메뉴 건너뛰기




Volumn 62, Issue , 2016, Pages 161-174

Efficient and privacy-preserving skyline computation framework across domains

Author keywords

Lightweight additive homomorphic encryption; Multi domain; Secure computation framework; Semi honest; Skyline

Indexed keywords

BIG DATA; CRYPTOGRAPHY; SECURITY OF DATA;

EID: 84949009058     PISSN: 0167739X     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.future.2015.10.005     Document Type: Article
Times cited : (38)

References (37)
  • 1
    • 84983214590 scopus 로고    scopus 로고
    • The digital universe in 2020: Big data, bigger digital shadows, and biggest growth in the far east.
    • [1] IDC, EMC, The digital universe in 2020: Big data, bigger digital shadows, and biggest growth in the far east, 2012. http://www.emc.com/leadership/digital-universe/iview/executive-summary-a-universe-of.htm.
    • (2012)
    • IDC, E.M.C.1
  • 2
    • 84983225389 scopus 로고    scopus 로고
    • Obama administration unveils “big data” initiative: Announces $200 million in new r&d investments
    • [2] Obama administration unveils “big data” initiative: Announces $200 million in new r&d investments, 2012. http://www.whitehouse.gov/sites/default/files/micrositesostp/big_data_press_release_final_2.pdf.
    • (2011)
  • 3
    • 84983217486 scopus 로고    scopus 로고
    • Ibm big data and analytics platform.
    • [3] Ibm big data and analytics platform. http://www-01.ibm.com/software/data/bigdata/.
  • 4
    • 84983215691 scopus 로고    scopus 로고
    • Bigdata@csail, mit.
    • [4] Bigdata@csail, mit. http://bigdata.csail.mit.edu/.
  • 5
    • 84983217494 scopus 로고    scopus 로고
    • Big data lab, school of computer science, University of st Andrews.
    • [5] Big data lab, school of computer science, University of st Andrews. http://bigdata.cs.st-andrews.ac.uk/.
  • 6
    • 0035008034 scopus 로고    scopus 로고
    • The skyline operator, in: Proceedings of the 17th International Conference on Data Engineering, April 2–6, 2001, Heidelberg, Germany, pp.
    • [6] S. Börzsönyi, D. Kossmann, K. Stocker, The skyline operator, in: Proceedings of the 17th International Conference on Data Engineering, April 2–6, 2001, Heidelberg, Germany, 2001, pp. 421–430.
    • (2001) , pp. 421-430
    • Börzsönyi, S.1    Kossmann, D.2    Stocker, K.3
  • 7
    • 84884749775 scopus 로고    scopus 로고
    • Efficient skyline computation on big data
    • [7] Han, X., Li, J., Yang, D., Wang, J., Efficient skyline computation on big data. IEEE Trans. Knowl. Data Eng. 25:11 (2013), 2521–2535.
    • (2013) IEEE Trans. Knowl. Data Eng. , vol.25 , Issue.11 , pp. 2521-2535
    • Han, X.1    Li, J.2    Yang, D.3    Wang, J.4
  • 8
    • 84861186829 scopus 로고    scopus 로고
    • A survey of skyline processing in highly distributed environments
    • [8] Hose, K., Vlachou, A., A survey of skyline processing in highly distributed environments. VLDB J. 21:3 (2012), 359–384.
    • (2012) VLDB J. , vol.21 , Issue.3 , pp. 359-384
    • Hose, K.1    Vlachou, A.2
  • 9
    • 84958035648 scopus 로고    scopus 로고
    • Secure multi-party computational geometry
    • Springer
    • [9] Atallah, M.J., Du, W., Secure multi-party computational geometry. Algorithms and Data Structures, 2001, Springer, 165–179.
    • (2001) Algorithms and Data Structures , pp. 165-179
    • Atallah, M.J.1    Du, W.2
  • 10
    • 26444581774 scopus 로고    scopus 로고
    • An efficient solution to the millionaires’ problem based on homomorphic encryption
    • Springer
    • [10] Lin, H.-Y., Tzeng, W.-G., An efficient solution to the millionaires’ problem based on homomorphic encryption. Applied Cryptography and Network Security, 2005, Springer, 456–466.
    • (2005) Applied Cryptography and Network Security , pp. 456-466
    • Lin, H.-Y.1    Tzeng, W.-G.2
  • 11
    • 84927517111 scopus 로고    scopus 로고
    • Privacy-preserving cooperative statistical analysis, in: 17th Annual Computer Security Applications Conference, ACSAC 2001, 11–14 December 2001, New Orleans, Louisiana, USA, pp.
