A spatial network query method capable of protecting privacy

A technology of spatial network and query method, applied in the field of privacy protection of spatial network query, to achieve the effect of realizing safe and efficient query processing service

Active Publication Date: 2019-05-07
SHENYANG AEROSPACE UNIVERSITY
View PDF5 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

These works cannot be directly applied to solve the problem of secure query processing on spatial networks
Even though they can partially solve the secure query problem by computing the distance and traversing the network by adopting safe spatial query and secure network query respectively, they still cannot provide a usable solution to secure spatial network query processing using the constraints of network connectivity and distance.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A spatial network query method capable of protecting privacy
  • A spatial network query method capable of protecting privacy
  • A spatial network query method capable of protecting privacy

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0046] The experimental settings are as follows: two servers are used as cloud servers, and the configuration is Intel(R) Xeon(R) CPUL5638@2.00GHz(Dual Processor) and 40.0GB RAM; one PC is used as the data owner, and the configuration is Intel( R) Core(TM) i3-7100 CPU@3.90GHz and 8.0GB RAM. All three hosts run Windows 7 operating system. The two datasets use the real spatial network dataset of urban roads in Austin, USA, containing 526 and 1,148 nodes and 647 and 1,223 edges, respectively. At the same time, we uniformly select 10% nodes from the dataset as the target set. For each dataset, we execute 10 sets of queries using different query nodes and calculate the average query response time.

[0047] Next, we comprehensively evaluate the algorithm from three aspects: query response time, number of priority sequence operations, and precomputation time and space costs. The experimental results are as follows:

[0048] When investigating "query response time", the present inv...

Embodiment 2

[0052] The present invention can be applied in the scene of outsourcing space network query. The data owner uses the encrypted space network data construction proposed by the present invention to encrypt the space network, and the authenticated user encrypts the query request q using the privacy protection method generated by the space query request proposed by the present invention, and sends the encrypted query request to Go to the cloud service provider (assuming that the number of neighbors requested is k=2), and initiate an HSSNQ query request. Figure 6 Describes an HSSNQ query instance (k=2), there are 8 objects in this instance, among them, the query point E pk (q), target point E pk (d 1 ),E pk (d 2 ),E pk (d 3 ) and others are nodes on the network, and the value on the edge represents the encrypted edge weight.

[0053] After receiving the query request, the cloud service provider first adds the encrypted query to the preferred sequence, and then uses E pk (d...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to the technical field of data processing, in particular to a privacy protection method for spatial network query. The method is based on the following steps: constructing encrypted spatial network data; Generating a security query request; Basic security space network query processing; Heuristic security space network query processing; By applying the method provided by theinvention, the security spatial network query can be realized in an outsourcing scene, and the security of sensitive information such as spatial network data and query requests and user privacy information in the query process is ensured; The spatial network data in the outsourcing scene is effectively utilized; On the premise that data privacy security is guaranteed, the requirement of a user forspatial network query in practical application is met, and a safe and efficient spatial network query system under a data encryption framework is formed.

Description

technical field [0001] The invention relates to the technical field of data processing, in particular to a privacy protection method for space network query. Background technique [0002] With the rapid development of the global positioning system and the wide application of location-based services, a large number of real networks have been added constraints of spatial attributes, which typically include road networks and mobile social networks. This emerging network is defined as a spatial network. Given a query request with nodes and coordinates, k-Nearest Neighbor (kNN) query in spatial networks is to find the k closest network nodes to the requested node under the constraints of network connectivity and distance. For example, in the road network, Alice will find the 3 parks closest to home within 5 kilometers, or in the mobile social network, Bob will find 5 friends within 10 kilometers from the nearest check-in place. With the rapid expansion of the spatial network an...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/08H04L29/06G06F16/29
Inventor 滕一平刘金妍范纯龙丁国辉郑志勇张荣博李胜宇许莉刘晓婷
Owner SHENYANG AEROSPACE UNIVERSITY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products