CN105610898A - Grid-based location privacy protection method - Google Patents

Grid-based location privacy protection method Download PDF

Info

Publication number
CN105610898A
CN105610898A CN201510850772.9A CN201510850772A CN105610898A CN 105610898 A CN105610898 A CN 105610898A CN 201510850772 A CN201510850772 A CN 201510850772A CN 105610898 A CN105610898 A CN 105610898A
Authority
CN
China
Prior art keywords
cell
poi
inquiring user
user end
information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201510850772.9A
Other languages
Chinese (zh)
Other versions
CN105610898B (en
Inventor
刘安
刘曙曙
李直旭
刘冠峰
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Suzhou University
Original Assignee
Suzhou University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Suzhou University filed Critical Suzhou University
Priority to CN201510850772.9A priority Critical patent/CN105610898B/en
Publication of CN105610898A publication Critical patent/CN105610898A/en
Application granted granted Critical
Publication of CN105610898B publication Critical patent/CN105610898B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/50Network services
    • H04L67/52Network services specially adapted for the location of the user terminal
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/50Network services
    • H04L67/51Discovery or management thereof, e.g. service location protocol [SLP] or web services

Abstract

The invention discloses a grid-based location privacy protection method. The method includes the following steps that: (1) at a preprocessing stage, an LS end constructs an index structure according to a POI database; (2) a user end access a grid P by using an OT Extension protocol; and (3) the user end access a grid Q by using an OT extension protocol. With the above technical schemes of the invention adopted, the grid-based location privacy protection method of the invention is safe and efficient, and can ensure second-level feedback of user query on millions of data points. Based on the wide application of location services, the grid-based location privacy protection method has a broad market prospect; and the grid-based location privacy protection method is of great significance for further promotion and research of location privacy protection.

