The privacy protection algorithm of ciphertext nearest neighbor query based on the single Hilbert curve

被引:0
作者
Tan, Delin [1 ,2 ]
Wang, Huajun [2 ]
机构
[1] Sichuan Normal Univ, Chengdu 610068, Peoples R China
[2] Chengdu Univ Technol, Sch Geophys, Chengdu 610059, Peoples R China
来源
KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS | 2022年 / 16卷 / 09期
关键词
Ciphertext; Nearest Neighbor Query; Single Hilbert Curve; System Overhead; Accuracy; SPACE TRANSFORMATION; BLIND EVALUATION;
D O I
10.3837/tiis.2022.09.014
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Nearest neighbor query in location-based services has become a popular application. Aiming at the shortcomings of the privacy protection algorithms of traditional ciphertext nearest neighbor query having the high system overhead because of the usage of the double Hilbert curves and having the inaccurate query results in some special circumstances, a privacy protection algorithm of ciphertext nearest neighbor query which is based on the single Hilbert curve has been proposed. This algorithm uses a single Hilbert curve to transform the two-dimensional coordinates of the points of interest into Hilbert values, and then encrypts them by the order preserving encryption scheme to obtain the one-dimensional ciphertext data which can be compared in numerical size. Then stores the points of interest as elements composed of index value and the ciphertext of the other information about the points of interest on the server-side database. When the user needs to use the nearest neighbor query, firstly calls the approximate nearest neighbor query algorithm proposed in this paper to query on the server-side database, and then obtains the approximate nearest neighbor query results. After that, the accurate nearest neighbor query result can be obtained by calling the precision processing algorithm proposed in this paper. The experimental results show that this privacy protection algorithm of ciphertext nearest neighbor query which is based on the single Hilbert curve is not only feasible, but also optimizes the system overhead and the accuracy of ciphertext nearest neighbor query result.
引用
收藏
页码:3087 / 3103
页数:17
相关论文
共 16 条
[1]  
Agrawal R., 2004, ACM SIGMOD INT C MAN, P563
[2]  
Bader M., 2012, Space-Filling Curves: An Introduction with Applications in Scientific Computing
[3]  
Belazzougui D, 2009, PROCEEDINGS OF THE TWENTIETH ANNUAL ACM-SIAM SYMPOSIUM ON DISCRETE ALGORITHMS, P785
[4]  
Boldyreva A, 2011, LECT NOTES COMPUT SC, V6841, P578, DOI 10.1007/978-3-642-22792-9_33
[5]  
Boldyreva A, 2009, LECT NOTES COMPUT SC, V5479, P224, DOI 10.1007/978-3-642-01001-9_13
[6]  
Cyberspace administration of china, 2022, CHINA YOUTH 0105
[7]  
Faloutsos C., 1989, Proceedings of the Eighth ACM SIGACT-SIGMOD-SIGART Symposium on Principles of Database Systems, P247, DOI 10.1145/73721.73746
[8]  
Hilbert D., 1891, Math. Ann, V38, P459, DOI DOI 10.1007/BF01199431
[9]  
Hu D. P, 2018, DECIMAL BLOCK ENCRYP
[10]  
JAGADISH HV, 1990, SIGMOD REC, V19, P332, DOI 10.1145/93605.98742