    • [11] W. Du, M.J. Atallah, Privacy-preserving cooperative statistical analysis, in: 17th Annual Computer Security Applications Conference, ACSAC 2001, 11–14 December 2001, New Orleans, Louisiana, USA, 2001, pp. 102–110.
    • (2001) , pp. 102-110
    • Du, W.1    Atallah, M.J.2
  • 12
    • 0040172802 scopus 로고    scopus 로고
    • The Prime Numbers and their Distribution. Vol. 6
    • American Mathematical Society Providence
    • [12] Tenenbaum, G., France, M.M., Spain, P.G., The Prime Numbers and their Distribution. Vol. 6. 2000, American Mathematical Society, Providence.
    • (2000)
    • Tenenbaum, G.1    France, M.M.2    Spain, P.G.3
  • 13
    • 84968513551 scopus 로고
    • A rigorous time bound for factoring integers
    • [13] Lenstra, H.W., Pomerance, C., A rigorous time bound for factoring integers. J. Amer. Math. Soc. 5:3 (1992), 483–516.
    • (1992) J. Amer. Math. Soc. , vol.5 , Issue.3 , pp. 483-516
    • Lenstra, H.W.1    Pomerance, C.2
  • 14
    • 64249101946 scopus 로고    scopus 로고
    • A proof of security of yao's protocol for two-party computation
    • [14] Lindell, Y., Pinkas, B., A proof of security of yao's protocol for two-party computation. J. Cryptol. 22:2 (2009), 161–188.
    • (2009) J. Cryptol. , vol.22 , Issue.2 , pp. 161-188
    • Lindell, Y.1    Pinkas, B.2
  • 15
    • 0003691180 scopus 로고    scopus 로고
    • Foundations of Cryptography: Volume 2, Basic Applications. Vol. 2
    • Cambridge University Press
    • [15] Goldreich, O., Foundations of Cryptography: Volume 2, Basic Applications. Vol. 2. 2009, Cambridge University Press.
    • (2009)
    • Goldreich, O.1
  • 17
    • 84983221966 scopus 로고    scopus 로고
    • The largest sports statistics and history database online.
    • [17] The largest sports statistics and history database online. http://www.databasesports.com/.
  • 18
    • 77953310709 scopus 로고    scopus 로고
    • Achieving secure, scalable, and fine-grained data access control in cloud computing, in: INFOCOM 2010. 29th IEEE International Conference on Computer Communications, Joint Conference of the IEEE Computer and Communications Societies, 15–19 March 2010, San Diego, CA, USA, pp.
    • [18] S. Yu, C. Wang, K. Ren, W. Lou, Achieving secure, scalable, and fine-grained data access control in cloud computing, in: INFOCOM 2010. 29th IEEE International Conference on Computer Communications, Joint Conference of the IEEE Computer and Communications Societies, 15–19 March 2010, San Diego, CA, USA, 2010, pp. 534–542.
    • (2010) , pp. 534-542
    • Yu, S.1    Wang, C.2    Ren, K.3    Lou, W.4
  • 19
    • 84861959172 scopus 로고    scopus 로고
    • Privacy-preserving public auditing for secure cloud storage
    • [19] Wang, C., Chow, S.S.M., Wang, Q., Ren, K., Lou, W., Privacy-preserving public auditing for secure cloud storage. IEEE Trans. Comput. 62:2 (2013), 362–375.
    • (2013) IEEE Trans. Comput. , vol.62 , Issue.2 , pp. 362-375
    • Wang, C.1    Chow, S.S.M.2    Wang, Q.3    Ren, K.4    Lou, W.5
  • 20
    • 84904421834 scopus 로고    scopus 로고
    • Privacy-preserving multi-keyword fuzzy search over encrypted data in the cloud, in: 2014 IEEE Conference on Computer Communikations, INFOCOM 2014, Toronto, Canada, April 27—May 2, pp.
    • [20] B. Wang, S. Yu, W. Lou, Y.T. Hou, Privacy-preserving multi-keyword fuzzy search over encrypted data in the cloud, in: 2014 IEEE Conference on Computer Communikations, INFOCOM 2014, Toronto, Canada, April 27—May 2, 2014, 2014, pp. 2112–2120.
    • (2014) , pp. 2112-2120
    • Wang, B.1    Yu, S.2    Lou, W.3    Hou, Y.T.4
  • 21
    • 0344927722 scopus 로고    scopus 로고
    • Skyline with presorting, in: Proceedings of the 19th International Conference on Data Engineering, March 5–8, 2003, Bangalore, India, pp.
    • [21] J. Chomicki, P. Godfrey, J. Gryz, D. Liang, Skyline with presorting, in: Proceedings of the 19th International Conference on Data Engineering, March 5–8, 2003, Bangalore, India, 2003, pp. 717–719.
