Research Article
Secure and Practical Group Nearest Neighbor Query for Location-Based Services in Cloud Computing
Table 1
Comparison with existing works.
| Group size | Schemes | Techniques | Leakage database | Result redundancy |
| | Bamba et al.’08 [10] | Cloak region | Yes | Yes | Wang et al.’16 [11] | OPE + R-tree | No | No | Guo et al.’20 [12] | Bloom filter | No | No | | +prefix encoding | | |
| | Hashem et al.’10 [5] | k-anonymity | Yes | Yes | Huang et al.’10 [13] | MPC | No | Yes | Ashouri et al.’15 [14] | Cloak region | Yes | Yes | Wu et al.’21 [8] | Dummy + Paillier | Yes | No | Our solution | ASPE + kd-tree | No | No |
|
|