A Review of Cuckoo Filters for Privacy Protection and Their Applications

As the global digitalization process continues, information is transformed into data and widely used, while the data are also at risk of serious privacy breaches. The Cuckoo filter is a data structure based on the Cuckoo hash. It encrypts data when it is used and can achieve privacy protection to a...

Full description

Bibliographic Details
Main Authors: Yekang Zhao, Wangchen Dai, Shiren Wang, Liang Xi, Shenqing Wang, Feng Zhang
Format: Article
Language:English
Published: MDPI AG 2023-06-01
Series:Electronics
Subjects:
Online Access:https://www.mdpi.com/2079-9292/12/13/2809
_version_ 1797591924429815808
author Yekang Zhao
Wangchen Dai
Shiren Wang
Liang Xi
Shenqing Wang
Feng Zhang
author_facet Yekang Zhao
Wangchen Dai
Shiren Wang
Liang Xi
Shenqing Wang
Feng Zhang
author_sort Yekang Zhao
collection DOAJ
description As the global digitalization process continues, information is transformed into data and widely used, while the data are also at risk of serious privacy breaches. The Cuckoo filter is a data structure based on the Cuckoo hash. It encrypts data when it is used and can achieve privacy protection to a certain extent. The Cuckoo filter is an alternative to the Bloom filter, with advantages such as support for deleting elements and efficient space utilization. Cuckoo filters are widely used and developed in the fields of network engineering, storage systems, databases, file systems, distributed systems, etc., because they are often used to solve collection element query problems. In recent years, many variants of the Cuckoo filter have emerged based on ideas such as improving the structure and introducing new technologies in order to accommodate a variety of different scenarios, as well as a huge collection. With the development of the times, the improvement of the structure and operation logic of the Cuckoo filter itself has become an important direction for the research of aggregate element query.
first_indexed 2024-03-11T01:44:29Z
format Article
id doaj.art-c3193f79c3484d6892b119b8ba66de1c
institution Directory Open Access Journal
issn 2079-9292
language English
last_indexed 2024-03-11T01:44:29Z
publishDate 2023-06-01
publisher MDPI AG
record_format Article
series Electronics
spelling doaj.art-c3193f79c3484d6892b119b8ba66de1c2023-11-18T16:23:44ZengMDPI AGElectronics2079-92922023-06-011213280910.3390/electronics12132809A Review of Cuckoo Filters for Privacy Protection and Their ApplicationsYekang Zhao0Wangchen Dai1Shiren Wang2Liang Xi3Shenqing Wang4Feng Zhang5Engineering Research Center of Digital Forensics, Ministry of Education, School of Computer Science, Nanjing University of Information Science and Technology, Nanjing 210044, ChinaResearch Center for Basic Theories of Intelligent Computing, Research Institute of Basic Theories, Zhejiang Lab, Hangzhou 310000, ChinaBeijing Institute of Computer Technology and Application, Beijing 100082, ChinaBeijing Institute of Computer Technology and Application, Beijing 100082, ChinaCollege of Computer Science and Technology, Nanjing University of Aeronautics and Astronautics, Nanjing 210016, ChinaCollege of Computer Science and Technology, Nanjing University of Aeronautics and Astronautics, Nanjing 210016, ChinaAs the global digitalization process continues, information is transformed into data and widely used, while the data are also at risk of serious privacy breaches. The Cuckoo filter is a data structure based on the Cuckoo hash. It encrypts data when it is used and can achieve privacy protection to a certain extent. The Cuckoo filter is an alternative to the Bloom filter, with advantages such as support for deleting elements and efficient space utilization. Cuckoo filters are widely used and developed in the fields of network engineering, storage systems, databases, file systems, distributed systems, etc., because they are often used to solve collection element query problems. In recent years, many variants of the Cuckoo filter have emerged based on ideas such as improving the structure and introducing new technologies in order to accommodate a variety of different scenarios, as well as a huge collection. With the development of the times, the improvement of the structure and operation logic of the Cuckoo filter itself has become an important direction for the research of aggregate element query.https://www.mdpi.com/2079-9292/12/13/2809Cuckoo filteraggregate element queryapproximate membership query structurehashing strategyfalse positive rateprivacy protection
spellingShingle Yekang Zhao
Wangchen Dai
Shiren Wang
Liang Xi
Shenqing Wang
Feng Zhang
A Review of Cuckoo Filters for Privacy Protection and Their Applications
Electronics
Cuckoo filter
aggregate element query
approximate membership query structure
hashing strategy
false positive rate
privacy protection
title A Review of Cuckoo Filters for Privacy Protection and Their Applications
title_full A Review of Cuckoo Filters for Privacy Protection and Their Applications
title_fullStr A Review of Cuckoo Filters for Privacy Protection and Their Applications
title_full_unstemmed A Review of Cuckoo Filters for Privacy Protection and Their Applications
title_short A Review of Cuckoo Filters for Privacy Protection and Their Applications
title_sort review of cuckoo filters for privacy protection and their applications
topic Cuckoo filter
aggregate element query
approximate membership query structure
hashing strategy
false positive rate
privacy protection
url https://www.mdpi.com/2079-9292/12/13/2809
work_keys_str_mv AT yekangzhao areviewofcuckoofiltersforprivacyprotectionandtheirapplications
AT wangchendai areviewofcuckoofiltersforprivacyprotectionandtheirapplications
AT shirenwang areviewofcuckoofiltersforprivacyprotectionandtheirapplications
AT liangxi areviewofcuckoofiltersforprivacyprotectionandtheirapplications
AT shenqingwang areviewofcuckoofiltersforprivacyprotectionandtheirapplications
AT fengzhang areviewofcuckoofiltersforprivacyprotectionandtheirapplications
AT yekangzhao reviewofcuckoofiltersforprivacyprotectionandtheirapplications
AT wangchendai reviewofcuckoofiltersforprivacyprotectionandtheirapplications
AT shirenwang reviewofcuckoofiltersforprivacyprotectionandtheirapplications
AT liangxi reviewofcuckoofiltersforprivacyprotectionandtheirapplications
AT shenqingwang reviewofcuckoofiltersforprivacyprotectionandtheirapplications
AT fengzhang reviewofcuckoofiltersforprivacyprotectionandtheirapplications