메뉴 건너뛰기




Volumn 2015-May, Issue , 2015, Pages 66-77

Efficient secure similarity computation on encrypted trajectory data

Author keywords

[No Author keywords available]

Indexed keywords

COST EFFECTIVENESS; CRYPTOGRAPHY; DATA HANDLING; DIGITAL STORAGE; OUTSOURCING; POLYNOMIAL APPROXIMATION; QUERY PROCESSING; TRAJECTORIES;

EID: 84940824696     PISSN: 10844627     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ICDE.2015.7113273     Document Type: Conference Paper
Times cited : (99)

References (33)
  • 1
    • 84877359020 scopus 로고    scopus 로고
    • Novel approaches in query processing for moving object trajectories
    • D. Pfoser, C. S. Jensen, and Y. Theodoridis, "Novel approaches in query processing for moving object trajectories," in VLDB, 2000, pp. 395-406.
    • (2000) VLDB , pp. 395-406
    • Pfoser, D.1    Jensen, C.S.2    Theodoridis, Y.3
  • 2
    • 77952758709 scopus 로고    scopus 로고
    • Trajstore: An adaptive storage system for very large trajectory data sets
    • P. Cudré-Mauroux, E. Wu, and S. Madden, "Trajstore: An adaptive storage system for very large trajectory data sets," in ICDE, 2010, pp. 109-120.
    • (2010) ICDE , pp. 109-120
    • Cudré-Mauroux, P.1    Wu, E.2    Madden, S.3
  • 3
    • 84880549017 scopus 로고    scopus 로고
    • Calibrating trajectory data for similarity-based analysis
    • H. Su, K. Zheng, H. Wang, J. Huang, and X. Zhou, "Calibrating trajectory data for similarity-based analysis," in SIGMOD, 2013, pp. 833-844.
    • (2013) SIGMOD , pp. 833-844
    • Su, H.1    Zheng, K.2    Wang, H.3    Huang, J.4    Zhou, X.5
  • 4
    • 84863245385 scopus 로고    scopus 로고
    • Privacy of spatial trajectories
    • Y. Zheng and X. Zhou, Eds. Springer New York
    • C.-Y. Chow and M. Mokbel, "Privacy of spatial trajectories," in Computing with Spatial Trajectories, Y. Zheng and X. Zhou, Eds. Springer New York, 2011, pp. 109-141.
    • (2011) Computing with Spatial Trajectories , pp. 109-141
    • Chow, C.-Y.1    Mokbel, M.2
  • 5
    • 0036361105 scopus 로고    scopus 로고
    • Executing sql over encrypted data in the database-service-provider model
    • H. Hacigümüs, B. R. Iyer, C. Li, and S. Mehrotra, "Executing sql over encrypted data in the database-service-provider model," in SIGMOD, 2002, pp. 216-227.
    • (2002) SIGMOD , pp. 216-227
    • Hacigümüs, H.1    Iyer, B.R.2    Li, C.3    Mehrotra, S.4
  • 6
    • 84904311414 scopus 로고    scopus 로고
    • Secure query processing with data interoperability in a cloud database environment
    • W. K. Wong, B. Kao, D. W.-L. Cheung, R. Li, and S.-M. Yiu, "Secure query processing with data interoperability in a cloud database environment," in SIGMOD, 2014, pp. 1395-1406.
    • (2014) SIGMOD , pp. 1395-1406
    • Wong, W.K.1    Kao, B.2    Cheung, D.W.-L.3    Li, R.4    Yiu, S.-M.5
  • 7
    • 33745623486 scopus 로고    scopus 로고
    • Efficient execution of aggregation queries over encrypted relational databases
    • H. Hacigümüs, B. R. Iyer, and S. Mehrotra, "Efficient execution of aggregation queries over encrypted relational databases," in DASFAA, 2004, pp. 125-136.
    • (2004) DASFAA , pp. 125-136
    • Hacigümüs, H.1    Iyer, B.R.2    Mehrotra, S.3
  • 8
    • 84861186664 scopus 로고    scopus 로고
    • Secure multidimensional range queries over outsourced data
    • B. Hore, S. Mehrotra, M. Canim, and M. Kantarcioglu, "Secure multidimensional range queries over outsourced data," VLDB J., vol. 21, no. 3, pp. 333-358, 2012.
    • (2012) VLDB J. , vol.21 , Issue.3 , pp. 333-358
    • Hore, B.1    Mehrotra, S.2    Canim, M.3    Kantarcioglu, M.4
  • 9
    • 84881329100 scopus 로고    scopus 로고
