메뉴 건너뛰기




Volumn , Issue , 2014, Pages 628-639

Private search on key-value stores with hierarchical indexes

Author keywords

[No Author keywords available]

Indexed keywords

CRYPTOGRAPHY; DATA PRIVACY; DECISION TREES; FORESTRY;

EID: 84901748695     PISSN: 10844627     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ICDE.2014.6816687     Document Type: Conference Paper
Times cited : (25)

References (40)
  • 3
    • 35348924316 scopus 로고    scopus 로고
    • Prive: Anonymous location-based queries in distributed mobile systems
    • G. Ghinita, P. Kalnis, and S. Skiadopoulos, "Prive: Anonymous location-based queries in distributed mobile systems," in WWW, 2007.
    • (2007) WWW
    • Ghinita, G.1    Kalnis, P.2    Skiadopoulos, S.3
  • 4
    • 76149103618 scopus 로고    scopus 로고
    • Casper*: Query processing for location services without compromising privacy
    • C. Chow, M. Mokbel, and W. Aref, "Casper*: Query processing for location services without compromising privacy," ACM TODS, vol. 34, no. 4, 2009.
    • (2009) ACM TODS , vol.34 , Issue.4
    • Chow, C.1    Mokbel, M.2    Aref, W.3
  • 5
    • 77956175701 scopus 로고    scopus 로고
    • 2pass: Bandwidth-optimized location cloaking for anonymous location-based services
    • H. Hu and J. Xu, "2pass: Bandwidth-optimized location cloaking for anonymous location-based services," IEEE TPDS, vol. 21, no. 10, 2010.
    • (2010) IEEE TPDS , vol.21 , Issue.10
    • Hu, H.1    Xu, J.2
  • 6
    • 76749103805 scopus 로고    scopus 로고
    • Privacy-conscious location-based queries in mobile environments
    • J. Xu, X. Tang, H. Hu, and J. Du, "Privacy-conscious location-based queries in mobile environments," IEEE TPDS, vol. 21, no. 3, 2010.
    • (2010) IEEE TPDS , vol.21 , Issue.3
    • Xu, J.1    Tang, X.2    Hu, H.3    Du, J.4
  • 8
    • 84893821498 scopus 로고    scopus 로고
    • Efficient secure query evaluation over encrypted xml databases
    • H. Wang and L. V. S. Lakshmanan, "Efficient secure query evaluation over encrypted xml databases," in Proc. VLDB, 2006.
    • (2006) Proc. VLDB
    • Wang, H.1    Lakshmanan, L.V.S.2
  • 9
    • 57149125534 scopus 로고    scopus 로고
    • Blind evaluation of nearest neighbor queries using space transformation to preserve location privacy
    • A. Khoshgozaran and C. Shahabi, "Blind evaluation of nearest neighbor queries using space transformation to preserve location privacy," in Proc. SSTD, 2007.
    • (2007) Proc. SSTD
    • Khoshgozaran, A.1    Shahabi, C.2
  • 10
    • 67649651664 scopus 로고    scopus 로고
    • Outsourcing search services on private spatial data
    • M. L. Yiu and P. K. G. Ghinita, C. S. Jensen, "Outsourcing search services on private spatial data," in Proc. ICDE, 2009.
    • (2009) Proc. ICDE
    • Yiu, M.L.1    Ghinita, P.K.G.2    Jensen, C.S.3
  • 12
    • 84864234736 scopus 로고    scopus 로고
    • Efcient similarity search over encrypted data
    • M. Kuzu, M. Islam, and M. Kantarcioglu, "Efcient similarity search over encrypted data," in Proc. ICDE, 2012.
    • (2012) Proc. ICDE
    • Kuzu, M.1    Islam, M.2    Kantarcioglu, M.3
  • 14
    • 51849139413 scopus 로고    scopus 로고
    • Efficient privacy-preserving k-nearest neighbor search
    • Y. Qi and M. J. Atallah, "Efficient privacy-preserving k-nearest neighbor search," in Proc. ICDCS, 2008.
    • (2008) Proc. ICDCS
    • Qi, Y.1    Atallah, M.J.2
  • 16
    • 79960844353 scopus 로고    scopus 로고
    • Strong conditional oblivious transfer and computing on intervals
    • I. F. Blake and V. Kolesnikov, "Strong conditional oblivious transfer and computing on intervals," in Proceedings of ASIACRYPT, 2004.
    • (2004) Proceedings of ASIACRYPT
    • Blake, I.F.1    Kolesnikov, V.2
  • 17
    • 84861186664 scopus 로고    scopus 로고
    • Secure multidimensional range queries over outsourced data
    • B. Hore, S. Mehrotra, M. Canim, and M. Kantarcioglu, "Secure multidimensional range queries over outsourced data," The VLDB Journal, vol. 21, no. 3, 2012.
    • (2012) The VLDB Journal , vol.21 , Issue.3
    • Hore, B.1    Mehrotra, S.2    Canim, M.3    Kantarcioglu, M.4
  • 18
    • 49749109657 scopus 로고    scopus 로고
    • An attacker's view of distance preserving maps for privacy preserving data mining
    • K. Liu, C. Giannella, and H. Kargupta, "An attacker's view of distance preserving maps for privacy preserving data mining," in PKDD, 2006.
