A Review of Cuckoo Filters for Privacy Protection and Their Applications
Abstract
:1. Introduction
1.1. Advantages and Main Uses of Cuckoo Filters
- (1)
- CFs support the dynamic addition and deletion of items.
- (2)
- CFs have a higher lookup performance than standard Bloom filters, even when 95% of the space is occupied; CFs’ lookup performance is still better than standard Bloom filters.
- (3)
- Compared with some variants of Bloom filters (such as quotient filters), CFs are easier to achieve.
- (4)
- With a target false positive rate of less than 3%, CFs use less space than Bloom filters in practical applications.
1.2. Cuckoo Filters and Privacy Protection
- (1)
- Data desensitization: Before converting or storing data, sensitive information can be desensitized using CFs. CFs can help detect the presence of known sensitive information, such as specific ID numbers, cell phone numbers, etc. If sensitive information is matched, the corresponding processing measures can be triggered to protect personal privacy.
- (2)
- Preventing duplicate data: CFs can be used to detect duplicate data and avoid storing sensitive information repeatedly during data conversion. This helps reduce the chance and risk of sensitive information leakage.
- (3)
- Fast filtering: CFs can be used to quickly filter out non-sensitive data, thereby reducing the amount of data that need to be further processed. With this filter, data that do not contain sensitive information can be quickly excluded, thus reducing the risk of exposure of sensitive information.
1.3. Recent Developments to Cuckoo Filters
- (1)
- Deletion problem: Deletion only removes a copy of the fingerprint, and it is not certain that this copy of the fingerprint is the fingerprint of the element to be deleted. Furthermore, the deletion does not confirm whether the fingerprint exists in the CF. This situation can generate false positives.
- (2)
- The insertion complexity is relatively high. As the number of inserted elements increases, the complexity becomes higher. When the bucket is full, the kick-out operation needs to be repeated, requiring the fingerprint of the proposed element to be recalculated.
- (3)
- The size of the storage space must be an exponential multiple of 2, which creates a problem of low space utilization.
- (4)
- The same element can be inserted at most -times (k refers to the number of hash functions, and b refers to the number of fingerprints that can be contained in the bucket, which can also be said to be the size of the bucket). Inserting the same item -times will cause the insertion to fail.
1.4. Motivation and Our Contributions
2. Standard Cuckoo Filter
2.1. Cuckoo Hash
2.2. Standard Cuckoo Filter
2.2.1. Basic Operation of the Cuckoo Filter
2.2.2. Dimensions of the Drum
2.3. Application Scenarios
2.4. Some Related Studies on the Improvement of Cuckoo Filters
3. Cuckoo Filter for Improving Cuckoo Strategy
3.1. Length-Aware Cuckoo Filter
3.2. Adaptive Cuckoo Filters
4. Improved Structure of Cuckoo Filter
4.1. d-Ary Cuckoo Filter
4.2. Consistent Cuckoo Filter
4.3. AniFilter
4.4. Position-Aware Cuckoo Filters
4.5. Additive and Subtractive Cuckoo Filters
4.6. Vacuum Filters
4.7. Conditional Cuckoo Filters
4.8. Marked Cuckoo Filter
5. Other Improved Structures
5.1. Compression Structure
5.1.1. Morton Filters
5.1.2. XOR+ Filters
5.2. Filter Integration
5.2.1. Cuckoo Filters with an Integrated Bloom Filter
5.2.2. Multiple Cuckoo Filter
6. Analysis and Exploration of Improvement Schemes
6.1. Scheme Analysis
6.2. Future Development Prospects
- (1)
- Neural networks can learn more complex patterns and features, thus improving the accuracy of CFs. By training the neural network, they can identify and filter more accurate data and reduce the number of misclassifications and omissions.
- (2)
- The neural network can automatically adjust the weights and model structure according to the changes in input data to adapt to different data distributions and features. This allows the CF to adapt and process better with better generalization ability when facing new data.
- (3)
- Neural networks are able to handle nonlinear relationships and complex features, which can capture more semantic information and contextual associations. For text data, neural networks can understand features at the lexical, syntactic, and semantic levels to better distinguish between normal content and malicious attacks.
- (4)
- The optimized CF can take advantage of the neural network to perform filtering and judgment faster with the advantage of parallel computing. This is important for data stream processing in real-time scenarios to improve response time and processing efficiency.
