메뉴 건너뛰기




Volumn 89, Issue , 2016, Pages 1-12

Secure and controllable k-NN query over encrypted cloud data with key confidentiality

Author keywords

Cloud computing; k nearest neighbors; Privacy; Query

Indexed keywords

CLOUD COMPUTING; CRYPTOGRAPHY; DATA HANDLING; MOTION COMPENSATION; NEAREST NEIGHBOR SEARCH; QUERY PROCESSING;

EID: 84951770536     PISSN: 07437315     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.jpdc.2015.11.004     Document Type: Article
Times cited : (84)

References (43)
  • 2
    • 38149068986 scopus 로고    scopus 로고
    • Deterministic and efficiently searchable encryption
    • M. Bellare, A. Boldyreva, A. O'Neill, Deterministic and efficiently searchable encryption, in: CRYPTO, 2007, pp. 535-552.
    • (2007) CRYPTO , pp. 535-552
    • Bellare, M.1    Boldyreva, A.2    O'Neill, A.3
  • 4
    • 38049045519 scopus 로고    scopus 로고
    • Conjunctive, subset, and range queries on encrypted data
    • D. Boneh, B. Waters, Conjunctive, subset, and range queries on encrypted data, in: Proc. of TCC, 2007, pp. 535-554.
    • (2007) Proc. of TCC , pp. 535-554
    • Boneh, D.1    Waters, B.2
  • 5
    • 79960850152 scopus 로고    scopus 로고
    • Privacy-preserving multi-keyword ranked search over encrypted cloud data
    • N. Cao, C. Wang, M. Li, K. Ren, W. Lou, Privacy-preserving multi-keyword ranked search over encrypted cloud data, in: Proc. of IEEE INFOCOM, 2011, pp. 829-837.
    • (2011) Proc. of IEEE INFOCOM , pp. 829-837
    • Cao, N.1    Wang, C.2    Li, M.3    Ren, K.4    Lou, W.5
  • 6
    • 80051914330 scopus 로고    scopus 로고
    • Privacy-preserving query over encrypted graph-structured data in cloud computing
    • N. Cao, Z. Yang, C. Wang, K. Ren, W. Lou, Privacy-preserving query over encrypted graph-structured data in cloud computing, in: Proc. of 31st IEEE ICDCS, 2011, pp. 393-402.
    • (2011) Proc. of 31st IEEE ICDCS , pp. 393-402
    • Cao, N.1    Yang, Z.2    Wang, C.3    Ren, K.4    Lou, W.5
  • 7
    • 33750283449 scopus 로고    scopus 로고
    • Privacy preserving data classification with rotation perturbation
    • K. Chen, L. Liu, Privacy preserving data classification with rotation perturbation, in: Proc. of 5th IEEE ICDM, 2005.
    • (2005) Proc. of 5th IEEE ICDM
    • Chen, K.1    Liu, L.2
  • 9
    • 84923124154 scopus 로고    scopus 로고
    • Secure knn query processing in untrusted cloud environments
    • S. Choi, G. Ghinita, H.-S. Lim, and E. Bertino Secure knn query processing in untrusted cloud environments IEEE Trans. Knowl. Data Eng. 26 11 2014 2818 2831
    • (2014) IEEE Trans. Knowl. Data Eng. , vol.26 , Issue.11 , pp. 2818-2831
    • Choi, S.1    Ghinita, G.2    Lim, H.-S.3    Bertino, E.4
  • 10
    • 34547240272 scopus 로고    scopus 로고
    • Searchable symmetric encryption: Improved definitions and efficient constructions
    • R. Curtmola, J. Garay, S. Kamara, R. Ostrovsky, Searchable symmetric encryption: improved definitions and efficient constructions, in: Proc. of 13th ACM CCS, 2006, pp. 79-88.
    • (2006) Proc. of 13th ACM CCS , pp. 79-88
    • Curtmola, R.1    Garay, J.2    Kamara, S.3    Ostrovsky, R.4
  • 12
    • 24944523186 scopus 로고    scopus 로고
    • On private scalar product computation for privacy-preserving data mining
    • LNCS
    • B. Goethals, S. Laur, H. Lipmaa, and T. Mielikainen On private scalar product computation for privacy-preserving data mining Proc. of 7th ICISC LNCS vol. 3506 2004 104 120
    • (2004) Proc. of 7th ICISC , vol.3506 , pp. 104-120
    • Goethals, B.1    Laur, S.2    Lipmaa, H.3    Mielikainen, T.4
  • 14
    • 38049165825 scopus 로고    scopus 로고
