메뉴 건너뛰기




Volumn , Issue , 2011, Pages 601-612

Processing private queries over untrusted data cloud through privacy homomorphism

Author keywords

[No Author keywords available]

Indexed keywords

DATA CLOUDS; DATA OUTSOURCING; ENCRYPTION SCHEMES; K-NEAREST-NEIGHBOR QUERIES; LARGE DATASETS; OPTIMIZATION TECHNIQUES; OUTSOURCE; PERFORMANCE STUDY; PRIVACY HOMOMORPHISM; QUERY PRIVACY; QUERY PROCESSING PROTOCOLS; QUERYING SERVICES; RESEARCH PROBLEMS; SECURE PROTOCOLS;

EID: 79957834847     PISSN: 10844627     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ICDE.2011.5767862     Document Type: Conference Paper
Times cited : (193)

References (31)
  • 2
    • 79957789511 scopus 로고    scopus 로고
    • Deterministic and efficiently searchable encryption
    • Mihir Bellare, Alexandra Boldyreva, and Adam O'Neill. Deterministic and efficiently searchable encryption. In Proc. CRYPTO, 2007.
    • (2007) Proc. CRYPTO
    • Bellare, M.1    Boldyreva, A.2    O'Neill, A.3
  • 3
    • 28444478342 scopus 로고    scopus 로고
    • Privacy and ownership preserving of outsourced medical data
    • Elisa Bertino, Beng Chin Ooi, Yanjiang Yang, and Robert H. Deng. Privacy and ownership preserving of outsourced medical data. In Proc. ICDE, 2005.
    • (2005) Proc. ICDE
    • Bertino, E.1    Ooi, B.C.2    Yang, Y.3    Deng, R.H.4
  • 5
    • 76149103618 scopus 로고    scopus 로고
    • Casper*: Query processing for location services without compromising privacy
    • Chi-Yin Chow, Mohamed F. Mokbel, and Walid G. Aref. Casper*: Query processing for location services without compromising privacy. ACM Transactions on Database Systems, 34(4), 2009.
    • (2009) ACM Transactions on Database Systems , vol.34 , Issue.4
    • Chow, C.-Y.1    Mokbel, M.F.2    Aref, W.G.3
  • 6
    • 79957858928 scopus 로고    scopus 로고
    • Privacy-preserving search and updates for outsourced tree-structured data on untrusted servers
    • Tran Khanh Dang. Privacy-preserving search and updates for outsourced tree-structured data on untrusted servers. In Proc. iTrust, 2005.
    • (2005) Proc. Itrust
    • Dang, T.K.1
  • 10
    • 79957797091 scopus 로고    scopus 로고
    • Faster point multiplication on elliptic curves with effient endomorphisms
    • Advances in Cryptology-Crypto 2001 Springer-Verlag
    • R. Gallant, R. Lambert, and S. Vanstone. Faster point multiplication on elliptic curves with effient endomorphisms. In Advances in Cryptology-Crypto 2001, LNCS 2139, Springer-Verlag, 2001.
    • (2001) LNCS , vol.2139
    • Gallant, R.1    Lambert, R.2    Vanstone, S.3
  • 11
    • 84886068262 scopus 로고    scopus 로고
    • Enhanced montgomery multiplication on dsp architectures for embedded public-key cryptosystems
    • April
    • P. Gastaldo, G. Parodi, and R. Zunino. Enhanced montgomery multiplication on dsp architectures for embedded public-key cryptosystems. EURASIP Journal on Embedded Systems, 2008(April), 2008.
    • (2008) EURASIP Journal on Embedded Systems 2008
    • Gastaldo, P.1    Parodi, G.2    Zunino, R.3
  • 12
    • 27944454864 scopus 로고    scopus 로고
    • Location-privacy in mobile systems: A personalized anonymization model
    • Bugra Gedik and Ling Liu. Location-privacy in mobile systems: A personalized anonymization model. In Proc. ICDCS, 2005.
    • (2005) Proc. ICDCS
    • Gedik, B.1    Liu, L.2
  • 13
    • 35348924316 scopus 로고    scopus 로고
    • Prive: Anonymous locationbased queries in distributed mobile systems