    • (2006) PKDD
    • Liu, K.1    Giannella, C.2    Kargupta, H.3
  • 22
    • 0242709355 scopus 로고    scopus 로고
    • Privacy preserving association rule mining in vertically partitioned data
    • J. Vaidya and C. Clifton, "Privacy preserving association rule mining in vertically partitioned data," in Proc. ACM SIGKDD, 2002.
    • (2002) Proc. ACM SIGKDD
    • Vaidya, J.1    Clifton, C.2
  • 25
    • 77952332120 scopus 로고    scopus 로고
    • Privacy-preserving k-means clustering over vertically partitioned data
    • J. Vaidya and C. Clifton, "Privacy-preserving k-means clustering over vertically partitioned data," in Proc. ACM SIGKDD, 2003.
    • (2003) Proc. ACM SIGKDD
    • Vaidya, J.1    Clifton, C.2
  • 27
    • 52649088751 scopus 로고    scopus 로고
    • Privacy preserving joins
    • Y. Li and M. Chen, "Privacy preserving joins," in Proc. ICDE, 2008.
    • (2008) Proc. ICDE
    • Li, Y.1    Chen, M.2
  • 28
    • 32344446366 scopus 로고    scopus 로고
    • Privacy-preserving distributed k-means clustering over arbitrarily partitioned data
    • G. Jagannathan and R. N. Wright, "Privacy-preserving distributed k-means clustering over arbitrarily partitioned data," in Proc. SIGKDD, 2005.
    • (2005) Proc. SIGKDD
    • Jagannathan, G.1    Wright, R.N.2
  • 29
    • 84862698613 scopus 로고    scopus 로고
    • Authenticating location-based services without compromising location privacy
    • H. Hu, J. Xu, Q. Chen, and Z. Yang, "Authenticating location-based services without compromising location privacy," in Proc. SIGMOD, 2012, pp. 301-312.
    • (2012) Proc. SIGMOD , pp. 301-312
    • Hu, H.1    Xu, J.2    Chen, Q.3    Yang, Z.4
  • 30
    • 84884509675 scopus 로고    scopus 로고
    • Authenticating top-k queries in location-based services with confidentiality
    • Q. Chen, H. Hu, and J. Xu, "Authenticating top-k queries in location-based services with confidentiality," in Proc. of the VLDB Endowment, Vol. 7, No. 1, 2014, pp. 49-60.
    • (2014) Proc. of the VLDB Endowment , vol.7 , Issue.1 , pp. 49-60
    • Chen, Q.1    Hu, H.2    Xu, J.3
  • 31
    • 79957834847 scopus 로고    scopus 로고
    • Processing private queries over untrusted data cloud through privacy homomorphism
    • H. Hu, J. Xu, C. Ren, and B. Choi, "Processing private queries over untrusted data cloud through privacy homomorphism," in Proc. ICDE, 2011.
    • (2011) Proc. ICDE
    • Hu, H.1    Xu, J.2    Ren, C.3    Choi, B.4
  • 32
    • 79957789511 scopus 로고    scopus 로고
    • Deterministic and efficiently searchable encryption
    • M. Bellare, A. Boldyreva, and A. O'Neill, "Deterministic and efficiently searchable encryption," in Proc. CRYPTO, 2007.
    • (2007) Proc. CRYPTO
    • Bellare, M.1    Boldyreva, A.2    O'Neill, A.3
  • 34
    • 84901752006 scopus 로고    scopus 로고
    • Ensuring data storage security against frequency-based attacks in wireless networks
    • H. Liu, H. Wang, and Y. Chen, "Ensuring data storage security against frequency-based attacks in wireless networks," in Proc. DCOSS, 2010.
    • (2010) Proc. DCOSS
    • Liu, H.1    Wang, H.2    Chen, Y.3
  • 36
    • 0000277371 scopus 로고    scopus 로고
    • Public-key cryptosystems based on composite degree resid-uosity classes
    • P. Paillier, "Public-key cryptosystems based on composite degree resid-uosity classes," in Proceedings of EUROCRYPT, 1999.
    • (1999) Proceedings of EUROCRYPT
    • Paillier, P.1
  • 38
    • 84919085619 scopus 로고
    • An improved algorithm for computing logarithms over gf(p) and its cryptographic significance
    • S. Pohlig and M. Hellman, "An improved algorithm for computing logarithms over gf(p) and its cryptographic significance," IEEE Trans. Information and System Security, vol. 24, no. 1, 1978.
    • (1978) IEEE Trans. Information and System Security , vol.24 , Issue.1
    • Pohlig, S.1    Hellman, M.2
  • 40
    • 84901783260 scopus 로고    scopus 로고
    • Accelerating the greater than-strong conditional oblivious transfer multiparty protocol using graphics processing units
    • A. Rivera, P. Gowda, N. Vidyadhar, and M. Hall, "Accelerating the greater than-strong conditional oblivious transfer multiparty protocol using graphics processing units," in GPU Technology Conference, 2012.
    • (2012) GPU Technology Conference
    • Rivera, A.1    Gowda, P.2    Vidyadhar, N.3    Hall, M.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.