- (5)
- Neural networks are very scalable and can be extended to multi-layer, multi-type network structures to accommodate more complex data analysis needs. This allows CFs to handle a wider range of data types and tasks, with more powerful functions and application potential.
7. Conclusions
Author Contributions
Funding
Data Availability Statement
Conflicts of Interest
References
- Liu, J.; Meng, X. Survey on privacy-preserving machine learning. J. Comput. Res. Dev. 2020, 57, 346–362. [Google Scholar]
- Srivastava, J.; Maddheshiya, S. Retrieving the missing data from different incomplete soft sets. 3c Empres. Investig. Pensam. Crítico 2022, 11, 104–114. [Google Scholar] [CrossRef]
- Ren, Y.; Huang, D.; Wang, W.; Yu, X. BSMD: A blockchain-based secure storage mechanism for big spatio-temporal data. Future Gener. Comput. Syst. 2023, 138, 328–338. [Google Scholar] [CrossRef]
- Paikrao, P.; Doye, D.; Bhalerao, M.; Vaidya, M. Verification of Role of Data Scanning Direction in Image Compression using Fuzzy Composition Operations. 3c Tecnol. Glosas Innov. Apl. Pyme 2022, 11, 38–49. [Google Scholar] [CrossRef]
- Yan, Y.; Ma, M.; Jiang, H. An efficient privacy preserving 4PC machine learning scheme based on secret sharing. J. Comput. Res. Dev. 2022, 59, 2338–2347. [Google Scholar]
- Fang, L.; Li, Y.; Yun, X.; Wen, Z.; Ji, S.; Meng, W.; Cao, Z.; Tanveer, M. THP: A novel authentication scheme to prevent multiple attacks in SDN-based IoT network. IEEE Internet Things J. 2019, 7, 5745–5759. [Google Scholar] [CrossRef]
- Yu, X.; Zhu, S.; Ren, Y. Continuous trajectory similarity search with result diversification. Future Gener. Comput. Syst. 2023, 143, 392–400. [Google Scholar] [CrossRef]
- Ge, C.; Susilo, W.; Baek, J.; Liu, Z.; Xia, J.; Fang, L. A verifiable and fair attribute-based proxy re-encryption scheme for data sharing in clouds. IEEE Trans. Dependable Secur. Comput. 2021, 19, 2907–2919. [Google Scholar] [CrossRef]
- Wu, Q.; Xi, L.; Wang, S.; Ji, S.; Wang, S.; Ren, Y. Verifiable Delay Function and Its Blockchain-Related Application: A Survey. Sensors 2022, 22, 7524. [Google Scholar] [CrossRef]
- Ren, Y.; Leng, Y.; Cheng, Y.; Wang, J. Secure data storage based on blockchain and coding in edge computing. Math. Biosci. Eng. 2019, 16, 1874–1892. [Google Scholar] [CrossRef]
- Bloom, B.H. Space/time trade-offs in hash coding with allowable errors. Commun. ACM 1970, 13, 422–426. [Google Scholar] [CrossRef]
- Ge, C.; Susilo, W.; Liu, Z.; Xia, J.; Szalachowski, P.; Fang, L. Secure keyword search and data sharing mechanism for cloud computing. IEEE Trans. Dependable Secur. Comput. 2020, 18, 2787–2800. [Google Scholar] [CrossRef]
- Ren, Y.; Leng, Y.; Qi, J.; Sharma, P.K.; Wang, J.; Almakhadmeh, Z.; Tolba, A. Multiple cloud storage mechanism based on blockchain in smart homes. Future Gener. Comput. Syst. 2021, 115, 304–313. [Google Scholar] [CrossRef]
- Lu, J.; Zhu, L.; Gao, W. Remarks on bipolar cubic fuzzy graphs and its chemical applications. Int. J. Math. Comput. Eng. 2023, 1, 1–9. [Google Scholar]
- Grissa, M.; Yavuz, A.A.; Hamdaoui, B. Cuckoo filter-based location-privacy preservation in database-driven cognitive radio networks. In Proceedings of the 2015 World Symposium on Computer Networks and Information Security (WSCNIS), Hammamet, Tunisia, 19–21 September 2015; IEEE: Piscataway, NJ, USA, 2015; pp. 1–7. [Google Scholar]
