Research Article
A Reconstruction Attack Scheme on Secure Outsourced Spatial Dataset in Vehicular Ad-Hoc Networks
| | Attack granularity | GetRepresent (ms) | Simplification (ms) | GetRowIndex (ms) | GetColIndex (ms) |
| | 10 × 10 | 5 | 4 | 3 | 3 | | 20 × 20 | 20 | 21 | 18 | 28 | | 30 × 30 | 69 | 63 | 79 | 99 | | 40 × 40 | 128 | 131 | 172 | 217 | | 50 × 50 | 321 | 342 | 424 | 484 | | 60 × 60 | 788 | 740 | 842 | 996 | | 70 × 70 | 1708 | 1653 | 1379 | 1613 | | 80 × 80 | 3358 | 3300 | 2535 | 2839 | | 90 × 90 | 6086 | 6210 | 4336 | 4685 | | 100 × 100 | 11229 | 10445 | 6987 | 7317 |
|
|