    • Deriving private information from arbitrarily projected data
    • LNAI Springer-Verlag
    • S. Guo, and X. Wu Deriving private information from arbitrarily projected data Proc. of the 11th PAKDD LNAI vol. 4426 2007 Springer-Verlag 84 95
    • (2007) Proc. of the 11th PAKDD , vol.4426 , pp. 84-95
    • Guo, S.1    Wu, X.2
  • 15
    • 77951765127 scopus 로고    scopus 로고
    • Privacy-preserving gradient-descent methods
    • S. Han, W. Ng, L. Wan, and V. Lee Privacy-preserving gradient-descent methods IEEE Trans. Knowl. Data Eng. 22 6 2010 884 899
    • (2010) IEEE Trans. Knowl. Data Eng. , vol.22 , Issue.6 , pp. 884-899
    • Han, S.1    Ng, W.2    Wan, L.3    Lee, V.4
  • 16
    • 79957834847 scopus 로고    scopus 로고
    • Processing private queries over untrusted data cloud through privacy homomorphism
    • H. Hu, J. Xu, C. Ren, B. Choi, Processing private queries over untrusted data cloud through privacy homomorphism, in: Proc. of 27th IEEE ICDE, 2011, pp. 601-612.
    • (2011) Proc. of 27th IEEE ICDE , pp. 601-612
    • Hu, H.1    Xu, J.2    Ren, C.3    Choi, B.4
  • 19
    • 33750293582 scopus 로고    scopus 로고
    • An attacker's view of distance preserving maps for privacy preserving data mining
    • K. Liu, C. Giannella, H. Kargupta, An attacker's view of distance preserving maps for privacy preserving data mining, in: Proc. of 10th PKDD, 2006, pp. 297-308.
    • (2006) Proc. of 10th PKDD , pp. 297-308
    • Liu, K.1    Giannella, C.2    Kargupta, H.3
  • 20
    • 77954631038 scopus 로고    scopus 로고
    • Chapter 15: A survey of attack techniques on privacy-preserving data perturbation methods
    • Springer
    • K. Liu, C. Giannella, and H. Kargupta Chapter 15: A survey of attack techniques on privacy-preserving data perturbation methods Privacy-Preserving Data Mining 2008 Springer 359 381
    • (2008) Privacy-Preserving Data Mining , pp. 359-381
    • Liu, K.1    Giannella, C.2    Kargupta, H.3
  • 21
    • 84942550998 scopus 로고    scopus 로고
    • Public-key cryptosystems based on composite degree residuosity classes
    • LNCS
    • P. Paillier Public-key cryptosystems based on composite degree residuosity classes EUROCRYPT LNCS vol. 1592 1999 223 238
    • (1999) EUROCRYPT , vol.1592 , pp. 223-238
    • Paillier, P.1
  • 22
    • 84951784431 scopus 로고    scopus 로고
    • Paillier library
    • Paillier library. http://acsc.cs.utexas.edu/libpaillier/.
  • 24
    • 51849139413 scopus 로고    scopus 로고
    • Efficient privacy-preserving k-nearest neighbor search
    • Y. Qi, M. Atallah, Efficient privacy-preserving k-nearest neighbor search, in: Proc. of 28th IEEE ICDCS, 2008, pp. 311-319.
    • (2008) Proc. of 28th IEEE ICDCS , pp. 311-319
    • Qi, Y.1    Atallah, M.2
  • 25
    • 84926628839 scopus 로고    scopus 로고
    • K-nearest neighbor classification over semantically secure encrypted relational data
    • B.K. Samanthula, Y. Elmehdwi, and W. Jiang k-nearest neighbor classification over semantically secure encrypted relational data IEEE Trans. Knowl. Data Eng. 27 5 2015 1261 1273
    • (2015) IEEE Trans. Knowl. Data Eng. , vol.27 , Issue.5 , pp. 1261-1273
    • Samanthula, B.K.1    Elmehdwi, Y.2    Jiang, W.3
  • 28
    • 84877939257 scopus 로고    scopus 로고
    • Privacy-preserving multi-keyword text search in the cloud supporting similarity-based ranking
    • ACM
    • W. Sun, B. Wang, N. Cao, M. Li, W. Lou, Y.T. Hou, and H. Li Privacy-preserving multi-keyword text search in the cloud supporting similarity-based ranking Proc. of 8th ASIACCS 2013 ACM 71 82
    • (2013) Proc. of 8th ASIACCS , pp. 71-82
    • Sun, W.1    Wang, B.2    Cao, N.3    Li, M.4    Lou, W.5    Hou, Y.T.6    Li, H.7