    • (2003) , pp. 717-719
    • Chomicki, J.1    Godfrey, P.2    Gryz, J.3    Liang, D.4
  • 22
    • 33750439492 scopus 로고    scopus 로고
    • Algorithms and analyses for maximal vector computation
    • [22] Godfrey, P., Shipley, R., Gryz, J., Algorithms and analyses for maximal vector computation. VLDB J. 16:1 (2007), 5–28.
    • (2007) VLDB J. , vol.16 , Issue.1 , pp. 5-28
    • Godfrey, P.1    Shipley, R.2    Gryz, J.3
  • 26
    • 34548808558 scopus 로고    scopus 로고
    • SKYPEER: efficient subspace skyline computation over distributed data, in: Proceedings of the 23rd International Conference on Data Engineering, ICDE 2007, The Marmara Hotel, Istanbul, Turkey, April 15–20, 2007, pp.
    • [26] A. Vlachou, C. Doulkeridis, Y. Kotidis, M. Vazirgiannis, SKYPEER: efficient subspace skyline computation over distributed data, in: Proceedings of the 23rd International Conference on Data Engineering, ICDE 2007, The Marmara Hotel, Istanbul, Turkey, April 15–20, 2007, 2007, pp. 416–425.
    • (2007) , pp. 416-425
    • Vlachou, A.1    Doulkeridis, C.2    Kotidis, Y.3    Vazirgiannis, M.4
  • 27
    • 84891119989 scopus 로고    scopus 로고
    • eSkyline: processing skyline queries over encrypted data
    • [27] Bothe, S., Karras, P., Vlachou, A., eSkyline: processing skyline queries over encrypted data. Proc. VLDB Endow. 6:12 (2013), 1338–1341.
    • (2013) Proc. VLDB Endow. , vol.6 , Issue.12 , pp. 1338-1341
    • Bothe, S.1    Karras, P.2    Vlachou, A.3
  • 28
    • 84905024335 scopus 로고    scopus 로고
    • Toward efficient and privacy-preserving computing in big data era
    • [28] Lu, R., Zhu, H., Liu, X., Liu, J.K., Shao, J., Toward efficient and privacy-preserving computing in big data era. IEEE Netw. 28:4 (2014), 46–50.
    • (2014) IEEE Netw. , vol.28 , Issue.4 , pp. 46-50
    • Lu, R.1    Zhu, H.2    Liu, X.3    Liu, J.K.4    Shao, J.5
  • 29
    • 0022882770 scopus 로고
    • How to generate and exchange secrets (extended abstract), in: 27th Annual Symposium on Foundations of Computer Science, Toronto, Canada, 27–29 October 1986, pp.
    • [29] A.C. Yao, How to generate and exchange secrets (extended abstract), in: 27th Annual Symposium on Foundations of Computer Science, Toronto, Canada, 27–29 October 1986, 1986, pp. 162–167.
    • (1986) , pp. 162-167
    • Yao, A.C.1
  • 30
    • 84983215923 scopus 로고    scopus 로고
    • Secure multi-party computation, Manuscript. Preliminary version.
    • [30] O. Goldreich, Secure multi-party computation, Manuscript. Preliminary version.
    • Goldreich, O.1
  • 32
    • 84914127581 scopus 로고    scopus 로고
    • Faster secure two-party computation using garbled circuits, in: USENIX Security Symposium, Vol.
    • [32] Y. Huang, D. Evans, J. Katz, L. Malka, Faster secure two-party computation using garbled circuits, in: USENIX Security Symposium, Vol. 201, 2011.
    • (2011) , vol.201
    • Huang, Y.1    Evans, D.2    Katz, J.3    Malka, L.4
  • 33
    • 85084163840 scopus 로고    scopus 로고
    • Fairplay-secure two-party computation system, in: USENIX Security Symposium, San Diego, CA, USA, pp.
    • [33] D. Malkhi, N. Nisan, B. Pinkas, Y. Sella, et al. Fairplay-secure two-party computation system, in: USENIX Security Symposium, San Diego, CA, USA, 2004, pp. 287–302.
    • (2004) , pp. 287-302
    • Malkhi, D.1    Nisan, N.2    Pinkas, B.3    Sella, Y.4
  • 37
    • 84873848479 scopus 로고    scopus 로고
    • SPOC: A secure and privacy-preserving opportunistic computing framework for mobile-healthcare emergency
    • [37] Lu, R., Lin, X., Shen, X.S., SPOC: A secure and privacy-preserving opportunistic computing framework for mobile-healthcare emergency. IEEE Trans. Parallel Distrib. Syst. 24:3 (2013), 614–624.
    • (2013) IEEE Trans. Parallel Distrib. Syst. , vol.24 , Issue.3 , pp. 614-624
    • Lu, R.1    Lin, X.2    Shen, X.S.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.