"Based on encryption techniques, information can be hidden to make it more difficult for attackers to obtain user personal information, thereby providing effective privacy protection [1]. According to the differences in the use of encryption methods, they can be divided into encryption comparison and privacy information retrieval [30]. In the encryption comparison, the main strategy is to compare two encrypted quantities with each other, so as to complete the privacy protection task or location matching without obtaining any additional information between each other, such as the parking lot allocation algorithm for privacy-protected path matching [31], geographic range query matching algorithm for mobile crowdsensing, and access authorization for edge computing [32]. In privacy information retrieval, decentralized asynchronous retrieval feedback [33], privacy information retrieval for semantic information [34], and intermittent privacy information retrieval in location privacy processing [35] are mainly used.

Since the privacy protection of the generalization class is always a traceable way, there will always be a risk probability of producing location or location sets, so there is still a high privacy risk when the attacker has sufficient background knowledge. In the privacy protection strategy using encryption techniques, the comparison method in location privacy is difficult to implement throughout the entire service stage, so the PIR strategy that can complete information retrieval in a dense environment without displaying any plaintext user information is more practical and has better privacy protection effectiveness in location privacy protection.

帮我翻译成英语基于加密类加密手段能够将信息隐藏使得用户个人信息更加不易被各种攻击者获得进而能够提供有效的隐私保护效果1。按照加密手段的使用差异可以分为加密对比类和隐私信息检索类30。在加密对比类中主要的策略是通过两个加密量彼此之间完成对比从而在彼此之间未获得任何额外信息的情况下完成隐私保护的任务或者地点匹配例如隐私保护路径匹配的停车场分配算法31、移动群智感知的地理范围查询匹配算法、边缘计算的访问

原文地址: https://www.cveoy.top/t/topic/hlmf 著作权归作者所有。请勿转载和采集!

免费AI点我,无需注册和登录