoretical foundations and methodology for processing spatiotemporal data streams: dissertation]. Dr. of Sci. thesis. Moscow: 2018; 173 p. (In Russian).

Login or Create
* Forgot password?