Research Article
A Reconstruction Attack Scheme on Secure Outsourced Spatial Dataset in Vehicular Ad-Hoc Networks
Table 2
The number of access patterns and represent records.
| | Attack granularity | Access pattern number | Represent record number |
| | 10 × 10 | 550 × 2 | 68 | | 20 × 20 | 4200 × 2 | 224 | | 30 × 30 | 13950 × 2 | 454 | | 40 × 40 | 32800 × 2 | 756 | | 50 × 50 | 63750 × 2 | 1105 | | 60 × 60 | 109800 × 2 | 1488 | | 70 × 70 | 173950 × 2 | 1931 | | 80 × 80 | 259200 × 2 | 2433 | | 90 × 90 | 368550 × 2 | 2927 | | 100 × 100 | 505000 × 2 | 3474 |
|
|