Secure fuzzy retrieval protocol for multiple datasets

被引:0
作者
Zhou, Jie [1 ]
Deng, Jiao [1 ]
Zeng, Shengke [1 ]
He, Mingxing [1 ,2 ]
Liu, Xingwei
机构
[1] Xihua Univ, Sch Comp & Software Engn, Chengdu 610039, Peoples R China
[2] Gingko Coll Hospitality Management, Dept Informat Engn, Chengdu 611743, Peoples R China
基金
中国国家自然科学基金;
关键词
Secure multi-party computation; Private set intersection; Secure retrieval; Fuzzy retrieval; Data fusion;
D O I
10.1016/j.comnet.2024.110891
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
With the diversification of data sources and the massive growth of datasets, data retrieval has become increasingly complex and time-consuming. In the traditional retrieval method, if a user wants to query multiple datasets, the general approach is to retrieve them one by one in order, which may lead to duplication of work and waste of resources. Private set intersection is a specific issue insecure multi-party computation. It allows several participants, each holding different sets, to jointly calculate the intersection of their sets without revealing any information other than the intersection. This method is naturally suitable for data fusion. In this work, we propose a secure fuzzy retrieval protocol for multiple datasets. First, we use private set intersection technology to fuse multiple datasets. Then, we perform secure retrieval based on this fused dataset, effectively avoiding the waste of resources caused by separate retrievals, thereby maximizing resource efficiency. It is worth mentioning that the protocol proposed in this paper can also be used for fuzzy retrieval to improve the user's search experience. More importantly, the protocol can maximize privacy protection during the retrieval process, including strict protection of sensitive information such as retrieval keywords, ensuring that user data and query intentions will not be leaked during the entire retrieval process. Finally, we provide a rigorous security proof and demonstrate the effectiveness of the protocol through simulation experiments.
引用
收藏
页数:11
相关论文
共 50 条
  • [21] A Secure Scalar Product Protocol Against Malicious Adversaries
    杨波
    禹勇
    杨中皇
    JournalofComputerScience&Technology, 2013, 28 (01) : 152 - 158
  • [22] Underdetermined Joint Blind Source Separation of Multiple Datasets
    Zou, Liang
    Chen, Xun
    Ji, Xiangyang
    Wang, Z. Jane
    IEEE ACCESS, 2017, 5 : 7474 - 7487
  • [23] Quantum secure privacy preserving technique to obtain the intersection of two datasets for contact tracing
    Debnath, Sumit Kumar
    Srivastava, Vikas
    Mohanty, Tapaswini
    Kundu, Nibedita
    Sakurai, Kouichi
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2022, 66
  • [24] One Fuzzy Retrieval Algorithm for Speech Navigation System
    Sun, Yanqing
    Zhou, Yu
    Zhao, Qingwei
    Yan, Yonghong
    Wu, Xiao
    2009 INTERNATIONAL CONFERENCE ON FUTURE BIOMEDICAL INFORMATION ENGINEERING (FBIE 2009), 2009, : 85 - 89
  • [25] A Secure Scalar Product Protocol and Its Applications to Computational Geometry
    Yang, Bo
    Yang, Chung-Huang
    Yu, Yong
    Xie, Dan
    JOURNAL OF COMPUTERS, 2013, 8 (08) : 2018 - 2026
  • [26] An unconditionally secure protocol for multi-party set intersection
    Li, Ronghua
    Wu, Chuankun
    APPLIED CRYPTOGRAPHY AND NETWORK SECURITY, PROCEEDINGS, 2007, 4521 : 226 - +
  • [27] Secure blockchain bidding auction protocol against malicious adversaries
    Dai, Xiaobing
    Liu, Jiajing
    Liu, Xin
    Tu, Xiaofen
    Wang, Ruexue
    HIGH-CONFIDENCE COMPUTING, 2024, 4 (03):
  • [28] Secure multi-party computation protocol for sequencing problem
    ChunMing Tang
    GuiHua Shi
    ZhengAn Yao
    Science China Information Sciences, 2011, 54 : 1654 - 1662
  • [29] A secure protocol for determining the meeting points of two intersected circles
    Ye Yun
    Huang Liusheng
    Yang Wei
    Zhou Zhengyou
    ITCS: 2009 INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY AND COMPUTER SCIENCE, PROCEEDINGS, VOL 2, PROCEEDINGS, 2009, : 40 - +
  • [30] Research of quantum secure multi-party ranking protocol
    Liu Wen
    Wang Yong-Bin
    ACTA PHYSICA SINICA, 2011, 60 (07)