Please use this identifier to cite or link to this item:
http://hdl.handle.net/10397/118738
| DC Field | Value | Language |
|---|---|---|
| dc.contributor | Department of Electrical and Electronic Engineering | - |
| dc.creator | Fu, Y | - |
| dc.creator | Ye, Q | - |
| dc.creator | Du, R | - |
| dc.creator | Hu, H | - |
| dc.date.accessioned | 2026-05-15T07:36:15Z | - |
| dc.date.available | 2026-05-15T07:36:15Z | - |
| dc.identifier.issn | 0167-4048 | - |
| dc.identifier.uri | http://hdl.handle.net/10397/118738 | - |
| dc.language.iso | en | en_US |
| dc.publisher | Elsevier Advanced Technology | en_US |
| dc.subject | Bloom Filter | en_US |
| dc.subject | Hashing | en_US |
| dc.subject | Indexing | en_US |
| dc.subject | Query processing | en_US |
| dc.subject | Security | en_US |
| dc.title | Secure bi-attribute index : batch membership tests over the non-sensitive attribute | en_US |
| dc.type | Journal/Magazine Article | en_US |
| dc.identifier.volume | 152 | - |
| dc.identifier.doi | 10.1016/j.cose.2025.104369 | - |
| dcterms.abstract | Secure index techniques enable keyword searches on encrypted univariate data, but they struggle with bi-attribute data common in AI and data mining applications. Traditional approaches suffer from inefficiencies during prefix queries due to duplicate trapdoor generations. Although plaintext processing of one non-sensitive attribute can boost performance, it may also introduce privacy risks from inter-attribute correlation and potential inference attacks. This paper presents a secure bi-attribute indexing solution, illustrated with a case study on searchable encryption for time-series data. We introduce two variants of matrix Bloom filters tailored for different workloads and implement a concept of bounded privacy loss via noise infusion from the randomized response technique. The outcome adheres to locally differential privacy principles, offering a provable privacy guarantee for sensitive attribute items. | - |
| dcterms.accessRights | embargoed access | en_US |
| dcterms.bibliographicCitation | Computers and security, May 2025, v. 152, 104369 | - |
| dcterms.isPartOf | Computers and security | - |
| dcterms.issued | 2025-05 | - |
| dc.identifier.scopus | 2-s2.0-85217969086 | - |
| dc.identifier.eissn | 1872-6208 | - |
| dc.identifier.artn | 104369 | - |
| dc.description.validate | 202605 bcjz | - |
| dc.description.oa | Accepted Manuscript | en_US |
| dc.identifier.SubFormID | G001609/2025-12 | en_US |
| dc.description.fundingSource | RGC | en_US |
| dc.description.fundingSource | Others | en_US |
| dc.description.fundingText | This work was supported by the National Natural Science Foundation of China (Grant No: 92270123 and 62372122), Joint Funding Special Project for Guangdong-Hong Kong Science and Technology Innovation (Grant No: 2024A0505040027), and the Research Grants Council, Hong Kong SAR, China (Grant No: 15226221, 15209922, and 15210023). | en_US |
| dc.description.pubStatus | Published | en_US |
| dc.date.embargo | 2027-05-31 | en_US |
| dc.description.oaCategory | Green (AAM) | en_US |
| Appears in Collections: | Journal/Magazine Article | |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.