- Gupta, V.; Breitinger, F. How Cuckoo filter can improve existing approximate matching techniques. In Proceedings of the Digital Forensics and Cyber Crime: 7th International Conference, ICDF2C 2015, Seoul, Republic of Korea, 6–8 October 2015; Revised Selected Papers 7. pp. 39–52. [Google Scholar]
- Pagh, A.; Pagh, R.; Rao, S.S. An optimal bloom filter replacement. In Proceedings of the Sixteenth Annual ACM-SIAM Symposium on Discrete Algorithms, Vancouver, BC, Canada, 23–25 January 2005; pp. 823–829. [Google Scholar]
- Zhang, J.; Peng, S.; Gao, Y.; Zhang, Z.; Hong, Q. APMSA: Adversarial Perturbation Against Model Stealing Attacks. IEEE Trans. Inf. Forensics Secur. 2023, 18, 1667–1679. [Google Scholar] [CrossRef]
- Jiang, H.; Wang, M.; Zhao, P.; Xiao, Z.; Dustdar, S. A utility-aware general framework with quantifiable privacy preservation for destination prediction in LBSs. IEEE/ACM Trans. Netw. 2021, 29, 2228–2241. [Google Scholar] [CrossRef]
- Li, B.; Zhou, X.; Ning, Z.; Guan, X.; Yiu, K.F.C. Dynamic event-triggered security control for networked control systems with cyber-attacks: A model predictive control approach. Inf. Sci. 2022, 612, 384–398. [Google Scholar] [CrossRef]
- Ma, J.; Hu, J. Safe consensus control of cooperative-competitive multi-agent systems via differential privacy. Kybernetika 2022, 58, 426–439. [Google Scholar] [CrossRef]
- Broder, A.; Mitzenmacher, M. Network applications of bloom filters: A survey. Internet Math. 2004, 1, 485–509. [Google Scholar] [CrossRef] [Green Version]
- Byers, J.; Considine, J.; Mitzenmacher, M.; Rost, S. Informed content delivery across adaptive overlay networks. ACM SIGCOMM Comput. Commun. Rev. 2002, 32, 47–60. [Google Scholar] [CrossRef] [Green Version]
- Li, Z.; Ross, K.A. Perf join: An alternative to two-way semijoin and bloomjoin. In Proceedings of the Fourth International Conference on Information and Knowledge Management, Baltimore, MD, USA, 28 November–2 December 1995; pp. 137–144. [Google Scholar]
- Mullin, J.K. Optimal semijoins for distributed database systems. IEEE Trans. Softw. Eng. 1990, 16, 558–560. [Google Scholar] [CrossRef]
- Mullin, J.K. Estimating the size of a relational join. Inf. Syst. 1993, 18, 189–196. [Google Scholar] [CrossRef]
- Mullin, J.K.; Margoliash, D.J. A tale of three spelling checkers. Softw. Pract. Exp. 1990, 20, 625–630. [Google Scholar] [CrossRef]
- McIlroy, M. Development of a spelling list. IEEE Trans. Commun. 1982, 30, 91–99. [Google Scholar] [CrossRef] [Green Version]
- Fu, A.; Zhang, X.; Xiong, N.; Gao, Y.; Wang, H.; Zhang, J. VFL: A verifiable federated learning with privacy-preserving for big data in industrial IoT. IEEE Trans. Ind. Inform. 2020, 18, 3316–3326. [Google Scholar] [CrossRef]
- Kumar, P.; Kumar, R.; Srivastava, G.; Gupta, G.P.; Tripathi, R.; Gadekallu, T.R.; Xiong, N.N. PPSF: A privacy-preserving and secure framework using blockchain-based machine-learning for IoT-driven smart cities. IEEE Trans. Netw. Sci. Eng. 2021, 8, 2326–2341. [Google Scholar] [CrossRef]
- Chiu, W.Y.; Meng, W. EdgeTC-a PBFT blockchain-based ETC scheme for smart cities. Peer-to-Peer Netw. Appl. 2021, 14, 2874–2886. [Google Scholar] [CrossRef]
- Meng, F.; Xiao, X.; Wang, J. Rating the crisis of online public opinion using a multi-level index system. arXiv 2022, arXiv:2207.14740. [Google Scholar] [CrossRef]
- Yao, Y.; Xiong, N.; Park, J.H.; Ma, L.; Liu, J. Privacy-preserving max/min query in two-tiered wireless sensor networks. Comput. Math. Appl. 2013, 65, 1318–1325. [Google Scholar] [CrossRef]
