skip to main content
10.1145/3583133.3590566acmconferencesArticle/Chapter ViewAbstractPublication PagesgeccoConference Proceedingsconference-collections
poster

A Novel Quadtree-Based Genetic Programming Search for Searchable Encryption Optimization

Authors Info & Claims
Published:24 July 2023Publication History

ABSTRACT

The encoding method of a searchable encryption can significantly impact the performance of a location-based alert system. While there were attempts to design searchable encryption manually, Gray Encoding is considered the most preferable method. However, if the alert zones are scattered unevenly, Gray Encoding fails to achieve token aggregation. In this research, a novel Quadtree-based Genetic Programming (Quadtree-GP) is proposed to iteratively identify superior searchable encryption candidates for the location-based alert system. Quadtree-GP can be effectively applied on customized requirements and different grid maps. Extensive experimental results show that Quadtree-GP is able to find searchable encryption candidates that outperform GP search, random search, and the baseline Gray Encoding in terms of user response time, token remaining percentage, and execution time.

References

  1. Srinivas Aluru. 2004. Quadtrees and Octrees. In Handbook of Data Structures and Applications. Chapman and Hall/CRC.Google ScholarGoogle Scholar
  2. Urvesh Bhowan, Mark Johnston, Mengjie Zhang, and Xin Yao. 2013. Evolving Diverse Ensembles Using Genetic Programming for Classification With Unbalanced Data. IEEE Trans. Evol. Comput. 17, 3 (2013), 368--386.Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. Ying Bi, Bing Xue, and Mengjie Zhang. 2021. Genetic Programming With a New Representation to Automatically Learn Features and Evolve Ensembles for Image Classification. IEEE Trans. Cybern. 51, 4 (2021), 1769--1783.Google ScholarGoogle ScholarCross RefCross Ref
  4. Ying Bi, Bing Xue, and Mengjie Zhang. 2021. Genetic Programming With Image-Related Operators and a Flexible Program Structure for Feature Learning in Image Classification. IEEE Trans. Evol. Comput. 25, 1 (2021), 87--101.Google ScholarGoogle ScholarCross RefCross Ref
  5. Carlo Blundo, Vincenzo Iovino, and Giuseppe Persiano. 2009. Private-Key Hidden Vector Encryption with Key Confidentiality. In CANS (Lecture Notes in Computer Science, Vol. 5888). Springer, 259--277.Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. Dan Boneh, Giovanni Di Crescenzo, Rafail Ostrovsky, and Giuseppe Persiano. 2004. Public Key Encryption with Keyword Search. In EUROCRYPT (Lecture Notes in Computer Science, Vol. 3027). Springer, 506--522.Google ScholarGoogle Scholar
  7. Dan Boneh, Amit Sahai, and Brent Waters. 2006. Fully Collusion Resistant Traitor Tracing with Short Ciphertexts and Private Keys. In EUROCRYPT (Lecture Notes in Computer Science, Vol. 4004). Springer, 573--592.Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. Dan Boneh and Brent Waters. 2007. Conjunctive, Subset, and Range Queries on Encrypted Data. In TCC (Lecture Notes in Computer Science, Vol. 4392). Springer, 535--554.Google ScholarGoogle ScholarCross RefCross Ref
  9. Thomas Brinkhoff. 2002. A Framework for Generating Network-Based Moving Objects. GeoInformatica 6, 2 (2002), 153--180.Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. Jeroen Eggermont. 2002. Evolving Fuzzy Decision Trees with Genetic Programming and Clustering. In EuroGP (Lecture Notes in Computer Science, Vol. 2278). Springer, 71--82.Google ScholarGoogle ScholarCross RefCross Ref
  11. A. E. Eiben and James E. Smith. 2015. Introduction to Evolutionary Computing, Second Edition. Springer.Google ScholarGoogle Scholar
  12. Ivan De Falco, Antonio Della Cioppa, and Ernesto Tarantino. 2002. Discovering interesting classification rules with genetic programming. Appl. Soft Comput. 1, 4 (2002), 257--269.Google ScholarGoogle ScholarCross RefCross Ref