    • G. Ghinita, P. Kalnis, and S. Skiadopoulos. Prive: Anonymous locationbased queries in distributed mobile systems. In WWW, 2007.
    • (2007) WWW
    • Ghinita, G.1    Kalnis, P.2    Skiadopoulos, S.3
  • 16
    • 1642286258 scopus 로고    scopus 로고
    • Anonymous usage of location-based services through spatial and temporal cloaking
    • M. Gruteser and D. Grunwald. Anonymous usage of location-based services through spatial and temporal cloaking. In Proc. MobiSys, 2003.
    • (2003) Proc. MobiSys
    • Gruteser, M.1    Grunwald, D.2
  • 17
    • 0000701994 scopus 로고    scopus 로고
    • Distance browsing in spatial databases
    • Gisli R. Hjaltason and Hanan Samet. Distance browsing in spatial databases. ACM TODS, 24(2):265-318, 1999.
    • (1999) ACM TODS , vol.24 , Issue.2 , pp. 265-318
    • Hjaltasond, G.R.1    Samet, H.2
  • 18
    • 67649671762 scopus 로고    scopus 로고
    • Non-exposure location anonymity
    • Haibo Hu and Jianliang Xu. Non-exposure location anonymity. In Proc. ICDE, 2009.
    • (2009) Proc. ICDE
    • Hu, H.1    Xu, J.2
  • 20
    • 57149125534 scopus 로고    scopus 로고
    • Blind evaluation of nearest neighbor queries using space transformation to preserve location privacy
    • A. Khoshgozaran and C. Shahabi. Blind evaluation of nearest neighbor queries using space transformation to preserve location privacy. In Proc. SSTD, 2007.
    • (2007) Proc. SSTD
    • Khoshgozaran, A.1    Shahabi, C.2
  • 21
    • 52649088751 scopus 로고    scopus 로고
    • Privacy preserving joins
    • Yaping Li and Minghua Chen. Privacy preserving joins. In Proc. ICDE, 2008.
    • (2008) Proc. ICDE
    • Li, Y.1    Chen, M.2
  • 22
    • 49749109657 scopus 로고    scopus 로고
    • An attacker's view of distance preserving maps for privacy preserving data mining
    • K. Liu, C. Giannella, and H. Kargupta. An attacker's view of distance preserving maps for privacy preserving data mining. In Proc. PKDD, 2006.
    • (2006) Proc. PKDD
    • Liu, K.1    Giannella, C.2    Kargupta, H.3
  • 23
    • 51849139413 scopus 로고    scopus 로고
    • Efficient privacy-preserving k-nearest neighbor search
    • Yinian Qi and Mikhail J. Atallah. Efficient privacy-preserving k-nearest neighbor search. In Proc. ICDCS, 2008.
    • (2008) Proc. ICDCS
    • Qi, Y.1    Atallah, M.J.2
  • 26
    • 28444436573 scopus 로고    scopus 로고
    • Privacy-preserving top-k queries
    • Jaideep Vaidya and Chris Clifton. Privacy-preserving top-k queries. In Proc. ICDE, 2005.
    • (2005) Proc. ICDE
    • Vaidya, J.1    Clifton, C.2
  • 27
    • 84893821498 scopus 로고    scopus 로고
    • Efficient secure query evaluation over encrypted XML databases
    • Hui Wang and Laks V. S. Lakshmanan. Efficient secure query evaluation over encrypted XML databases. In Proc. VLDB, 2006.
    • (2006) Proc. VLDB
    • Wang, H.1    Lakshmanan, L.V.S.2
  • 29
    • 84893853914 scopus 로고    scopus 로고
    • Anatomy: Simple and effective privacy preservation
    • X. Xiao and Y. Tao. Anatomy: simple and effective privacy preservation. In Proc. VLDB, 2006.
    • (2006) Proc. VLDB
    • Xiao, X.1    Tao, Y.2
  • 30
    • 34548264581 scopus 로고    scopus 로고
    • Preserving data privacy in outsourcing data aggregation services
    • Li Xiong, Subramanyam Chitti, and Ling Liu. Preserving data privacy in outsourcing data aggregation services. ACM Transactions on Internet Technology, 7(3), 2007.
    • (2007) ACM Transactions on Internet Technology , vol.7 , Issue.3
    • Xiong, L.1    Chitti, S.2    Liu, L.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.