Description

A kind of location privacy protection method based on lattice
Technical field
The present invention relates to location privacy protection research field, particularly relate to a kind of location privacy protection side based on latticeMethod.
Background technology
Along with the development of mobile device and location technology, produce the service of a large amount of position-based information. Conventionally position clothes,Business provider receives from user's request and feeds back relevant position information on services to request user, such as, by submitting individual toPositional information, location based service provider can provide such as information such as " nearest restaurant or markets " for user. Position-basedThe application service of information, for life brings great convenience, meanwhile, also brings a series of potential safety hazards. Believe for customer locationThe aggressive reasoning of breath may cause individual hobby, behavior pattern, and the privacy informations such as social habit expose, thereby bringThe injury that cannot estimate. From another point of view, positional information is conventionally responsible for collecting by location based service provider and is safeguarded, a large amount ofPositional information need to drop into a large amount of manpower and materials, and therefore, as the private property of location based service provider, location-based service providesBusiness is only limited to user the positional information within the scope of its request is provided, and then ensures the personal secrets of its private data.
At present, researchers have proposed serial of methods and can ensure, under the prerequisite of service, to provide certain journeyThe location privacy protection of degree. Secret protection technology is divided three classes substantially: data distortion, data encryption and restriction are issued. Many hiddenPrivate resist technology has merged multiple technologies, is difficult to be belonged to a certain class. K-anonymity is the extensive technology of issuing based on restrictionMore representational method for secret protection, can ensure any one positional information and other k-1 position undistinguishable,But k-anonymity is easily subject to, uniformity is attacked and background knowledge is attacked.
K-anonymity, can ensure that user's location privacy is protected under certain condition, but does not but consider positionService provider's data-privacy safety. As mentioned above, positional information is the privately owned assets of location based service provider, location-based serviceThe purpose user that is reluctant of provider reveals other positional informations the positional information within the scope of user's request.
Yietal is at " Privatequeriesinlocationbasedservices:anonymizersArenotnecessary " middle proposition by special encipherment scheme, can ensure that user obtains and it is relevant only to obtain its requestPositional information. Isomorphism quality guarantee that he proposes Paillier encipherment scheme has been demonstrate,proved in the situation that customer position information cannot decipher stillSo having can estimated performance. User profile after Paillier is encrypted sends to location based service provider, based on local dataAnd encrypt after customer position information, location based service provider calculates the data message of a series of ciphertext forms. Position clothesThe data of these ciphertext forms are returned to user by business provider, and user can decipher and only can decipher its request position phaseThe data message closing. Although the method realizes above-mentioned target, in the prerequisite of protection user and location information service provider privacyUnder, for user provides location information service, but two kinds of special encipherment schemes that use in the method, in order to provide enoughThe information security of degree, Pailiier encipherment scheme and Rabin encipherment scheme need to consume a large amount of calculation costs, thereby make thisScheme is also inapplicable in actual use.
Summary of the invention
The technical problem that the present invention mainly solves is to provide a kind of location privacy protection method based on lattice, do not reveal appointUnder the prerequisite of one participant privacy information, to user-provided location information service. The present invention is based on the location privacy protection side of latticeMethod, can ensure level feedback second of in 1,000,000 data points user inquiry, compares known fresh approach at present, the method timeBetween on had the raising of the order of magnitude. The extensive use of position-based service, makes the present invention is based on the location privacy protection side of latticeMethod has market prospects widely.
For solving the problems of the technologies described above, the technical scheme that the present invention adopts is:
A kind of location privacy protection method based on lattice is provided, and its step comprises:
(1) location based service provider end is set to LS, inquiring user end is set to User, and POI is information point information; PositionService provider's end comprises POI database, and location based service provider end group provides position in POI database to inquiring user endInformation service; Described POI database comprises ρ bar POI record, and ρ is natural number, and wherein every POI record comprises that this POI is correspondingLatitude and longitude information and location expression information; Inquiring user end obtains self positional information by positioning equipment;
(2) pretreatment stage:
Described location based service provider end builds quaternary tree index structure according to POI database;
Described location based service provider end builds grid index Q according to quaternary tree index to the division of whole POI database area;
Each leaf node that quaternary tree is set comprises and is less than or equal to d(d is natural number) individual POI, every in grid index QIndividual cell QjComprise d POI, for the cell of not enough d point, use invalid value to be filled complete;
Meanwhile, described location based service provider end builds grid index P, and described location based service provider end is divided whole regionFor m*m cell, wherein m=2h-1, the degree of depth that h is quaternary tree, the each cell P in grid index PiAll corresponding grid ropesDraw a certain cell Q in Qj,PiIn stored and PiCorresponding QjCell label j;
Grid after location based service provider end obtains after using SHA that grid index P and Q are encrypted encryptingIndex E (P) and E (Q);
