期刊文献+

基于垂直划分的隐私保护skyline查询

Privacy-preserving Skyline Processing on Vertically-Partitioned Data
下载PDF
导出
摘要 Skyline查询是一种重要的数据分析方法,在推荐系统中有着广泛的应用。近年来,随着隐私保护需求的不断增长,分布式数据集上的隐私保护skyline查询问题受到越来越多的关注。然而,现有的分布式数据集上的隐私保护skyline查询方案大多只适用于水平分布数据集,不能满足垂直分布数据集上的skyline查询需求。为此,深入研究了垂直分布式数据集上保护隐私的skyline查询问题,提出了一种基于保序加密的垂直分布数据集上的隐私保护skyline查询算法,可以在保护数据隐私的同时,有效支持skyline查询过程。理论分析证明了提出协议的正确性和安全性,并通过理论分析和模拟实验对协议运行效率进行了评估,结果显示新方案具有较高的运行效率。 As a method of data analysis,skyline query plays an important role in many real-world applications,such as rec- ommender system.Recently,with the growth of privacy concerns,many schemes have been proposed to achieve privacy-preserving skyline query on distributed databases.Nevertheless,most of them focus on horizontally-partitioned dataset,and cannot support se- cure skyline query on vertically-distributed databases.In this paper,we focus on privacy-preserving skyline query on vertically- partitioned data and propose an efficient scheme based on order-preserving encryption tor it.In the proposed scheme,we can guar- antee the privacy of each data.We theoretically prove the security of our scheme.Additionally,we leverage extensive experiments to evaluate our proposed method, which shows our scheme can achieve high efficiency.
作者 吴吉斌 王箭 WU Ji-Bin;WANG Jian(College of Computer Science and Technology,Nanjing University of Aeronautics and Astronautics,Nanjing,Jiangsu 211106,China)
出处 《计算技术与自动化》 2018年第3期146-149,共4页 Computing Technology and Automation
关键词 SKYLINE查询 隐私保护 垂直分布 skyline query privacy-preserving vertically-partitioned data
  • 相关文献

参考文献1

二级参考文献14

  • 1Yao A.. Protocols for secure computations. In: Proceedings of the 23rd Annual IEEE Symposium on Foundations of Computer Science, Los Angeles, 1982, 160~164
  • 2Golderich O., Micali S., Wigderson A.. How to play any mental game. In: Proceedings of the 19th Annual ACM Symposium on Theory of Computing, New York, 1987, 218~229
  • 3Lindell Y.. On the composition of secure multi-party protocols[Ph.D. dissertation]. The Weizmann Institute of Science, Israel, 2002
  • 4Du Wenliang. A study of several specific secure two-party computation problems[Ph.D. dissertation]. Purdue University,USA, 2000
  • 5Cachin C., Micali S., Stadler M.. Computationally private information retrieval with polyogarithmic communication. In: Proceedings of Eurocrypt'99, Prague, Czech Republic, 1999, 308~318
  • 6Chor B., Gilboa N.. Computationally private information retrieval(extended abstract). In: Proceedings of the 29th ACM Symposium on Theory of Computing, El Paso, Texas, USA, 1997, 304~313
  • 7Du Wenliang, Atallah M.J.. Privacy-preserving cooperative scientific computations. In: Proceedings of the 14th IEEE Computer Security Foundations Workshop, Nova Scotia, Canada, 2001, 273~282
  • 8Luo Wen-Jun, Li Xiang. A study of secure multi-party statistical analysis. In: Proceedings of IEEE International Conference on Computer Networks and Mobile Computing, Shanghai, 2003, 377~382
  • 9Luo Wen-Jun, Li Xiang. A study of secure multi-party elementary function computation protocols. In: Proceedings of the 3rd International Conference on Information Security, Shanghai, 2004, 5~12
  • 10Naor M., Pinkas B.. Distributed oblivious transfer. In: Proceedings of Asiacrypt'00, 2000, 200~219

共引文献33

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部