- Wang, J.; Ju, C.; Gao, Y.; Sangaiah, A.K.; Kim, G.J. A PSO based energy efficient coverage control algorithm for wireless sensor networks. Comput. Mater. Contin 2018, 56, 433–446. [Google Scholar]
- Chen, Y.; Zhou, L.; Pei, S.; Yu, Z.; Chen, Y.; Liu, X.; Du, J.; Xiong, N. KNN-BLOCK DBSCAN: Fast clustering for large-scale data. IEEE Trans. Syst. Man Cybern. Syst. 2019, 51, 3939–3953. [Google Scholar] [CrossRef]
- Ge, C.; Susilo, W.; Baek, J.; Liu, Z.; Xia, J.; Fang, L. Revocable attribute-based encryption with data integrity in clouds. IEEE Trans. Dependable Secur. Comput. 2021, 19, 2864–2872. [Google Scholar] [CrossRef]
- Mitzenmacher, M.; Pontarelli, S.; Reviriego, P. Adaptive Cuckoo Filters. ACM J. Exp. Algorithmics 2020, 25, 1–20. [Google Scholar] [CrossRef] [Green Version]
- Luo, L.; Guo, D.; Zhao, Y.; Rottenstreich, O.; Ma, R.T.; Luo, X. MCFsyn: A multi-party set reconciliation protocol with the marked Cuckoo filter. IEEE Trans. Parallel Distrib. Syst. 2021, 32, 2705–2718. [Google Scholar] [CrossRef]
- Graf, T.M.; Lemire, D. XOR filters: Faster and smaller than bloom and Cuckoo filters. J. Exp. Algorithmics (JEA) 2020, 25, 1–16. [Google Scholar] [CrossRef] [Green Version]
- Hu, Z.; Wu, M.; Fan, X.; Wang, Y.; Xu, C. MCF: Towards Window-Based Multiple Cuckoo Filter in Stream Computing. In Proceedings of the Big Data—BigData 2020: 9th International Conference, Held as Part of the Services Conference Federation, SCF 2020, Honolulu, HI, USA, 18–20 September 2020; pp. 101–115. [Google Scholar]
- Mitzenmacher, M.; Vadhan, S.P. Why simple hash functions work: Exploiting the entropy in a data stream. In Proceedings of the SODA; Citeseer: Philadelphia, PA, USA, 2008; Volume 8, pp. 746–755. [Google Scholar]
- Pagh, R.; Rodler, F.F. Cuckoo hashing. J. Algorithms 2004, 51, 122–144. [Google Scholar] [CrossRef]
- Eppstein, D. Cuckoo filter: Simplification and analysis. arXiv 2016, arXiv:1604.06067. [Google Scholar]
- Fan, B.; Andersen, D.G.; Kaminsky, M. Memc3: Compact and concurrent memcache with dumber caching and smarter hashing. In Proceedings of the 10th USENIX Symposium on Networked Systems Design and Implementation (NSDI 13), Lombard, IL, USA, 2–5 April 2013; pp. 371–384. [Google Scholar]
- Fan, L.; Cao, P.; Almeida, J.; Broder, A.Z. Summary cache: A scalable wide-area web cache sharing protocol. IEEE/ACM Trans. Netw. 2000, 8, 281–293. [Google Scholar] [CrossRef]
- Hua, W.; Gao, Y.; Lyu, M.; Xie, P. Research on Bloom filter: A survey. J. Comput. Appl. 2022, 42, 1729. [Google Scholar]
- Fan, B.; Andersen, D.G.; Kaminsky, M.; Mitzenmacher, M.D. Cuckoo filter: Practically better than bloom. In Proceedings of the 10th ACM International on Conference on emerging Networking Experiments and Technologies, Sydney, Australia, 2–5 December 2014; pp. 75–88. [Google Scholar]
- Kwon, M.; Reviriego, P.; Pontarelli, S. A length-aware Cuckoo filter for faster IP lookup. In Proceedings of the 2016 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS), San Francisco, CA, USA, 10–14 April 2016; IEEE: Piscataway, NJ, USA, 2016; pp. 1071–1072. [Google Scholar]
- Wang, J.; Gao, Y.; Liu, W.; Sangaiah, A.K.; Kim, H.J. An intelligent data gathering schema with data fusion supported for mobile sink in wireless sensor networks. Int. J. Distrib. Sens. Netw. 2019, 15, 1550147719839581. [Google Scholar] [CrossRef] [Green Version]
