메뉴 건너뛰기




Volumn 9722, Issue , 2016, Pages 181-197

Privacy-preserving k-nearest neighbour query on outsourced database

Author keywords

Encrypted database; k nearest neighbour search; Oblivious RAM; Outsourcing of computation; Privacy preserving computation

Indexed keywords

DATA PRIVACY; DATABASE SYSTEMS; DISTRIBUTED DATABASE SYSTEMS; INFORMATION MANAGEMENT; NEAREST NEIGHBOR SEARCH; QUERY PROCESSING; SECURITY OF DATA;

EID: 84978200144     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-319-40253-6_11     Document Type: Conference Paper
Times cited : (6)

References (31)
  • 5
    • 85042713075 scopus 로고    scopus 로고
    • Secure outsourced garbled circuit evaluation for mobile devices
    • Carter, H., Mood, B., Traynor, P., Butler, K.R.: Secure outsourced garbled circuit evaluation for mobile devices. In: USENIX Security, pp. 289–304 (2013)
    • (2013) USENIX Security , pp. 289-304
    • Carter, H.1    Mood, B.2    Traynor, P.3    Butler, K.R.4
  • 6
    • 0032201622 scopus 로고    scopus 로고
    • Private information retrieval
    • Chor, B., Kushilevitz, E., Goldreich, O., Sudan, M.: Private information retrieval. J. ACM 45(6), 965–981 (1998). http://doi.acm.org/10.1145/293347.293350
    • (1998) J. ACM , vol.45 , Issue.6 , pp. 965-981
    • Chor, B.1    Kushilevitz, E.2    Goldreich, O.3    Sudan, M.4
  • 8
    • 84945300542 scopus 로고    scopus 로고
    • A provably secure additive and multiplicative privacy homomorphism
    • Chan, A.H., Gligor, V.D. (eds.), Springer, Heidelberg
    • Domingo-Ferrer, J.: A provably secure additive and multiplicative privacy homomorphism. In: Chan, A.H., Gligor, V.D. (eds.) ISC 2002. LNCS, vol. 2433, pp. 471–483. Springer, Heidelberg (2002)
    • (2002) ISC 2002. LNCS , vol.2433 , pp. 471-483
    • Domingo-Ferrer, J.1
  • 10
    • 0016567534 scopus 로고
    • An algorithm for finding nearest neighbors
    • Friedman, J.H., Baskett, F., Shustek, L.J.: An algorithm for finding nearest neighbors. IEEE Trans. Comput. 24(10), 1000–1006 (1975)
    • (1975) IEEE Trans. Comput , vol.24 , Issue.10 , pp. 1000-1006
    • Friedman, J.H.1    Baskett, F.2    Shustek, L.J.3
  • 12
    • 0030149547 scopus 로고    scopus 로고
    • Software protection and simulation on oblivious rams
    • Goldreich, O., Ostrovsky, R.: Software protection and simulation on oblivious rams. J. ACM 43(3), 431–473 (1996)
    • (1996) J. ACM , vol.43 , Issue.3 , pp. 431-473
    • Goldreich, O.1    Ostrovsky, R.2
  • 14
    • 79957834847 scopus 로고    scopus 로고
    • Processing private queries over untrusted data cloud through privacy homomorphism
    • IEEE
    • Hu, H., Xu, J., Ren, C., Choi, B.: Processing private queries over untrusted data cloud through privacy homomorphism. In: ICDE 2011, pp. 601–612. IEEE (2011)
    • (2011) ICDE 2011 , pp. 601-612
    • Hu, H.1    Xu, J.2    Ren, C.3    Choi, B.4
  • 16
    • 85000797782 scopus 로고    scopus 로고
    • Scaling private set intersection to billion-element sets
    • Christin, N., Safavi-Naini, R. (eds.), Springer, Heidelberg
    • Kamara, S., Mohassel, P., Raykova, M., Sadeghian, S.: Scaling private set intersection to billion-element sets. In: Christin, N., Safavi-Naini, R. (eds.) FC 2014. LNCS, vol. 8437, pp. 193–213. Springer, Heidelberg (2014)
    • (2014) FC 2014. LNCS , vol.8437 , pp. 193-213
