Privacy-Preserving Range Query for High-dimensional Uncertain Data in A Two-party Scenario

被引:0
|
作者
Su Shenghao [1 ]
Guo Cheng [1 ]
Tian Pengxu [1 ]
Tang Xinyu [1 ]
机构
[1] Dalian Univ Technol, Sch Software, Dalian, Peoples R China
基金
美国国家科学基金会;
关键词
cloud computing; privacy preserve; range search; uncertain data;
D O I
10.1109/DSC49826.2021.9346235
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the fast evolution of sensor technology, massive high-dimensional data are collected by various service providers. Other institutions also want to use the data for analysis and statistics. However, for the privacy and legal concerns, data owners should not directly share the data with others. In addition, some factors such as measurement limitations, noise, and network delays may result in uncertain data. Compared with processing certain data, managing and processing uncertain data is more challenging. In this paper, we propose a privacy-preserving range query scheme for high-dimensional uncertain data owned by the other party, in which range query problem can be solved by data owners without revealing their data and the query range is invisible except the query requestor. We utilize the Paillier encryption as the basic block of our scheme. The data owner utilizes a binary tree index to promote query, which combines pivot-mapping and Bloom filter. We analyze the security and evaluate the performance of the scheme with a synthetic dataset. The analysis and experimental results show that our scheme is secure and efficient.
引用
收藏
页数:7
相关论文
共 50 条
  • [41] Privacy-Preserving Query Processing by Multi-Party Computation
    Sepehri, Maryam
    Cimato, Stelvio
    Damiani, Ernesto
    [J]. COMPUTER JOURNAL, 2015, 58 (10): : 2195 - 2212
  • [42] Quantum Privacy-Preserving Range Query Protocol for Encrypted Data in IoT Environments
    Ye, Chong-Qiang
    Li, Jian
    Chen, Xiao-Yu
    [J]. Sensors, 2024, 24 (22)
  • [43] Efficient Privacy-Preserving Spatial Range Query Over Outsourced Encrypted Data
    Miao, Yinbin
    Yang, Yutao
    Li, Xinghua
    Liu, Zhiquan
    Li, Hongwei
    Choo, Kim-Kwang Raymond
    Deng, Robert H. H.
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2023, 18 : 3921 - 3933
  • [44] An implementation of secure two-party computation for smartphones with application to privacy-preserving interest-cast
    Costantino, Gianpiero
    Martinelli, Fabio
    Santi, Paolo
    Amoruso, Dario
    [J]. 2012 10th Annual International Conference on Privacy, Security and Trust, PST 2012, 2012, : 9 - 16
  • [45] ZIDS: A Privacy-Preserving Intrusion Detection System Using Secure Two-Party Computation Protocols
    Niksefat, Salman
    Sadeghiyan, Babak
    Mohassel, Payman
    Sadeghian, Saeed
    [J]. COMPUTER JOURNAL, 2014, 57 (04): : 494 - 509
  • [46] Efficient and Privacy-Preserving Cloud-Assisted Two-Party Computation Scheme in Heterogeneous Networks
    Liu, Zhusen
    Wang, Luyao
    Bao, Haiyong
    Cao, Zhenfu
    Zhou, Lu
    Liu, Zhe
    [J]. IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2024, 20 (05) : 8007 - 8018
  • [47] Privacy-Preserving Edit Distance Computation Using Secret-Sharing Two-Party Computation
    Vanegas, Hernan
    Cabarcas, Daniel
    Aranha, Diego F.
    [J]. PROGRESS IN CRYPTOLOGY, LATINCRYPT 2023, 2023, 14168 : 67 - 86
  • [48] An Implementation of Secure Two-Party Computation for Smartphones with Application to Privacy-Preserving Interest-Cast
    Costantino, Gianpiero
    Martinelli, Fabio
    Santi, Paolo
    Amoruso, Dario
    [J]. MOBICOM 12: PROCEEDINGS OF THE 18TH ANNUAL INTERNATIONAL CONFERENCE ON MOBILE COMPUTING AND NETWORKING, 2012, : 447 - 449
  • [49] Towards Practical and Privacy-Preserving Multi-Dimensional Range Query Over Cloud
    Zheng, Yandong
    Lu, Rongxing
    Guan, Yunguo
    Shao, Jun
    Zhu, Hui
    [J]. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2022, 19 (05) : 3478 - 3493
  • [50] A Clustering-Based Bipartite Graph Privacy-Preserving Approach for Sharing High-Dimensional Data
    Wang, Li-e
    Li, Xianxian
    [J]. INTERNATIONAL JOURNAL OF SOFTWARE ENGINEERING AND KNOWLEDGE ENGINEERING, 2014, 24 (07) : 1091 - 1111