Browse > Article
http://dx.doi.org/10.3837/tiis.2022.09.014

The privacy protection algorithm of ciphertext nearest neighbor query based on the single Hilbert curve  

Tan, Delin (Sichuan Normal University)
Wang, Huajun (School of Geophysics, Chengdu University of Technology)
Publication Information
KSII Transactions on Internet and Information Systems (TIIS) / v.16, no.9, 2022 , pp. 3087-3103 More about this Journal
Abstract
Nearest neighbor query in location-based services has become a popular application. Aiming at the shortcomings of the privacy protection algorithms of traditional ciphertext nearest neighbor query having the high system overhead because of the usage of the double Hilbert curves and having the inaccurate query results in some special circumstances, a privacy protection algorithm of ciphertext nearest neighbor query which is based on the single Hilbert curve has been proposed. This algorithm uses a single Hilbert curve to transform the two-dimensional coordinates of the points of interest into Hilbert values, and then encrypts them by the order preserving encryption scheme to obtain the one-dimensional ciphertext data which can be compared in numerical size. Then stores the points of interest as elements composed of index value and the ciphertext of the other information about the points of interest on the server-side database. When the user needs to use the nearest neighbor query, firstly calls the approximate nearest neighbor query algorithm proposed in this paper to query on the server-side database, and then obtains the approximate nearest neighbor query results. After that, the accurate nearest neighbor query result can be obtained by calling the precision processing algorithm proposed in this paper. The experimental results show that this privacy protection algorithm of ciphertext nearest neighbor query which is based on the single Hilbert curve is not only feasible, but also optimizes the system overhead and the accuracy of ciphertext nearest neighbor query result.
Keywords
Ciphertext; Nearest Neighbor Query; Single Hilbert Curve; System Overhead; Accuracy;
Citations & Related Records
연도 인용수 순위
  • Reference
1 A. Khoshgozaran, H. Shirani-Mehr and C. Shahabi, "Blind evaluation of location based queries using space transformation to preserve location privacy," Geoinformatica, vol. 17, no.4, pp.599-634, Jan. 2013.   DOI
2 N. Shen, C. F. Jia and S. Liang, "Approach of location privacy protection based on order preserving encryption of the grid," Journal of Communications, vol. 38, no.7, pp. 78-88, Jul. 2017. Articl(CrossRefLink)
3 D, Belazzougui, P, Boldi, R, Pagh, "Monotone minimal perfect hashing: searching a sorted table with o(1) accesses," in Proc. of the 20th Annual ACM-SIAM Symposium on Discrete Algorithms, pp. 785-794, 2009.
4 R. Agrawal, J. Kiernan and R. Srikant, "Order-preserving encryption for numeric data," in Proc. of 2004 ACM SIGMOD international conference on Management of data, pp. 563-574, 2004.
5 A. Boldyreva, N. Chenette and Y. Lee, "Order-Preserving Symmetric Encryption," in Proc. of Advances in Cryptology-EUROCRYPT 2009, vol.5479, no.1, pp. 224-241, Otc. 2009.
6 M. Bader, Space-filling Curves, NewYork, USA: Springer, 2012
7 D. Hilbert, "Uber die Stetige Abbildung einer Linie auf ein Flachenstuck," Mathematische Annalen, vol.38, no.1, pp.459-460, Sep. 1891.   DOI
8 H.V. Jagadish, "Linear clustering of objects with multiple attributes," in Proc. of 1990 ACM SIGMOD International Conference on Management of Data, Atlantic City, NJ, USA, pp. 332-342, 1990.
9 J.A. Orenstein, "Spatial query processing in an object-oriented database system," ACM SIGMOD Record, vol.15, no.2, pp.326-336, Jun. 1986.   DOI
10 Cyberspace administration of china, "To protect data security, the network security review method is coming," China Youth Jan. 05, 2022. Network [Online]. Available: https://feeds-drcn.cloud.huawei.com.cn/landingpage/latest?docid=10510674803129c3862f3f4219d9efbbc44ee86&to_app=hwbrowser&dy_scenario=sticky&tn=cc9e75d798880aacd17f00fe36ccb7ac3369f16421ad696952a51b55a9bcb3f5share_to=link&channel=HW_TRENDING&ctype=news&appid=hwbrowser&cpid=666&r=CN
11 A. Boldyreva, N. Chenette, and A. O'Neill, "Order-Preserving Encryption Revisited: Improved Security Analysis and Alternative Solutions," in Proc. of the 31st Annual Cryptology Conference, pp. 578-595, 2011.
12 A. Khoshgozaran and C. Shahabi, "Blind evaluation of nearest neighbor queries using space transformation to preserve location privacy," in Proc. of Advances in Spatial and Temporal Databases, SSTD 2007, vol.4605, no.1, pp.239-257, Jul. 2007.
13 F. Tian, X. L. Gui and X. J. Zhang, "Privacy-preserving approach for outsourced spatial data based on POI distribution," Journal of Computer, vol. 37, no.1, pp. 123-138, Jan. 2014.
14 C. Faloutsos and S. Roseman, "Fractals for secondary key retrieval," in Proc. of the 8th Symposium on Principles of Database Systems, 247-252, 1989.
15 C. L. Zhou, Y. H. Chen and H. Tian, "Location privacy and query privacy preserving method for K-nearest neighbor query in road networks," Journal of Software, vol. 31, no.2, pp. 471-492, Feb. 2020.
16 D. P. Hu, Decimal block encryption based on negative hypergeometric distribution, Beijing, China: Tsinghua University Press, 2018