- Ren, Y.; Zhu, F.; Sharma, P.K.; Wang, T.; Wang, J.; Alfarraj, O.; Tolba, A. Data query mechanism based on hash computing power of blockchain in internet of things. Sensors 2019, 20, 207. [Google Scholar] [CrossRef] [PubMed] [Green Version]
- Shi, Y.; Li, H.; Fu, X.; Luan, R.; Wang, Y.; Wang, N.; Sun, Z.; Niu, Y.; Wang, C.; Zhang, C.; et al. Self-powered difunctional sensors based on sliding contact-electrification and tribovoltaic effects for pneumatic monitoring and controlling. Nano Energy 2023, 110, 108339. [Google Scholar] [CrossRef]
- Wang, J.; Gu, X.; Liu, W.; Sangaiah, A.K.; Kim, H.J. An empower hamilton loop based data collection algorithm with mobile agent for WSNs. Hum.-Centric Comput. Inf. Sci. 2019, 9, 18. [Google Scholar] [CrossRef]
- Sankar Chatterjee, P.; Roy, M. Lightweight cloned-node detection algorithm for efficiently handling SSDF attacks and facilitating secure spectrum allocation in CWSNs. IET Wirel. Sens. Syst. 2018, 8, 121–128. [Google Scholar] [CrossRef]
- Sajitha, M.; Kavitha, D.; Reddy, P.C. An Optimized Clone Node Detection in WSN Using Cuckoo Filter. SN Comput. Sci. 2023, 4, 167. [Google Scholar] [CrossRef]
- Wang, Y.; Yang, Y.; Qiu, X.; Ke, Y.; Wang, Q. CCF-LRU: Hybrid storage cache replacement strategy based on counting Cuckoo filter hot-probe method. Appl. Intell. 2022, 52, 5144–5158. [Google Scholar] [CrossRef]
- Yuan, F.; Wang, K.; Hou, R.; Li, X.; Li, P.; Zhao, L.; Ying, J.; Awad, A.; Meng, D. PiPoMonitor: Mitigating cross-core cache attacks using the auto-Cuckoo filter. In Proceedings of the 2021 Design, Automation & Test in Europe Conference & Exhibition (DATE), Grenoble, France, 1–5 February 2021; IEEE: Piscataway, NJ, USA, 2021; pp. 1697–1702. [Google Scholar]
- Mosharraf, S.I.M.; Adnan, M.A. Improving Query Execution Performance in Big Data using Cuckoo Filter. In Proceedings of the 2018 IEEE International Conference on Big Data (Big Data), Seattle, WA, USA, 10–13 December 2018; IEEE: Piscataway, NJ, USA, 2018; pp. 1079–1084. [Google Scholar]
- Krishna, R.S.; Tekur, C.; Bhashyam, R.; Nannaka, V.; Mukkamala, R. Using Cuckoo Filters to Improve Performance in Object Store-based Very Large Databases. In Proceedings of the 2023 IEEE 13th Annual Computing and Communication Workshop and Conference (CCWC), Las Vegas, NV, USA, 8–11 March 2023; IEEE: Piscataway, NJ, USA, 2023; pp. 0795–0800. [Google Scholar]
- Wang, J.; Gao, Y.; Liu, W.; Wu, W.; Lim, S.J. An asynchronous clustering and mobile data gathering schema based on timer mechanism in wireless sensor networks. Comput. Mater. Contin 2019, 58, 711–725. [Google Scholar] [CrossRef] [Green Version]
- Shafeeq, S.; Zeadally, S.; Alam, M.; Khan, A. Curbing address reuse in the iota distributed ledger: A Cuckoo-filter-based approach. IEEE Trans. Eng. Manag. 2019, 67, 1244–1255. [Google Scholar] [CrossRef]
- Mosharraf, S.I.M.; Adnan, M.A. Improving lookup and query execution performance in distributed Big Data systems using Cuckoo Filter. J. Big Data 2022, 9, 12. [Google Scholar] [CrossRef]
- Wang, J.; Gao, Y.; Yin, X.; Li, F.; Kim, H.J. An enhanced PEGASIS algorithm with mobile sink support for wireless sensor networks. Wirel. Commun. Mob. Comput. 2018, 2018, 9472075. [Google Scholar] [CrossRef] [Green Version]
- Shi, Y.; Li, L.; Yang, J.; Wang, Y.; Hao, S. Center-based Transfer Feature Learning With Classifier Adaptation for surface defect recognition. Mech. Syst. Signal Process. 2023, 188, 110001. [Google Scholar] [CrossRef]