    • Secure and efficient range queries on outsourced databases using rp-trees
    • P. Wang and C. V. Ravishankar, "Secure and efficient range queries on outsourced databases using rp-trees," in ICDE, 2013, pp. 314-325.
    • (2013) ICDE , pp. 314-325
    • Wang, P.1    Ravishankar, C.V.2
  • 10
    • 70849131456 scopus 로고    scopus 로고
    • Secure knn computation on encrypted databases
    • W. K. Wong, D. W.-L. Cheung, B. Kao, and N. Mamoulis, "Secure knn computation on encrypted databases," in SIGMOD, 2009, pp. 139-152.
    • (2009) SIGMOD , pp. 139-152
    • Wong, W.K.1    Cheung, D.W.-L.2    Kao, B.3    Mamoulis, N.4
  • 11
    • 79957834847 scopus 로고    scopus 로고
    • Processing private queries over untrusted data cloud through privacy homomorphism
    • H. Hu, J. Xu, C. Ren, and B. Choi, "Processing private queries over untrusted data cloud through privacy homomorphism," in ICDE, 2011, pp. 601-612.
    • (2011) ICDE , pp. 601-612
    • Hu, H.1    Xu, J.2    Ren, C.3    Choi, B.4
  • 12
    • 84881354487 scopus 로고    scopus 로고
    • Secure nearest neighbor revisited
    • B. Yao, F. Li, and X. Xiao, "Secure nearest neighbor revisited," in ICDE, 2013, pp. 733-744.
    • (2013) ICDE , pp. 733-744
    • Yao, B.1    Li, F.2    Xiao, X.3
  • 13
    • 84901750940 scopus 로고    scopus 로고
    • Secure k-nearest neighbor query over encrypted data in outsourced environment
    • Y. Elmehdwi, B. K. Samanthula, and W. Jiang, "Secure k-nearest neighbor query over encrypted data in outsourced environment," in ICDE, 2014, pp. 664-675.
    • (2014) ICDE , pp. 664-675
    • Elmehdwi, Y.1    Samanthula, B.K.2    Jiang, W.3
  • 14
    • 84870520150 scopus 로고    scopus 로고
    • Trajectory indexing and retrieval
    • Y. Zheng and X. Zhou, Eds. Springer New York
    • K. Deng, K. Xie, K. Zheng, and X. Zhou, "Trajectory indexing and retrieval," in Computing with Spatial Trajectories, Y. Zheng and X. Zhou, Eds. Springer New York, 2011, pp. 35-60.
    • (2011) Computing with Spatial Trajectories , pp. 35-60
    • Deng, K.1    Xie, K.2    Zheng, K.3    Zhou, X.4
  • 15
    • 0242497349 scopus 로고    scopus 로고
    • Exact indexing of dynamic time warping
    • E. J. Keogh, "Exact indexing of dynamic time warping," in VLDB, 2002, pp. 406-417.
    • (2002) VLDB , pp. 406-417
    • Keogh, E.J.1
  • 16
    • 0036211177 scopus 로고    scopus 로고
    • Discovering similar multidimensional trajectories
    • M. Vlachos, D. Gunopulos, and G. Kollios, "Discovering similar multidimensional trajectories," in ICDE, 2002, pp. 673-684.
    • (2002) ICDE , pp. 673-684
    • Vlachos, M.1    Gunopulos, D.2    Kollios, G.3
  • 17
    • 29844444110 scopus 로고    scopus 로고
    • Robust and fast similarity search for moving object trajectories
    • L. Chen, M. T. Ö zsu, and V. Oria, "Robust and fast similarity search for moving object trajectories," in SIGMOD, 2005, pp. 491-502.
    • (2005) SIGMOD , pp. 491-502
    • Chen, L.1    Ozsu, M.T.2    Oria, V.3
  • 18
    • 85014376145 scopus 로고    scopus 로고
    • Privacy preserving similarity evaluation of time series data
    • H. Zhu, X. Meng, and G. Kollios, "Privacy preserving similarity evaluation of time series data," in EDBT, 2014, pp. 499-510.
    • (2014) EDBT , pp. 499-510
    • Zhu, H.1    Meng, X.2    Kollios, G.3
  • 19
    • 0022882770 scopus 로고
    • How to generate and exchange secrets
    • A. C.-C. Yao, "How to generate and exchange secrets," in FOCS, 1986, pp. 162-167.
    • (1986) FOCS , pp. 162-167
    • Yao, A.C.-C.1
  • 21
    • 84942550998 scopus 로고    scopus 로고
    • Public-key cryptosystems based on composite degree residuosity classes
    • P. Paillier, "Public-key cryptosystems based on composite degree residuosity classes," in EUROCRYPT, 1999, pp. 223-238.