Location based service provider termination is received the inquiry request that inquiring user end sends according to self-position information, and quaternary tree is darkGrid index E (P) and E (Q) after degree h and encryption send to inquiring user end;
(3) the query processing stage:
Described inquiring user end utilizes OTExtension protocol access grid index P: due to the quaternary tree degree of depth
H is disclosed, and described inquiring user end can be determined the division of grid index P, and unit, definite inquiring user end placeThe position i of lattice, utilizes after OTExtension protocol operation, and inquiring user end obtains cell PiKey PKi, key PKi?For cell E (Pi) decruption key;
Inquiring user end utilizes key PKiDeciphering E (Pi), the value after the deciphering obtaining is that inquiring user end is in grid index QCell location j;
(4) described inquiring user end utilizes OTExtension protocol access grid index Q: because inquiry is used
Family end has been determined its cell location j in grid index Q, so by after OTExtension protocol operation, look intoAsk user side and can obtain cell QjKey QKj, key QKjCan decryption unit lattice E (Qj);
Inquiring user end utilizes key QKjDeciphering E (Qj), obtain being stored in the cleartext information Q in cell jj, grasp by displacementRestore cell QjIn POI, cell QjIn POI be the Query Result of inquiring user end.
In a preferred embodiment of the present invention, at pretreatment stage, for same POI database, only carry out oncePretreatment stage.
In a preferred embodiment of the present invention, in the time of described OTExtension protocol security, in the query processing stage,Inquiring user end only can obtain a decruption key at every turn, and location based service provider end cannot be learnt any inquiring user end positionPut relevant information.
The invention has the beneficial effects as follows: the location privacy protection method that the present invention is based on lattice has high security, the utmost pointThe advantages such as its efficient online feedback, the extensive use of position-based service, makes the present invention is based on the location privacy protection of latticeMethod has market prospects widely.
Brief description of the drawings
In order to be illustrated more clearly in the technical scheme in the embodiment of the present invention, required making in describing embodiment belowWith accompanying drawing be briefly described, apparently, the accompanying drawing in the following describes is only some embodiments of the present invention, forThose of ordinary skill in the art, are not paying under the prerequisite of creative work, can also obtain other according to these accompanying drawingsAccompanying drawing, wherein:
Fig. 1 is the POI database rope that the present invention is based on the pretreatment stage of location privacy protection method one preferred embodiment of latticeGuiding structure schematic diagram;
Fig. 2 is the grid index P that the present invention is based on the pretreatment stage of location privacy protection method one preferred embodiment of latticeStructural representation;
Fig. 3 is the grid index Q that the present invention is based on the pretreatment stage of location privacy protection method one preferred embodiment of latticeStructural representation;
Fig. 4 is the second stage net that the present invention is based on the query processing stage of location privacy protection method one preferred embodiment of latticeThe access structure schematic diagram of lattice index P;
Fig. 5 is the phase III net that the present invention is based on the query processing stage of location privacy protection method one preferred embodiment of latticeThe access structure schematic diagram of lattice index Q;
Fig. 6 is the system model schematic diagram that the present invention is based on location privacy protection method one preferred embodiment of lattice.
Detailed description of the invention
To the technical scheme in the embodiment of the present invention be clearly and completely described below, obviously, described enforcementExample is only a part of embodiment of the present invention, instead of whole embodiment. Based on the embodiment in the present invention, this area is commonTechnical staff is not making all other embodiment that obtain under creative work prerequisite, all belongs to the model of the present invention's protectionEnclose.
Refer to Fig. 1, the embodiment of the present invention comprises:
Based on a location privacy protection method for lattice, its step comprises:
One) location based service provider end is set to LS, inquiring user end is set to User, and POI is information point information; PositionService provider's end comprises POI database, and location based service provider end group provides position in POI database to inquiring user endInformation service; Described POI database comprises ρ bar POI record, and ρ is natural number, and wherein every POI record comprises that this POI is correspondingLatitude and longitude information and location expression information; Inquiring user end obtains self positional information by positioning equipment.
Location based service provider and inquiring user are as participant, and User obtains by GPS or other built-in positioning equipmentsSelf-position information. User sends request to LS according to agreement, and User obtains its desired POI information, and ensures that LS can notInfer and any and User relevant information, User can not obtain except the POI of request any other database information, thisMethod protection both sides information privacy safety.
Two) the present invention adopts OTExtension agreement (OT Extended Protocol), designs and is not revealing any participant privateThere are under the prerequisite of data message two participant cooperation completing place information inquiries. Method has specifically comprised three phases:
(1) pretreatment stage:
Described location based service provider end builds quaternary tree index structure, described location based service provider end according to POI databaseAccording to quaternary tree index, the division of whole POI database area is built to grid index Q.
Each leaf node that quaternary tree is set comprises and is less than or equal to d(d is natural number) individual POI, in grid index QEach cell QjComprise d POI, for the cell of not enough d point, use invalid value to be filled complete.
Meanwhile, described location based service provider end builds grid index P, and described location based service provider end is by whole regionBe divided into m*m cell, wherein m=2h-1, the degree of depth that h is quaternary tree, the each cell P in grid index PiAll corresponding netsA certain cell Q in lattice index Qj,PiIn stored and PiCorresponding QjCell label j.