- Ren, Y.; Zhu, F.; Wang, J.; Sharma, P.K.; Ghosh, U. Novel vote scheme for decision-making feedback based on blockchain in internet of vehicles. IEEE Trans. Intell. Transp. Syst. 2021, 23, 1639–1648. [Google Scholar] [CrossRef]
- Soleymani, S.A.; Goudarzi, S.; Anisi, M.H.; Kama, N.; Adli Ismail, S.; Azmi, A.; Zareei, M.; Hanan Abdullah, A. A trust model using edge nodes and a Cuckoo filter for securing VANET under the NLoS condition. Symmetry 2020, 12, 609. [Google Scholar] [CrossRef] [Green Version]
- Wang, Z.; Wang, H.; Wang, Y.; Yang, X. CLASRM: A lightweight and secure certificateless aggregate signature scheme with revocation mechanism for 5G-enabled vehicular networks. Wirel. Commun. Mob. Comput. 2022, 2022, 3646960. [Google Scholar] [CrossRef]
- Xie, Z.; Ding, W.; Wang, H.; Xiao, Y.; Liu, Z. d-Ary Cuckoo Filter: A space efficient data structure for set membership lookup. In Proceedings of the 2017 IEEE 23rd International Conference on Parallel and Distributed Systems (ICPADS), Shenzhen, China, 15–17 December 2017; IEEE: Piscataway, NJ, USA, 2017; pp. 190–197. [Google Scholar]
- Chen, H.; Liao, L.; Jin, H.; Wu, J. The dynamic Cuckoo filter. In Proceedings of the 2017 IEEE 25th International Conference on Network Protocols (ICNP), Toronto, ON, Canada, 10–13 October 2017; IEEE: Piscataway, NJ, USA, 2017; pp. 1–10. [Google Scholar]
- Kwon, M.; Shankar, V.; Reviriego, P. Position-aware Cuckoo filters. In Proceedings of the 2018 Symposium on Architectures for Networking and Communications Systems, Ithaca, NY, USA, 23–24 July 2018; pp. 151–153. [Google Scholar]
- Reviriego, P.; Martínez, J.; Pontarelli, S. Cfbf: Reducing the insertion time of Cuckoo filters with an integrated bloom filter. IEEE Commun. Lett. 2019, 23, 1857–1861. [Google Scholar] [CrossRef]
- Luo, L.; Guo, D.; Rottenstreich, O.; Ma, R.T.; Luo, X.; Ren, B. The consistent Cuckoo filter. In Proceedings of the IEEE INFOCOM 2019-IEEE Conference on Computer Communications, Paris, France, 29 April–2 May 2019; IEEE: Piscataway, NJ, USA, 2019; pp. 712–720. [Google Scholar]
- Ting, D.; Cole, R. Conditional Cuckoo filters. In Proceedings of the 2021 International Conference on Management of Data, Xi’an, China, 20–25 June 2021; pp. 1838–1850. [Google Scholar]
- Oh, H.; Cho, B.; Kim, C.; Park, H.; Seo, J. Anifilter: Parallel and failure-atomic Cuckoo filter for non-volatile memories. In Proceedings of the Fifteenth European Conference on Computer Systems, Heraklion, Greece, 27–30 April 2020; pp. 1–15. [Google Scholar]
- Huang, K.; Yang, T. Additive and subtractive Cuckoo filters. In Proceedings of the 2020 IEEE/ACM 28th International Symposium on Quality of Service (IWQoS), Hang Zhou, China, 15–17 June 2020; IEEE: Piscataway, NJ, USA, 2020; pp. 1–10. [Google Scholar]
- Bender, M.A.; Farach-Colton, M.; Johnson, R.; Kuszmaul, B.C.; Medjedovic, D.; Montes, P.; Shetty, P.; Spillane, R.P.; Zadok, E. Don’t thrash: How to cache your hash on flash. In Proceedings of the 3rd Workshop on Hot Topics in Storage and File Systems (HotStorage 11), Portland, OR, USA, 14 June 2011. [Google Scholar]
- Wang, M.; Zhou, M. Vacuum filters: More space-efficient and faster replacement for bloom and Cuckoo filters. Proc. VLDB Endow. 2019. [Google Scholar] [CrossRef]
- Bawankar, B.; Chinnaiah, K. Implementation of ensemble method on DNA data using various cross validation techniques. 3c Tecnol. Glosas Innov. Apl. Pyme 2022, 11, 59–69. [Google Scholar] [CrossRef]