    • (1999) EUROCRYPT , pp. 223-238
    • Paillier, P.1
  • 22
    • 64249101946 scopus 로고    scopus 로고
    • A proof of security of yao's protocol for twoparty computation
    • Y. Lindell and B. Pinkas, "A proof of security of yao's protocol for twoparty computation," J. Cryptology, vol. 22, no. 2, pp. 161-188, 2009.
    • (2009) J. Cryptology , vol.22 , Issue.2 , pp. 161-188
    • Lindell, Y.1    Pinkas, B.2
  • 23
    • 80053596395 scopus 로고    scopus 로고
    • Twin clouds: Secure cloud computing with low latency
    • S. Bugiel, S. Nürnberger, A.-R. Sadeghi, and T. Schneider, "Twin clouds: Secure cloud computing with low latency," in CMS, 2011, pp. 32-44.
    • (2011) CMS , pp. 32-44
    • Bugiel, S.1    Nürnberger, S.2    Sadeghi, A.-R.3    Schneider, T.4
  • 24
    • 84901748695 scopus 로고    scopus 로고
    • Private search on key-value stores with hierarchical indexes
    • H. Hu, J. Xu, X. Xu, K. Pei, B. Choi, and S. Zhou, "Private search on key-value stores with hierarchical indexes," in ICDE, 2014, pp. 628-639.
    • (2014) ICDE , pp. 628-639
    • Hu, H.1    Xu, J.2    Xu, X.3    Pei, K.4    Choi, B.5    Zhou, S.6
  • 25
    • 49049099825 scopus 로고    scopus 로고
    • Improved garbled circuit: Free xor gates and applications
    • V. Kolesnikov and T. Schneider, "Improved garbled circuit: Free xor gates and applications," in ICALP, 2008, pp. 486-498.
    • (2008) ICALP , pp. 486-498
    • Kolesnikov, V.1    Schneider, T.2
  • 28
    • 84945300542 scopus 로고    scopus 로고
    • A provably secure additive and multiplicative privacy homomorphism
    • J. Domingo-Ferrer, "A provably secure additive and multiplicative privacy homomorphism," in ISC, 2002, pp. 471-483.
    • (2002) ISC , pp. 471-483
    • Domingo-Ferrer, J.1
  • 29
    • 70350642087 scopus 로고    scopus 로고
    • Fully homomorphic encryption using ideal lattices
    • C. Gentry, "Fully homomorphic encryption using ideal lattices," in STOC, 2009, pp. 169-178.
    • (2009) STOC , pp. 169-178
    • Gentry, C.1
  • 30
    • 52649110568 scopus 로고    scopus 로고
    • Never walk alone: Uncertainty for anonymity in moving objects databases
    • O. Abul, F. Bonchi, and M. Nanni, "Never walk alone: Uncertainty for anonymity in moving objects databases," in ICDE, 2008, pp. 376-385.
    • (2008) ICDE , pp. 376-385
    • Abul, O.1    Bonchi, F.2    Nanni, M.3
  • 31
    • 73949100139 scopus 로고    scopus 로고
    • Towards trajectory anonymization: A generalization-based approach
    • M. E. Nergiz, M. Atzori, Y. Saygin, and B. Güç, "Towards trajectory anonymization: a generalization-based approach," Transactions on Data Privacy, vol. 2, no. 1, pp. 47-75, 2009.
    • (2009) Transactions on Data Privacy , vol.2 , Issue.1 , pp. 47-75
    • Nergiz, M.E.1    Atzori, M.2    Saygin, Y.3    Güç, B.4
  • 32
    • 84869463688 scopus 로고    scopus 로고
    • Differentially private trajectory data publication
    • abs/1112. 2020
    • R. Chen, B. C. M. Fung, and B. C. Desai, "Differentially private trajectory data publication," CoRR, vol. Abs/1112. 2020, 2011.
    • (2011) CoRR
    • Chen, R.1    Fung, B.C.M.2    Desai, B.C.3
  • 33
    • 84884388019 scopus 로고    scopus 로고
    • Publishing trajectory with differential privacy: A priori vs. A posteriori sampling mechanisms
    • D. Shao, K. Jiang, T. Kister, S. Bressan, and K.-L. Tan, "Publishing trajectory with differential privacy: A priori vs. A posteriori sampling mechanisms," in DEXA, 2013, pp. 357-365.
    • (2013) DEXA , pp. 357-365
    • Shao, D.1    Jiang, K.2    Kister, T.3    Bressan, S.4    Tan, K.-L.5


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.