Research Article
A Reconstruction Attack Scheme on Secure Outsourced Spatial Dataset in Vehicular Ad-Hoc Networks
Algorithm 1
Reconstruction of the spatial dataset index.
| | Input:attack granularity , dataset, access patterns | | | Output: x index and y index of all records in the dataset | | (1) | Map | | (2) | Map | | (3) | FOR each | | (4) | get | | (5) | | | (6) | | | (7) | For each record in | | (8) | | | (9) | END FOR | | (10) | END FOR | | (11) | FOR each | | (12) | get | | (13) | | | (14) | | | (15) | For each record in | | (16) | | | (17) | END FOR | | (18) | END FOR | | (19) | RETURN |
|