    • Kamara, S.1    Mohassel, P.2    Raykova, M.3    Sadeghian, S.4
  • 19
    • 84916199465 scopus 로고    scopus 로고
    • Efficient, oblivious data structures for MPC
    • Sarkar, P., Iwata, T. (eds.), Springer, Heidelberg
    • Keller, M., Scholl, P.: Efficient, oblivious data structures for MPC. In: Sarkar, P., Iwata, T. (eds.) ASIACRYPT 2014, Part II. LNCS, vol. 8874, pp. 506–525. Springer, Heidelberg (2014)
    • (2014) ASIACRYPT 2014, Part II. LNCS , vol.8874 , pp. 506-525
    • Keller, M.1    Scholl, P.2
  • 21
    • 82955173838 scopus 로고    scopus 로고
    • Oblivious RAM with O((logN)3) worst-case cost
    • Wang, X., Lee, D.H. (eds.), Springer, Heidelberg
    • Shi, E., Chan, T.-H.H., Stefanov, E., Li, M.: Oblivious RAM with O((logN)3) worst-case cost. In: Wang, X., Lee, D.H. (eds.) ASIACRYPT 2011. LNCS, vol. 7073, pp. 197–214. Springer, Heidelberg (2011)
    • (2011) ASIACRYPT 2011. LNCS , vol.7073 , pp. 197-214
    • Shi, E.1    Chan, T.-H.H.2    Stefanov, E.3    Li, M.4
  • 23
    • 29144433598 scopus 로고    scopus 로고
    • Cryptanalysis of an algebraic privacy homomorphism
    • Boyd, C., Mao, W. (eds.), Springer, Heidelberg
    • Wagner, D.: Cryptanalysis of an algebraic privacy homomorphism. In: Boyd, C., Mao, W. (eds.) ISC 2003. LNCS, vol. 2851, pp. 234–239. Springer, Heidelberg (2003)
    • (2003) ISC 2003. LNCS , vol.2851 , pp. 234-239
    • Wagner, D.1
  • 24
    • 79960862322 scopus 로고    scopus 로고
    • Secure and practical outsourcing of linear programming in cloud computing
    • IEEE
    • Wang, C., Ren, K., Wang, J.: Secure and practical outsourcing of linear programming in cloud computing. In: INFOCOM, 2011 Proceedings IEEE, pp. 820–828. IEEE (2011)
    • (2011) INFOCOM, 2011 Proceedings IEEE , pp. 820-828
    • Wang, C.1    Ren, K.2    Wang, J.3
  • 25
    • 84878119000 scopus 로고    scopus 로고
    • Efficient verifiable fuzzy keyword search over encrypted data in cloud computing
    • Wang, J., Ma, H., Tang, Q., Li, J., Zhu, H., Ma, S., Chen, X.: Efficient verifiable fuzzy keyword search over encrypted data in cloud computing. Comput. Sci. Inf. Syst. 10(2), 667–684 (2013)
    • (2013) Comput. Sci. Inf. Syst , vol.10 , Issue.2 , pp. 667-684
    • Wang, J.1    Ma, H.2    Tang, Q.3    Li, J.4    Zhu, H.5    Ma, S.6    Chen, X.7
  • 27
    • 70849131456 scopus 로고    scopus 로고
    • Secure kNN computation on encrypted databases
    • Wong, W.K., Cheung, D.W.L., Kao, B., Mamoulis, N.: Secure kNN computation on encrypted databases. In: SIGMOD 2009, pp. 139–152 (2009)
    • (2009) SIGMOD 2009 , pp. 139-152
    • Wong, W.K.1    Cheung, D.W.L.2    Kao, B.3    Mamoulis, N.4
  • 29
    • 84881354487 scopus 로고    scopus 로고
    • Secure nearest neighbor revisited
    • Yao, B., Li, F., Xiao, X.: Secure nearest neighbor revisited. ICDE 2013, 733–744 (2013)
    • (2013) ICDE 2013 , pp. 733-744
    • Yao, B.1    Li, F.2    Xiao, X.3
  • 30
    • 84881219897 scopus 로고    scopus 로고
    • Circuit structures for improving efficiency of security and privacy tools
    • Zahur, S., Evans, D.: Circuit structures for improving efficiency of security and privacy tools. SP 2013, 493–507 (2013)
    • (2013) SP 2013 , pp. 493-507
    • Zahur, S.1    Evans, D.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.