  • 29
    • 84951759994 scopus 로고    scopus 로고
    • The GNU multiple precision arithmetic library
    • The GNU multiple precision arithmetic library. http://gmplib.org/.
  • 31
    • 84951815039 scopus 로고    scopus 로고
    • UCI machine learning repository
    • UCI machine learning repository. http://archive.ics.uci.edu/ml/.
  • 32
    • 84863511940 scopus 로고    scopus 로고
    • Enabling secure and efficient ranked keyword search over outsourced cloud data
    • C. Wang, N. Cao, K. Ren, and W. Lou Enabling secure and efficient ranked keyword search over outsourced cloud data IEEE Trans. Parallel Distrib. Syst. 23 8 2012 1467 1479
    • (2012) IEEE Trans. Parallel Distrib. Syst. , vol.23 , Issue.8 , pp. 1467-1479
    • Wang, C.1    Cao, N.2    Ren, K.3    Lou, W.4
  • 33
    • 84984889346 scopus 로고    scopus 로고
    • Maple: Scalable multi-dimensional range search over encrypted cloud data with tree-based index
    • ACM
    • B. Wang, Y. Hou, M. Li, H. Wang, and H. Li Maple: Scalable multi-dimensional range search over encrypted cloud data with tree-based index Proc. of 9th ASIACCS 2014 ACM
    • (2014) Proc. of 9th ASIACCS
    • Wang, B.1    Hou, Y.2    Li, M.3    Wang, H.4    Li, H.5
  • 34
    • 84877785052 scopus 로고    scopus 로고
    • Harnessing the cloud for securely outsourcing large-scale systems of linear equations
    • C. Wang, Q. Wang, K. Ren, and J. Wang Harnessing the cloud for securely outsourcing large-scale systems of linear equations IEEE Trans. Parallel Distrib. Syst. 24 6 2013 1172 1181
    • (2013) IEEE Trans. Parallel Distrib. Syst. , vol.24 , Issue.6 , pp. 1172-1181
    • Wang, C.1    Wang, Q.2    Ren, K.3    Wang, J.4
  • 36
    • 84951773230 scopus 로고    scopus 로고
    • Building confidential and efficient query services in the cloud with rasp data perturbation
    • H. Xu, S. Guo, K. Chen, Building confidential and efficient query services in the cloud with rasp data perturbation, IEEE Trans. Knowl. Data Eng.
    • IEEE Trans. Knowl. Data Eng.
    • Xu, H.1    Guo, S.2    Chen, K.3
  • 37
    • 33750247597 scopus 로고    scopus 로고
    • Privacy-preserving queries on encrypted data
    • Z. Yang, S. Zhong, R.N. Wright, Privacy-preserving queries on encrypted data, in: ESORICS, 2006, pp. 479-495.
    • (2006) ESORICS , pp. 479-495
    • Yang, Z.1    Zhong, S.2    Wright, R.N.3
  • 38
  • 40
    • 84883119889 scopus 로고    scopus 로고
    • Efficient privacy-preserving biometric identification in cloud computing
    • J. Yuan, S. Yu, Efficient privacy-preserving biometric identification in cloud computing, in: Proc. of IEEE INFOCOM, 2013, pp. 2652-2660.
    • (2013) Proc. of IEEE INFOCOM , pp. 2652-2660
    • Yuan, J.1    Yu, S.2
  • 41
    • 84893219360 scopus 로고    scopus 로고
    • Security analysis of collusion-resistant nearest neighbor query scheme on encrypted cloud data
    • Y. Zhu, T. Takagi, and R. Hu Security analysis of collusion-resistant nearest neighbor query scheme on encrypted cloud data IEICE Trans. Inf. Syst. E97-D 2 2014 326 330
    • (2014) IEICE Trans. Inf. Syst. , vol.97 E -D , Issue.2 , pp. 326-330
    • Zhu, Y.1    Takagi, T.2    Hu, R.3
  • 43
    • 84893021109 scopus 로고    scopus 로고
    • Secure k-nn query on encrypted cloud database without key-sharing
    • Y. Zhu, R. Xu, and T. Takagi Secure k-nn query on encrypted cloud database without key-sharing Int. J. Electron. Secur. Digit. Forensics 5 3-4 2013 201 217
    • (2013) Int. J. Electron. Secur. Digit. Forensics , vol.5 , Issue.3-4 , pp. 201-217
    • Zhu, Y.1    Xu, R.2    Takagi, T.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.