  13. Gabriel Ghinita, Kien Nguyen, Mihai Maruseac, and Cyrus Shahabi. 2020. A secure location-based alert system with tunable privacy-performance trade-off. GeoInformatica 24, 4 (2020), 951--985.Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. Gabriel Ghinita and Razvan Rughinis. 2014. An efficient privacy-preserving system for monitoring mobile users: making searchable encryption practical. In CODASPY. ACM, 321--332.Google ScholarGoogle Scholar
  15. Po-Wei Harn, Sai Deepthi Yeddula, Libo Sun, Min-Te Sun, and Wei-Shinn Ku. 2022. Location-based Alert System Using Searchable Encryption with Hilbert Curve Encoding. In IEEE BigData. IEEE.Google ScholarGoogle Scholar
  16. Hajira Jabeen and Abdul Rauf Baig. 2013. Two-stage learning for multi-class classification using genetic programming. Neurocomputing 116 (2013), 311--316.Google ScholarGoogle ScholarCross RefCross Ref
  17. Saso Karakatic, Marjan Hericko, and Vili Podgorelec. 2017. Experiments with Lazy Evaluation of Classification Decision Trees Made with Genetic Programming. In IJCCI. SciTePress, 348--353.Google ScholarGoogle Scholar
  18. John R. Koza. 1993. Genetic programming - on the programming of computers by means of natural selection. MIT Press.Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. Chan-Sheng Kuo, Tzung-Pei Hong, and Chuen-Lung Chen. 2007. Applying genetic programming technique in classification trees. Soft Comput. 11, 12 (2007), 1165--1172.Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. Qin Liu, Guojun Wang, and Jie Wu. 2012. Secure and privacy preserving keyword searching for cloud storage services. J. Netw. Comput. Appl. 35, 3 (2012), 927--933.Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. Yi Liu and Taghi M. Khoshgoftaar. 2003. Building Decision Tree Software Quality Classification Models Using Genetic Programming. In GECCO (Lecture Notes in Computer Science, Vol. 2724). Springer, 1808--1809.Google ScholarGoogle Scholar
  22. Kaustuv Nag and Nikhil Pal. 2019. Genetic Programming for Classification and Feature Selection. 119--141. Google ScholarGoogle ScholarCross RefCross Ref
  23. Bo Peng, Shuting Wan, Ying Bi, Bing Xue, and Mengjie Zhang. 2021. Automatic Feature Extraction and Construction Using Genetic Programming for Rotating Machinery Fault Diagnosis. IEEE Trans. Cybern. 51, 10 (2021), 4909--4923.Google ScholarGoogle ScholarCross RefCross Ref
  24. Dawn Xiaodong Song, David A. Wagner, and Adrian Perrig. 2000. Practical Techniques for Searches on Encrypted Data. In IEEE Symposium on Security and Privacy. IEEE Computer Society, 44--55.Google ScholarGoogle Scholar

Index Terms

  1. A Novel Quadtree-Based Genetic Programming Search for Searchable Encryption Optimization

        Recommendations

        Comments

        Login options

        Check if you have access through your login credentials or your institution to get full access on this article.

        Sign in
        • Published in

          cover image ACM Conferences
          GECCO '23 Companion: Proceedings of the Companion Conference on Genetic and Evolutionary Computation
          July 2023
          2519 pages
          ISBN:9798400701207
          DOI:10.1145/3583133

          Copyright © 2023 Owner/Author(s)

          Permission to make digital or hard copies of part or all of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for third-party components of this work must be honored. For all other uses, contact the owner/author(s).

          Publisher

          Association for Computing Machinery

          New York, NY, United States

          Publication History

          • Published: 24 July 2023

          Check for updates

          Qualifiers

          • poster

          Acceptance Rates

          Overall Acceptance Rate1,669of4,410submissions,38%

          Upcoming Conference

          GECCO '24
          Genetic and Evolutionary Computation Conference
          July 14 - 18, 2024
          Melbourne , VIC , Australia
        • Article Metrics

          • Downloads (Last 12 months)47
          • Downloads (Last 6 weeks)9

          Other Metrics

        PDF Format

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader