Safety kNN query method based on LBS
A query method and secure two-party computing technology, applied in the field of data privacy protection, can solve the problems of leaked data access mode, difficult balance between query service security and query cost, and susceptibility to reasoning attacks
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0152] The invention will be further described below in conjunction with the accompanying drawings and specific implementation examples, as figure 1 and image 3 As shown, the specific process includes:
[0153] Step 1. The data owner DO generates a key pair (pk, sk) and an encrypted index structure, wherein the generated Paillier key length is 1024 bits, and sends the encrypted index structure to the server C1, and sends the public key pk to Servers C1, C2 and user User send the private key sk to server C2. Use Gowalla to sign in the data set, and randomly select 1000 points for testing, use the point of interest POI as a data point, and standardize the data into a 16-bit large integer, each integer uses the data owner DO to use the processed data point as a seed For nodes, use Fortune's algorithm to build a Voronoi diagram, and then divide the grid to generate encrypted index structures SVD and SG;
[0154] The encrypted index structure includes: secure Voronoi diagram SVD...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com