메뉴 건너뛰기




Volumn , Issue , 2013, Pages 55-60

Secure k-NN computation on encrypted cloud data without sharing key with query users

Author keywords

cloud computing; k nearest neighbors; privacy

Indexed keywords

CLOUD DATA; EFFICIENT SCHEMES; ENCRYPTED DATA; K-NEAREST NEIGHBORS; K-NN QUERY; ON-LINE APPLICATIONS; OUTSOURCED DATUM; REAL-WORLD;

EID: 84878495668     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/2484402.2484415     Document Type: Conference Paper
Times cited : (66)

References (26)
  • 1
    • 77956137294 scopus 로고    scopus 로고
    • Cryptographic cloud storage
    • Financial Cryptography: Workshop on Real-Life Cryptographic Protocols and Standardization
    • S. Kamara and K. Lauter. Cryptographic cloud storage. In Financial Cryptography: Workshop on Real-Life Cryptographic Protocols and Standardization, LNCS 6054, pages 136-149, 2010.
    • (2010) LNCS , vol.6054 , pp. 136-149
    • Kamara, S.1    Lauter, K.2
  • 5
    • 84861186664 scopus 로고    scopus 로고
    • Secure multidimensional range queries over outsourced data
    • B. Hore, S. Mehrotra, M. Canim, and M. Kantarcioglu. Secure multidimensional range queries over outsourced data. The VLDB Journal, 21(3):333-358, 2012.
    • (2012) The VLDB Journal , vol.21 , Issue.3 , pp. 333-358
    • Hore, B.1    Mehrotra, S.2    Canim, M.3    Kantarcioglu, M.4
  • 6
    • 84861636543 scopus 로고    scopus 로고
    • Achieving usable and privacy-assured similarity search over outsourced cloud data
    • C. Wang, K. Ren, S. Yu, and K.M.R. Urs. Achieving usable and privacy-assured similarity search over outsourced cloud data. In Proceedings of IEEE INFOCOM, pages 451-459, 2012.
    • (2012) Proceedings of IEEE INFOCOM , pp. 451-459
    • Wang, C.1    Ren, K.2    Yu, S.3    Urs, K.M.R.4
  • 7
    • 84863511940 scopus 로고    scopus 로고
    • Enabling secure and efficient ranked keyword search over outsourced cloud data
    • C. Wang, N. Cao, K. Ren, and W. Lou. Enabling secure and efficient ranked keyword search over outsourced cloud data. IEEE Transactions on Parallel and Distributed Systems, 23(8):1467-1479, 2012.
    • (2012) IEEE Transactions on Parallel and Distributed Systems , vol.23 , Issue.8 , pp. 1467-1479
    • Wang, C.1    Cao, N.2    Ren, K.3    Lou, W.4
  • 10
    • 51849103902 scopus 로고    scopus 로고
    • Privacy preserving nearest neighbor search
    • M. Shaneck, Y. Kim, and V. Kumar. Privacy preserving nearest neighbor search. In IEEE ICDM Workshops, pages 541-545, 2006.
    • (2006) IEEE ICDM Workshops , pp. 541-545
    • Shaneck, M.1    Kim, Y.2    Kumar, V.3
  • 15
    • 84866351451 scopus 로고    scopus 로고
    • Toward privacy-assured cloud data services with flexible search functionalities
    • M. Li, S. Yu, W. Lou, and Y.T. Hou. Toward privacy-assured cloud data services with flexible search functionalities. In IEEE ICDCS Workshops, pages 466-470, 2012.
    • (2012) IEEE ICDCS Workshops , pp. 466-470
    • Li, M.1    Yu, S.2    Lou, W.3    Hou, Y.T.4
  • 20
    • 0000845043 scopus 로고
    • Non-interactive and information-theoretic secure verifiable secret sharing
    • Springer
    • T. Pedersen. Non-interactive and information-theoretic secure verifiable secret sharing. In CRYPTO, pages 129-140. Springer, 1991.
    • (1991) CRYPTO , pp. 129-140
    • Pedersen, T.1
  • 22
    • 84942550998 scopus 로고    scopus 로고
    • Public-key cryptosystems based on composite degree residuosity classes
    • EUROCRYPT, Springer
    • P. Paillier. Public-key cryptosystems based on composite degree residuosity classes. In EUROCRYPT, pages 223-238. LNCS 1592, Springer, 1999.
    • (1999) LNCS , vol.1592 , pp. 223-238
    • Paillier, P.1
  • 26
    • 77954631038 scopus 로고    scopus 로고
    • A survey of attack techniques on privacy-preserving data perturbation methods
    • Springer
    • K. Liu, C. Giannella, and H. Kargupta. A survey of attack techniques on privacy-preserving data perturbation methods. In Privacy-Preserving Data Mining, pages 359-381. Springer, 2008.
    • (2008) Privacy-Preserving Data Mining , pp. 359-381
    • Liu, K.1    Giannella, C.2    Kargupta, H.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.