Secure fuzzy retrieval protocol for multiple datasets

被引:0
作者
Zhou, Jie [1 ]
Deng, Jiao [1 ]
Zeng, Shengke [1 ]
He, Mingxing [1 ,2 ]
Liu, Xingwei
机构
[1] Xihua Univ, Sch Comp & Software Engn, Chengdu 610039, Peoples R China
[2] Gingko Coll Hospitality Management, Dept Informat Engn, Chengdu 611743, Peoples R China
基金
中国国家自然科学基金;
关键词
Secure multi-party computation; Private set intersection; Secure retrieval; Fuzzy retrieval; Data fusion;
D O I
10.1016/j.comnet.2024.110891
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
With the diversification of data sources and the massive growth of datasets, data retrieval has become increasingly complex and time-consuming. In the traditional retrieval method, if a user wants to query multiple datasets, the general approach is to retrieve them one by one in order, which may lead to duplication of work and waste of resources. Private set intersection is a specific issue insecure multi-party computation. It allows several participants, each holding different sets, to jointly calculate the intersection of their sets without revealing any information other than the intersection. This method is naturally suitable for data fusion. In this work, we propose a secure fuzzy retrieval protocol for multiple datasets. First, we use private set intersection technology to fuse multiple datasets. Then, we perform secure retrieval based on this fused dataset, effectively avoiding the waste of resources caused by separate retrievals, thereby maximizing resource efficiency. It is worth mentioning that the protocol proposed in this paper can also be used for fuzzy retrieval to improve the user's search experience. More importantly, the protocol can maximize privacy protection during the retrieval process, including strict protection of sensitive information such as retrieval keywords, ensuring that user data and query intentions will not be leaked during the entire retrieval process. Finally, we provide a rigorous security proof and demonstrate the effectiveness of the protocol through simulation experiments.
引用
收藏
页数:11
相关论文
共 50 条
[31]   Secure multi-party computation protocol for sequencing problem [J].
ChunMing Tang ;
GuiHua Shi ;
ZhengAn Yao .
Science China Information Sciences, 2011, 54 :1654-1662
[32]   Secure blockchain bidding auction protocol against malicious adversaries [J].
Dai, Xiaobing ;
Liu, Jiajing ;
Liu, Xin ;
Tu, Xiaofen ;
Wang, Ruexue .
HIGH-CONFIDENCE COMPUTING, 2024, 4 (03)
[33]   A secure protocol for determining the meeting points of two intersected circles [J].
Ye Yun ;
Huang Liusheng ;
Yang Wei ;
Zhou Zhengyou .
ITCS: 2009 INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY AND COMPUTER SCIENCE, PROCEEDINGS, VOL 2, PROCEEDINGS, 2009, :40-+
[34]   A protocol for the secure two-party quantum scalar product [J].
He, Li-Bao ;
Huang, Liu-Sheng ;
Yang, Wei ;
Xu, Rui .
PHYSICS LETTERS A, 2012, 376 (16) :1323-1327
[35]   Data Integrity Checking Protocol Based on Secure Multiparty Computation [J].
Shi, Runhua ;
Zhang, Yechi ;
Zhong, Hong ;
Cui, Jie ;
Zhang, Shun .
WIRELESS COMMUNICATIONS, NETWORKING AND APPLICATIONS, WCNA 2014, 2016, 348 :873-882
[36]   Secure multi-party computation protocol for sequencing problem [J].
Tang ChunMing ;
Shi GuiHua ;
Yao ZhengAn .
SCIENCE CHINA-INFORMATION SCIENCES, 2011, 54 (08) :1654-1662
[37]   Efficient Lookup-Table Protocol in Secure Multiparty Computation [J].
Launchbury, John ;
Diatchki, Iavor S. ;
DuBuisson, Thomas ;
Adams-Moran, Andy .
ACM SIGPLAN NOTICES, 2012, 47 (09) :189-200
[38]   Information-theoretically secure number-product protocol [J].
Shen, Chih-Hao ;
Zhan, Justin ;
Wang, Da-Wei ;
Hsu, Tsan-Sheng ;
Liau, Churn-Jung .
PROCEEDINGS OF 2007 INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND CYBERNETICS, VOLS 1-7, 2007, :3006-+
[39]   Design of a Secure Sum Protocol using Trusted Third Party System for Secure Multi-Party Computations [J].
Jahan, Israt ;
Sharmy, Nure Naushin ;
Jahan, Sadia ;
Ebha, Farjana Akther ;
Lisa, Nusrat Jahan .
2015 6th International Conference on Information and Communication Systems (ICICS), 2015, :136-141
[40]   Fuzzy Retrieval in fallbasierten entscheidungsunterstützenden SystemenFuzzy retrieval in case-based decision support systems [J].
Stephan Dempe ;
Ralf Schulz .
Operations-Research-Spektrum, 1998, 20 (3) :189-198