A Review of Cuckoo Filters for Privacy Protection and Their Applications
As the global digitalization process continues, information is transformed into data and widely used, while the data are also at risk of serious privacy breaches. The Cuckoo filter is a data structure based on the Cuckoo hash. It encrypts data when it is used and can achieve privacy protection to a...
Main Authors: | , , , , , |
---|---|
Format: | Article |
Language: | English |
Published: |
MDPI AG
2023-06-01
|
Series: | Electronics |
Subjects: | |
Online Access: | https://www.mdpi.com/2079-9292/12/13/2809 |
_version_ | 1797591924429815808 |
---|---|
author | Yekang Zhao Wangchen Dai Shiren Wang Liang Xi Shenqing Wang Feng Zhang |
author_facet | Yekang Zhao Wangchen Dai Shiren Wang Liang Xi Shenqing Wang Feng Zhang |
author_sort | Yekang Zhao |
collection | DOAJ |
description | As the global digitalization process continues, information is transformed into data and widely used, while the data are also at risk of serious privacy breaches. The Cuckoo filter is a data structure based on the Cuckoo hash. It encrypts data when it is used and can achieve privacy protection to a certain extent. The Cuckoo filter is an alternative to the Bloom filter, with advantages such as support for deleting elements and efficient space utilization. Cuckoo filters are widely used and developed in the fields of network engineering, storage systems, databases, file systems, distributed systems, etc., because they are often used to solve collection element query problems. In recent years, many variants of the Cuckoo filter have emerged based on ideas such as improving the structure and introducing new technologies in order to accommodate a variety of different scenarios, as well as a huge collection. With the development of the times, the improvement of the structure and operation logic of the Cuckoo filter itself has become an important direction for the research of aggregate element query. |
first_indexed | 2024-03-11T01:44:29Z |
format | Article |
id | doaj.art-c3193f79c3484d6892b119b8ba66de1c |
institution | Directory Open Access Journal |
issn | 2079-9292 |
language | English |
last_indexed | 2024-03-11T01:44:29Z |
publishDate | 2023-06-01 |
publisher | MDPI AG |
record_format | Article |
series | Electronics |
spelling | doaj.art-c3193f79c3484d6892b119b8ba66de1c2023-11-18T16:23:44ZengMDPI AGElectronics2079-92922023-06-011213280910.3390/electronics12132809A Review of Cuckoo Filters for Privacy Protection and Their ApplicationsYekang Zhao0Wangchen Dai1Shiren Wang2Liang Xi3Shenqing Wang4Feng Zhang5Engineering Research Center of Digital Forensics, Ministry of Education, School of Computer Science, Nanjing University of Information Science and Technology, Nanjing 210044, ChinaResearch Center for Basic Theories of Intelligent Computing, Research Institute of Basic Theories, Zhejiang Lab, Hangzhou 310000, ChinaBeijing Institute of Computer Technology and Application, Beijing 100082, ChinaBeijing Institute of Computer Technology and Application, Beijing 100082, ChinaCollege of Computer Science and Technology, Nanjing University of Aeronautics and Astronautics, Nanjing 210016, ChinaCollege of Computer Science and Technology, Nanjing University of Aeronautics and Astronautics, Nanjing 210016, ChinaAs the global digitalization process continues, information is transformed into data and widely used, while the data are also at risk of serious privacy breaches. The Cuckoo filter is a data structure based on the Cuckoo hash. It encrypts data when it is used and can achieve privacy protection to a certain extent. The Cuckoo filter is an alternative to the Bloom filter, with advantages such as support for deleting elements and efficient space utilization. Cuckoo filters are widely used and developed in the fields of network engineering, storage systems, databases, file systems, distributed systems, etc., because they are often used to solve collection element query problems. In recent years, many variants of the Cuckoo filter have emerged based on ideas such as improving the structure and introducing new technologies in order to accommodate a variety of different scenarios, as well as a huge collection. With the development of the times, the improvement of the structure and operation logic of the Cuckoo filter itself has become an important direction for the research of aggregate element query.https://www.mdpi.com/2079-9292/12/13/2809Cuckoo filteraggregate element queryapproximate membership query structurehashing strategyfalse positive rateprivacy protection |
spellingShingle | Yekang Zhao Wangchen Dai Shiren Wang Liang Xi Shenqing Wang Feng Zhang A Review of Cuckoo Filters for Privacy Protection and Their Applications Electronics Cuckoo filter aggregate element query approximate membership query structure hashing strategy false positive rate privacy protection |
title | A Review of Cuckoo Filters for Privacy Protection and Their Applications |
title_full | A Review of Cuckoo Filters for Privacy Protection and Their Applications |
title_fullStr | A Review of Cuckoo Filters for Privacy Protection and Their Applications |
title_full_unstemmed | A Review of Cuckoo Filters for Privacy Protection and Their Applications |
title_short | A Review of Cuckoo Filters for Privacy Protection and Their Applications |
title_sort | review of cuckoo filters for privacy protection and their applications |
topic | Cuckoo filter aggregate element query approximate membership query structure hashing strategy false positive rate privacy protection |
url | https://www.mdpi.com/2079-9292/12/13/2809 |
work_keys_str_mv | AT yekangzhao areviewofcuckoofiltersforprivacyprotectionandtheirapplications AT wangchendai areviewofcuckoofiltersforprivacyprotectionandtheirapplications AT shirenwang areviewofcuckoofiltersforprivacyprotectionandtheirapplications AT liangxi areviewofcuckoofiltersforprivacyprotectionandtheirapplications AT shenqingwang areviewofcuckoofiltersforprivacyprotectionandtheirapplications AT fengzhang areviewofcuckoofiltersforprivacyprotectionandtheirapplications AT yekangzhao reviewofcuckoofiltersforprivacyprotectionandtheirapplications AT wangchendai reviewofcuckoofiltersforprivacyprotectionandtheirapplications AT shirenwang reviewofcuckoofiltersforprivacyprotectionandtheirapplications AT liangxi reviewofcuckoofiltersforprivacyprotectionandtheirapplications AT shenqingwang reviewofcuckoofiltersforprivacyprotectionandtheirapplications AT fengzhang reviewofcuckoofiltersforprivacyprotectionandtheirapplications |