ABSTRACT
The encoding method of a searchable encryption can significantly impact the performance of a location-based alert system. While there were attempts to design searchable encryption manually, Gray Encoding is considered the most preferable method. However, if the alert zones are scattered unevenly, Gray Encoding fails to achieve token aggregation. In this research, a novel Quadtree-based Genetic Programming (Quadtree-GP) is proposed to iteratively identify superior searchable encryption candidates for the location-based alert system. Quadtree-GP can be effectively applied on customized requirements and different grid maps. Extensive experimental results show that Quadtree-GP is able to find searchable encryption candidates that outperform GP search, random search, and the baseline Gray Encoding in terms of user response time, token remaining percentage, and execution time.
- Srinivas Aluru. 2004. Quadtrees and Octrees. In Handbook of Data Structures and Applications. Chapman and Hall/CRC.Google Scholar
- Urvesh Bhowan, Mark Johnston, Mengjie Zhang, and Xin Yao. 2013. Evolving Diverse Ensembles Using Genetic Programming for Classification With Unbalanced Data. IEEE Trans. Evol. Comput. 17, 3 (2013), 368--386.Google ScholarDigital Library
- Ying Bi, Bing Xue, and Mengjie Zhang. 2021. Genetic Programming With a New Representation to Automatically Learn Features and Evolve Ensembles for Image Classification. IEEE Trans. Cybern. 51, 4 (2021), 1769--1783.Google ScholarCross Ref
- Ying Bi, Bing Xue, and Mengjie Zhang. 2021. Genetic Programming With Image-Related Operators and a Flexible Program Structure for Feature Learning in Image Classification. IEEE Trans. Evol. Comput. 25, 1 (2021), 87--101.Google ScholarCross Ref
- Carlo Blundo, Vincenzo Iovino, and Giuseppe Persiano. 2009. Private-Key Hidden Vector Encryption with Key Confidentiality. In CANS (Lecture Notes in Computer Science, Vol. 5888). Springer, 259--277.Google ScholarDigital Library
- Dan Boneh, Giovanni Di Crescenzo, Rafail Ostrovsky, and Giuseppe Persiano. 2004. Public Key Encryption with Keyword Search. In EUROCRYPT (Lecture Notes in Computer Science, Vol. 3027). Springer, 506--522.Google Scholar
- Dan Boneh, Amit Sahai, and Brent Waters. 2006. Fully Collusion Resistant Traitor Tracing with Short Ciphertexts and Private Keys. In EUROCRYPT (Lecture Notes in Computer Science, Vol. 4004). Springer, 573--592.Google ScholarDigital Library
- Dan Boneh and Brent Waters. 2007. Conjunctive, Subset, and Range Queries on Encrypted Data. In TCC (Lecture Notes in Computer Science, Vol. 4392). Springer, 535--554.Google ScholarCross Ref
- Thomas Brinkhoff. 2002. A Framework for Generating Network-Based Moving Objects. GeoInformatica 6, 2 (2002), 153--180.Google ScholarDigital Library
- Jeroen Eggermont. 2002. Evolving Fuzzy Decision Trees with Genetic Programming and Clustering. In EuroGP (Lecture Notes in Computer Science, Vol. 2278). Springer, 71--82.Google ScholarCross Ref
- A. E. Eiben and James E. Smith. 2015. Introduction to Evolutionary Computing, Second Edition. Springer.Google Scholar
- Ivan De Falco, Antonio Della Cioppa, and Ernesto Tarantino. 2002. Discovering interesting classification rules with genetic programming. Appl. Soft Comput. 1, 4 (2002), 257--269.Google ScholarCross Ref
- Gabriel Ghinita, Kien Nguyen, Mihai Maruseac, and Cyrus Shahabi. 2020. A secure location-based alert system with tunable privacy-performance trade-off. GeoInformatica 24, 4 (2020), 951--985.Google ScholarDigital Library
- Gabriel Ghinita and Razvan Rughinis. 2014. An efficient privacy-preserving system for monitoring mobile users: making searchable encryption practical. In CODASPY. ACM, 321--332.Google Scholar
- Po-Wei Harn, Sai Deepthi Yeddula, Libo Sun, Min-Te Sun, and Wei-Shinn Ku. 2022. Location-based Alert System Using Searchable Encryption with Hilbert Curve Encoding. In IEEE BigData. IEEE.Google Scholar
- Hajira Jabeen and Abdul Rauf Baig. 2013. Two-stage learning for multi-class classification using genetic programming. Neurocomputing 116 (2013), 311--316.Google ScholarCross Ref
- Saso Karakatic, Marjan Hericko, and Vili Podgorelec. 2017. Experiments with Lazy Evaluation of Classification Decision Trees Made with Genetic Programming. In IJCCI. SciTePress, 348--353.Google Scholar
- John R. Koza. 1993. Genetic programming - on the programming of computers by means of natural selection. MIT Press.Google ScholarDigital Library
- Chan-Sheng Kuo, Tzung-Pei Hong, and Chuen-Lung Chen. 2007. Applying genetic programming technique in classification trees. Soft Comput. 11, 12 (2007), 1165--1172.Google ScholarDigital Library
- Qin Liu, Guojun Wang, and Jie Wu. 2012. Secure and privacy preserving keyword searching for cloud storage services. J. Netw. Comput. Appl. 35, 3 (2012), 927--933.Google ScholarDigital Library
- Yi Liu and Taghi M. Khoshgoftaar. 2003. Building Decision Tree Software Quality Classification Models Using Genetic Programming. In GECCO (Lecture Notes in Computer Science, Vol. 2724). Springer, 1808--1809.Google Scholar
- Kaustuv Nag and Nikhil Pal. 2019. Genetic Programming for Classification and Feature Selection. 119--141. Google ScholarCross Ref
- Bo Peng, Shuting Wan, Ying Bi, Bing Xue, and Mengjie Zhang. 2021. Automatic Feature Extraction and Construction Using Genetic Programming for Rotating Machinery Fault Diagnosis. IEEE Trans. Cybern. 51, 10 (2021), 4909--4923.Google ScholarCross Ref
- Dawn Xiaodong Song, David A. Wagner, and Adrian Perrig. 2000. Practical Techniques for Searches on Encrypted Data. In IEEE Symposium on Security and Privacy. IEEE Computer Society, 44--55.Google Scholar
Index Terms
- A Novel Quadtree-Based Genetic Programming Search for Searchable Encryption Optimization
Recommendations
Towards asymmetric searchable encryption with message recovery and flexible search authorization
ASIA CCS '13: Proceedings of the 8th ACM SIGSAC symposium on Information, computer and communications securityWhen outsourcing data to third-party servers, searchable encryption is an important enabling technique which simultaneously allows the data owner to keep his data in encrypted form and the third-party servers to search in the ciphertexts. Motivated by ...
Improved searchable public key encryption with designated tester
ASIACCS '09: Proceedings of the 4th International Symposium on Information, Computer, and Communications SecurityRecently, Baek et al. proposed an efficient public key encryption scheme with keyword search based on the scheme of Boneh et al., However, the security model of Baek et al. seriously limits the ability of the adversary.
In this paper, we enhance the ...
Mis-operation Resistant Searchable Homomorphic Encryption
ASIA CCS '17: Proceedings of the 2017 ACM on Asia Conference on Computer and Communications SecurityLet us consider a scenario that a data holder (e.g., a hospital) encrypts a data (e.g., a medical record) which relates a keyword (e.g., a disease name), and sends its ciphertext to a server. We here suppose not only the data but also the keyword should ...
Comments