After division, grid index P comprises M=mxm cell altogether, and being wherein stored on cell i is a α positionBigit Pi, is corresponding cell label in index Q. Suppose that index Q has N cell, each cellComprise d effective POI point at the most, represented to be stored in d POI on cell j with the bigit Qj of a β position hereinDot information.
In order to guarantee data security, LS obtains after encryption after using sha-1 that the value of grid index P and Q is encryptedGrid index E (P) and E (Q).
Taking encrypted indexes P as example, LS generates l(l=log at random2M) to key (PK1 0,PK1 1),(PK2 0,PK2 1),,(PKl 0,PKl 1). For the arbitrary cell Pi in P, the binary representation form of i is (i1,i2,,il), its cell key is that l is individual closeThe XOR value of key, according to formulaCan be addedCiphertext after close, wherein pseudo-random function H is according to key PKiGenerate a α position random binary number. The encryption of index Q is the same,Do not state tired herein.
Location based service provider termination is received the inquiry request that inquiring user end sends according to self-position information, and by four forksGrid index E (P) and E (Q) after tree degree of depth h and encryption send to inquiring user end.
At pretreatment stage, for same POI database, only carry out pretreatment stage one time.
(2) the query processing stage:
Described inquiring user end utilizes OTExtension protocol access grid index P: due to the quaternary tree degree of depth
H is disclosed, and described inquiring user end can be determined the division of grid index P, and unit, definite inquiring user end placeThe position i of lattice, takes turns after OTExtension protocol operation by one, and User can obtain cell PiKey PKi, key PKiBe cell E (Pi) decruption key.
Inquiring user end utilizes key PKiDeciphering E (Pi), the value after the deciphering obtaining is that inquiring user end is at grid index QMiddle cell location j.
(3) described inquiring user end utilizes OTExtension protocol access grid index Q: because inquiry is used
Family end has been determined its cell location j in grid index Q, so by after OTExtension protocol operation, look intoAsk user side and can obtain cell QjKey QKj, key QKjCan decryption unit lattice E (Qj)。
Inquiring user end utilizes key QKjDeciphering E (Qj), obtain being stored in the cleartext information Q in cell jj, by movingBit manipulation restores cell QjIn POI, cell QjIn POI be the Query Result of inquiring user end.
Secure context: can find out from technical solution of the present invention, can only need to analyze two participants another by what receiveThe information that one side sends is inferred its private data information, if can not, can illustration method be safe.
Suppose that in the present invention LS and User are half honesty, two sides are by strict carrying on an agreement, but computational processIn two sides also can infer and more extraneous information according to average information as much as possible. For the security protocol of malicious attack modelAlthough exist, calculation cost is excessive, also impracticable in practice. And not only can for the security protocol of semi-honesty modelRealize efficiently and calculating, and the security protocol research under malicious attack model is had to important references value.
First analyze participant LS end, LS is encrypted in initial phase and obtains grid index E (P) and the E (Q) after encryption,And send it to User end, and supposing ciphertext safe coefficient trusted, User cannot obtain LS end by cracking E (P) and E (Q)Relevant information.
On the other hand, in the query processing of the present invention stage, online query operation mainly depends on OT twiceExtension operation. OTExtension is the important tool in safety compute field, obtain extensively should in great number of issuesWith, OTExtension has comprised two participants, transmit leg and recipient. Transmit leg is held l to information, is labeled as respectively(X1 0,X1 1),(X2 0,X2 1),,(Xl 0,Xl 1), recipient holds l and selects position (b1,b2,,bl), wherein bi∈ { 0,1}. UtilizeOTExtension, recipient can obtain,,,, but can not obtain any aboutLetterBreath. Equally, transmit leg can not be inferred and any and (b1,b2,,bl) relevant information.
Under the prerequisite of OTExtension safety, can ensure the query processing stage, User only can obtain one at every turnDecruption key, and LS cannot learn any User location dependent information, thus ensure, in half trust model, the present invention is based onThe location privacy protection method safe and feasible of lattice.
In the time of described OTExtension protocol security, in the query processing stage, inquiring user end only can obtain one at every turnIndividual decruption key, and location based service provider end cannot be learnt any inquiring user end position relevant information.
The beneficial effect of a kind of location privacy protection method based on lattice of the present invention is:
One, the invention provides a kind of brand-new scheme, can not reveal under the prerequisite of arbitrary participant privacy information Xiang YongFamily provides location information service. User sends request to location based service provider according to agreement, and it is relevant that end user obtains requestPositional information, and ensure that location based service provider can not be inferred and any relevant information, meanwhile, user can not obtain except pleaseAny other database information beyond asking, this protocol protection both sides information privacy safety. The extensive use of position-based service,Make the location privacy protection method that the present invention is based on lattice there are market prospects widely.
Two, be different from previous method, this method, by special encipherment scheme, can ensure user in 1,000,000 data pointsLevel feedback second of inquiry, compares known fresh approach at present, and the method has had the raising of the order of magnitude in time, communication and meterCalculate complexity and all further reduce, its practicality is strengthened greatly;
Three, the location privacy protection method that the present invention is based on lattice is actively introduced new cryptography scheme, to location privacy protectionFurther promote and research important in inhibiting.
The foregoing is only embodiments of the invention, not thereby limit the scope of the claims of the present invention, everyly utilize thisThe equivalent structure that bright description is done or the conversion of equivalent flow process, or be directly or indirectly used in other relevant technology neckTerritory, is all in like manner included in scope of patent protection of the present invention.

Claims (3)

1. the location privacy protection method based on lattice, is characterized in that, step comprises:
(1) location based service provider end is set to LS, inquiring user end is set to User, and POI is information point information; PositionService provider's end comprises POI database, and location based service provider end group provides position in POI database to inquiring user endInformation service; Described POI database comprises ρ bar POI record, and ρ is natural number, and wherein every POI record comprises that this POI is correspondingLatitude and longitude information and location expression information; Inquiring user end obtains self positional information by positioning equipment;
(2) pretreatment stage:
Described location based service provider end builds quaternary tree index structure according to POI database;
Described location based service provider end is divided and is built grid index Q whole POI database area according to quaternary tree index;
Each leaf node that quaternary tree is set comprises and is less than or equal to d(d is natural number) individual POI, every in grid index QIndividual cell QjComprise d POI, for the cell of not enough d point, use invalid value to be filled complete;
Meanwhile, described location based service provider end builds grid index P, and described location based service provider end is by whole POI dataBase area is divided into m*m cell, wherein m=2h-1, the degree of depth that h is quaternary tree, the each cell P in grid index PiAllA certain cell Q in corresponding grid index Qj,PiIn stored and PiCorresponding QjCell label j;
Grid after location based service provider end obtains after using SHA that grid index P and Q are encrypted encryptingIndex E (P) and E (Q);
Location based service provider termination is received the inquiry request that inquiring user end sends according to self-position information, and quaternary tree is darkGrid index E (P) and E (Q) after degree h and encryption send to inquiring user end;
(3) the query processing stage:
Described inquiring user end utilizes OTExtension protocol access grid index P: due to the quaternary tree degree of depth
H is disclosed, and described inquiring user end can be determined the division of grid index P, and unit, definite inquiring user end placeThe position i of lattice, utilizes after OTExtension protocol operation, and inquiring user end obtains cell PiKey PKi, key PKi?For cell E (Pi) decruption key;
Inquiring user end utilizes key PKiDeciphering E (Pi), the value after the deciphering obtaining is that inquiring user end is single in grid index QUnit's case is put j;
(4) described inquiring user end utilizes OTExtension protocol access grid index Q: because inquiry is used
Family end has been determined its cell location j in grid index Q, so by after OTExtension protocol operation, look intoAsk user side and can obtain cell QjKey QKj, key QKjCan decryption unit lattice E (Qj);
Inquiring user end utilizes key QKjDeciphering E (Qj), obtain being stored in the cleartext information Q in cell jj, grasp by displacementRestore cell QjIn POI, cell QjIn POI be the Query Result of inquiring user end.
2. the location privacy protection method based on lattice according to claim 1, is characterized in that, at pretreatment stage, rightIn same POI database, only carry out pretreatment stage one time.
3. the location privacy protection method based on lattice according to claim 1, is characterized in that, as described OTWhen Extension protocol security, in the query processing stage, inquiring user end only can obtain a decruption key at every turn, and positionService provider's end cannot be learnt any inquiring user end position relevant information.
CN201510850772.9A 2015-11-30 2015-11-30 A kind of location privacy protection method based on lattice Active CN105610898B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510850772.9A CN105610898B (en) 2015-11-30 2015-11-30 A kind of location privacy protection method based on lattice

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510850772.9A CN105610898B (en) 2015-11-30 2015-11-30 A kind of location privacy protection method based on lattice

Publications (2)

Publication Number Publication Date
CN105610898A true CN105610898A (en) 2016-05-25
CN105610898B CN105610898B (en) 2018-11-13

Family

ID=55990432

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510850772.9A Active CN105610898B (en) 2015-11-30 2015-11-30 A kind of location privacy protection method based on lattice

Country Status (1)

Country Link
CN (1) CN105610898B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112866992A (en) * 2021-01-22 2021-05-28 湖南大学 Position privacy protection method and system

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101262416A (en) * 2007-03-06 2008-09-10 华为技术有限公司 Method, system and device for hiding user location in communication system
US20100153126A1 (en) * 2008-12-17 2010-06-17 Gulfsafe Llc Method and system for verifying an operation in a body of water
CN102215077A (en) * 2011-06-13 2011-10-12 四川大学 Automatic dependence surveillance-broadcast (ADS-B) accurate target location encryption method
CN104507048A (en) * 2014-12-24 2015-04-08 福建师范大学 Location privacy protection method based on l-inquiry
CN104618896A (en) * 2015-01-07 2015-05-13 上海交通大学 Method and system for protecting location service privacy based on grid density

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101262416A (en) * 2007-03-06 2008-09-10 华为技术有限公司 Method, system and device for hiding user location in communication system
US20100153126A1 (en) * 2008-12-17 2010-06-17 Gulfsafe Llc Method and system for verifying an operation in a body of water
CN102215077A (en) * 2011-06-13 2011-10-12 四川大学 Automatic dependence surveillance-broadcast (ADS-B) accurate target location encryption method
CN104507048A (en) * 2014-12-24 2015-04-08 福建师范大学 Location privacy protection method based on l-inquiry
CN104618896A (en) * 2015-01-07 2015-05-13 上海交通大学 Method and system for protecting location service privacy based on grid density

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112866992A (en) * 2021-01-22 2021-05-28 湖南大学 Position privacy protection method and system

Also Published As

Publication number Publication date
CN105610898B (en) 2018-11-13

Similar Documents

Publication Publication Date Title
Puttaswamy et al. Preserving location privacy in geosocial applications
CN106407822B (en) A kind of keyword, multi-key word can search for encryption method and system
CN104079574A (en) User privacy protection method based on attribute and homomorphism mixed encryption under cloud environment
CN106330865A (en) Property base keyword searching method supporting efficient revocation in cloud environment
CN105743888A (en) Agent re-encryption scheme based on keyword research
CN107547530A (en) On-line/off-line keyword search methodology and its cloud computing application system based on attribute under mobile cloud environment
CN104967693A (en) Document similarity calculation method facing cloud storage based on fully homomorphic password technology
CN105049196A (en) Searchable encryption method of multiple keywords at specified location in cloud storage
Xie et al. A privacy-preserving online ride-hailing system without involving a third trusted server
CN114036240A (en) Multi-service provider private data sharing system and method based on block chain
Han et al. IP2DM: integrated privacy‐preserving data management architecture for smart grid V2G networks
Mahmoud et al. Secure data aggregation mechanism for water distribution system using blockchain
CN106170943A (en) Use the secret protection ridge regression of part homomorphic cryptography and mask
CN114598472A (en) Conditional-hidden searchable agent re-encryption method based on block chain and storage medium
Xie et al. Privacy-preserving location-based data queries in fog-enhanced sensor networks
Meng et al. Verifiable spatial range query over encrypted cloud data in VANET
Huang et al. Cloud storage model based on the BGV Fully Homomorphic encryption in the blockchain environment
Meng et al. Research of cloud computing security in digital library
CN116451805A (en) Privacy protection federal learning method based on blockchain anti-poisoning attack
CN105610898A (en) Grid-based location privacy protection method
Dong et al. A novel appliance-based secure data aggregation scheme for bill generation and demand management in smart grids
CN105184182A (en) Private information extraction-based query method for cloud computing private range
Li et al. Epps: Efficient privacy-preserving scheme in distributed deep learning
Wang et al. A secure cloud-edge collaborative logistic regression model
Reddy et al. A review on active data access control for multi-authority cloud storage systems with users

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant