RISK: Efficiently processing rich spatial-keyword queries on encrypted geo-textual data

📅 2026-02-24
📈 Citations: 0
Influential: 0
📄 PDF
🤖 AI Summary
Existing searchable encryption schemes struggle to efficiently support diverse spatial keyword queries due to their reliance on task-specific and mutually incompatible index structures, resulting in high overhead and limited practicality. This work proposes RISK, a novel framework featuring a unified index structure—the k-nearest neighbor quadtree (kQ-tree)—which adopts a “text-first, space-second” strategy to seamlessly support both secure range queries and k-nearest neighbor queries. Built upon symmetric encryption and keyed hash functions, RISK offers provable security under the IND-CKA2 model, along with dynamic update capabilities and extensibility to multi-party settings. Experimental evaluations on real-world and synthetic datasets demonstrate that RISK achieves at least half an order of magnitude faster response times for 1% range queries and four orders of magnitude improvement for 10-nearest neighbor queries compared to the state-of-the-art methods.

Technology Category

Application Category

📝 Abstract
Symmetric searchable encryption (SSE) for geo-textual data has attracted significant attention. However, existing schemes rely on task-specific, incompatible indices for isolated specific secure queries (e.g., range or k-nearest neighbor spatial-keyword queries), limiting practicality due to prohibitive multi-index overhead. To address this, we propose RISK, a model for rich spatial-keyword queries on encrypted geo-textual data. In a textual-first-then-spatial manner, RISK is built on a novel k-nearest neighbor quadtree (kQ-tree) that embeds representative and regional nearest neighbors, with the kQ-tree further encrypted using standard cryptographic tools (e.g., keyed hash functions and symmetric encryption). Overall, RISK seamlessly supports both secure range and k-nearest neighbor queries, is provably secure under IND-CKA2 model, and extensible to multi-party scenarios and dynamic updates. Experiments on three real-world and one synthetic datasets show that RISK outperforms state-of-the-art methods by at least 0.5 and 4 orders of magnitude in response time for 1% range queries and 10-nearest neighbor queries, respectively.
Problem

Research questions and friction points this paper is trying to address.

symmetric searchable encryption
geo-textual data
spatial-keyword queries
range queries
k-nearest neighbor queries
Innovation

Methods, ideas, or system contributions that make the work stand out.

symmetric searchable encryption
spatial-keyword query
k-nearest neighbor quadtree
encrypted geo-textual data
dynamic secure indexing
🔎 Similar Papers
No similar papers found.
Z
Zhen Lv
School of Artificial Intelligence, Xi’an International Studies University, Xi’an, China
C
Cong Cao
School of Computer Science and Technology, Xidian University, Xi’an, China
H
Hongwei Huo
School of Computer Science and Technology, Xidian University, Xi’an, China
J
Jiangtao Cui
School of Computer Science and Technology, Xidian University, Xi’an, China; Xi’an University of Posts & Telecommunications, Xi’an, China
Y
Yanguo Peng
School of Computer Science and Technology, Xidian University, Xi’an, China
Hui Li
Hui Li
Xidian University
wireless network Securitysecurity in cloud computinginformation theory
Yingfan Liu
Yingfan Liu
Xidian University
Vector DatabaseHigh-performance Computations