Secure fuzzy retrieval protocol for multiple datasets

被引:0
作者
Zhou, Jie [1 ]
Deng, Jiao [1 ]
Zeng, Shengke [1 ]
He, Mingxing [1 ,2 ]
Liu, Xingwei
机构
[1] Xihua Univ, Sch Comp & Software Engn, Chengdu 610039, Peoples R China
[2] Gingko Coll Hospitality Management, Dept Informat Engn, Chengdu 611743, Peoples R China
基金
中国国家自然科学基金;
关键词
Secure multi-party computation; Private set intersection; Secure retrieval; Fuzzy retrieval; Data fusion;
D O I
10.1016/j.comnet.2024.110891
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
With the diversification of data sources and the massive growth of datasets, data retrieval has become increasingly complex and time-consuming. In the traditional retrieval method, if a user wants to query multiple datasets, the general approach is to retrieve them one by one in order, which may lead to duplication of work and waste of resources. Private set intersection is a specific issue insecure multi-party computation. It allows several participants, each holding different sets, to jointly calculate the intersection of their sets without revealing any information other than the intersection. This method is naturally suitable for data fusion. In this work, we propose a secure fuzzy retrieval protocol for multiple datasets. First, we use private set intersection technology to fuse multiple datasets. Then, we perform secure retrieval based on this fused dataset, effectively avoiding the waste of resources caused by separate retrievals, thereby maximizing resource efficiency. It is worth mentioning that the protocol proposed in this paper can also be used for fuzzy retrieval to improve the user's search experience. More importantly, the protocol can maximize privacy protection during the retrieval process, including strict protection of sensitive information such as retrieval keywords, ensuring that user data and query intentions will not be leaked during the entire retrieval process. Finally, we provide a rigorous security proof and demonstrate the effectiveness of the protocol through simulation experiments.
引用
收藏
页数:11
相关论文
共 50 条
[21]   A Secure Protocol for Point-Segment Position Problem [J].
Sun, Yi ;
Sun, Hongxiang ;
Zhang, Hua ;
Wen, Qiaoyan .
WEB INFORMATION SYSTEMS AND MINING, 2010, 6318 :212-+
[22]   Underdetermined Joint Blind Source Separation of Multiple Datasets [J].
Zou, Liang ;
Chen, Xun ;
Ji, Xiangyang ;
Wang, Z. Jane .
IEEE ACCESS, 2017, 5 :7474-7487
[23]   Quantum secure privacy preserving technique to obtain the intersection of two datasets for contact tracing [J].
Debnath, Sumit Kumar ;
Srivastava, Vikas ;
Mohanty, Tapaswini ;
Kundu, Nibedita ;
Sakurai, Kouichi .
JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2022, 66
[24]   One Fuzzy Retrieval Algorithm for Speech Navigation System [J].
Sun, Yanqing ;
Zhou, Yu ;
Zhao, Qingwei ;
Yan, Yonghong ;
Wu, Xiao .
2009 INTERNATIONAL CONFERENCE ON FUTURE BIOMEDICAL INFORMATION ENGINEERING (FBIE 2009), 2009, :85-89
[25]   Venous thrombosis supervised image indexing and fuzzy retrieval [J].
Dahabiah, A. ;
Puentes, J. ;
Solaiman, B. .
2007 ANNUAL INTERNATIONAL CONFERENCE OF THE IEEE ENGINEERING IN MEDICINE AND BIOLOGY SOCIETY, VOLS 1-16, 2007, :4528-+
[26]   A Secure Scalar Product Protocol and Its Applications to Computational Geometry [J].
Yang, Bo ;
Yang, Chung-Huang ;
Yu, Yong ;
Xie, Dan .
JOURNAL OF COMPUTERS, 2013, 8 (08) :2018-2026
[27]   An unconditionally secure protocol for multi-party set intersection [J].
Li, Ronghua ;
Wu, Chuankun .
APPLIED CRYPTOGRAPHY AND NETWORK SECURITY, PROCEEDINGS, 2007, 4521 :226-+
[28]   Secure multi-party computation protocol for sequencing problem [J].
TANG ChunMing SHI GuiHua YAO ZhengAn School of Mathematics and Information ScienceGuangzhou UniversityGuangzhou ChinaState Key Laboratory of Information Security Institute of Software ScienceChinese Academy of SciencesBeijing China School of Mathematics and Computational ScienceSun YatSen UniversityGuangzhou China .
Science China(Information Sciences), 2011, 54 (08) :1654-1662
[29]   A secure protocol for determining whether a point is inside a convex polygon [J].
Luo Yonglong ;
Huang Liusheng ;
Zhong Hong ;
Chen Guoliang .
CHINESE JOURNAL OF ELECTRONICS, 2006, 15 (04) :578-582
[30]   Secure multi-party computation protocol for sequencing problem [J].
ChunMing Tang ;
GuiHua Shi ;
ZhengAn Yao .
Science China Information Sciences, 2011, 54 :1654-1662