- Breslow, A.D.; Jayasena, N.S. Morton filters: Faster, space-efficient Cuckoo filters via biasing, compression, and decoupled logical sparsity. Proc. VLDB Endow. 2018, 11, 1041–1055. [Google Scholar] [CrossRef] [Green Version]
- Qi, W.; Ovur, S.E.; Li, Z.; Marzullo, A.; Song, R. Multi-sensor guided hand gesture recognition for a teleoperated robot using a recurrent neural network. IEEE Robot. Autom. Lett. 2021, 6, 6039–6045. [Google Scholar] [CrossRef]
- Tian, C.; Xu, Z.; Wang, L.; Liu, Y. Arc fault detection using artificial intelligence: Challenges and benefits. Math. Biosci. Eng. 2023, 20, 12404–12432. [Google Scholar] [CrossRef]
- Qi, W.; Aliverti, A. A multimodal wearable system for continuous and real-time breathing pattern monitoring during daily activity. IEEE J. Biomed. Health Inform. 2019, 24, 2199–2207. [Google Scholar] [CrossRef] [PubMed]
- Liu, Z.; Yang, D.; Wang, Y.; Lu, M.; Li, R. EGNN: Graph structure learning based on evolutionary computation helps more in graph neural networks. Appl. Soft Comput. 2023, 135, 110040. [Google Scholar] [CrossRef]
- Wang, Y.; Liu, Z.; Xu, J.; Yan, W. Heterogeneous Network Representation Learning Approach for Ethereum Identity Identification. IEEE Trans. Comput. Soc. Syst. 2022. [Google Scholar] [CrossRef]
0 | 1 | 2 | |
0 | 0 | 1 | 2 |
1 | 1 | 2 | 0 |
2 | 2 | 0 | 1 |
Filter Name | Performance Features | Application Scenarios | |||
---|---|---|---|---|---|
Inquiry | Insertion | Space Use | False Positive Rate | ||
Standard CF | − | − | − | − | Proximate membership search |
LACF | − | × | − | √ | IP address Lookup |
ACF | − | − | − | √ | Proximate membership search |
d-Ary CF | × | × | √ | − | Very large collection |
Consistent CF | √ | − | √ | − | Flexible parameter adjustment |
AF | √ | √ | − | − | Proximate membership search |
PACF | − | − | − | √ | IP lookup and information retrieval |
ASCF | − | − | √ | − | Proximate membership search |
VF | √ | √ | − | − | Proximate membership search |
Conditional CFs | − | − | − | − | Join processing and other sets determined by predicates |
Marked CF | − | − | − | − | Multi-party collection |
Multiple CF | − | − | − | √ | Membership queries for multiple data streams |
CFBF | − | √ | − | √ | Achieve continuous insertion of CFs |
DCF | √ | √ | √ | − | Dynamic set |
MF | √ | √ | √ | √ | Proximate membership search |
XF | √ | × | √ | − | Proximate membership search |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2023 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Zhao, Y.; Dai, W.; Wang, S.; Xi, L.; Wang, S.; Zhang, F. A Review of Cuckoo Filters for Privacy Protection and Their Applications. Electronics 2023, 12, 2809. https://doi.org/10.3390/electronics12132809
Zhao Y, Dai W, Wang S, Xi L, Wang S, Zhang F. A Review of Cuckoo Filters for Privacy Protection and Their Applications. Electronics. 2023; 12(13):2809. https://doi.org/10.3390/electronics12132809
Chicago/Turabian StyleZhao, Yekang, Wangchen Dai, Shiren Wang, Liang Xi, Shenqing Wang, and Feng Zhang. 2023. "A Review of Cuckoo Filters for Privacy Protection and Their Applications" Electronics 12, no. 13: 2809. https://doi.org/10.3390/electronics12132809
APA StyleZhao, Y., Dai, W., Wang, S., Xi, L., Wang, S., & Zhang, F. (2023). A Review of Cuckoo Filters for Privacy Protection and Their Applications. Electronics, 12(13), 2809. https://doi.org/10.3390/electronics12132809