메뉴 건너뛰기




Volumn , Issue , 2016, Pages

Collusion-resisting secure nearest neighbor query over encrypted data in cloud, revisited

Author keywords

Cloud computing; Collusion attack; Secure nearest neighbor query; Security problems

Indexed keywords

CLOUD COMPUTING; CRYPTOGRAPHY; NEAREST NEIGHBOR SEARCH; QUALITY OF SERVICE;

EID: 85009774251     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/IWQoS.2016.7590443     Document Type: Conference Paper
Times cited : (18)

References (9)
  • 2
    • 84951770536 scopus 로고    scopus 로고
    • Secure and controllable k-nn query over encrypted cloud data with key confidentiality
    • Y. Zhu, Z. Huang, and T. Takagi, "Secure and controllable k-nn query over encrypted cloud data with key confidentiality," Journal of Parallel and Distributed Computing, vol. 89, pp. 1-12,2016.
    • (2016) Journal of Parallel and Distributed Computing , vol.89 , pp. 1-12
    • Zhu, Y.1    Huang, Z.2    Takagi, T.3
  • 3
    • 33750283449 scopus 로고    scopus 로고
    • Privacy preserving data classification with rotation perturbation
    • K. Chen and L. Liu, "Privacy preserving data classification with rotation perturbation," in Proc. of 5th IEEE ICDM, 2005.
    • (2005) Proc. of 5th IEEE ICDM
    • Chen, K.1    Liu, L.2
  • 4
    • 84881354487 scopus 로고    scopus 로고
    • Secure nearest neighbor revisited
    • B. Yao, F. Li, and X. Xiao, "Secure nearest neighbor revisited," in 29th IEEE ICDE, 2013, pp. 733-744.
    • (2013) 29th IEEE ICDE , pp. 733-744
    • Yao, B.1    Li, F.2    Xiao, X.3
  • 5
    • 84951735921 scopus 로고    scopus 로고
    • Cloudbi: Practical privacy-preserving outsourcing of biometric identification in the cloud
    • Q. Wang, S. Hu, K. Ren, M. He, M. Du, and Z. Wang, "Cloudbi: Practical privacy-preserving outsourcing of biometric identification in the cloud," in 20th ESORICS. LNCS 9327, 2015, pp. 186-205.
    • (2015) 20th ESORICS. LNCS , vol.9327 , pp. 186-205
    • Wang, Q.1    Hu, S.2    Ren, K.3    He, M.4    Du, M.5    Wang, Z.6
  • 6
    • 84883119889 scopus 로고    scopus 로고
    • Efficient privacy-preserving biometric identification in cloud computing
    • J. Yuan and S. Yu, "Efficient privacy-preserving biometric identification in cloud computing," in Proc. of IEEE INFO COM, 2013, pp. 2652-2660.
    • (2013) Proc. of IEEE INFO COM , pp. 2652-2660
    • Yuan, J.1    Yu, S.2
  • 8
    • 84901750940 scopus 로고    scopus 로고
    • Secure knearest neighbor query over encrypted data in outsourced environments
    • Y. Elmehdwi, B. K. Samanthula, and W. Jiang, "Secure knearest neighbor query over encrypted data in outsourced environments," in 30th IEEE ICDE, 2014, pp. 664-675.
    • (2014) 30th IEEE ICDE , pp. 664-675
    • Elmehdwi, Y.1    Samanthula, B.K.2    Jiang, W.3
  • 9
    • 84881262361 scopus 로고    scopus 로고
    • An ideal-security protocol for order-preserving encoding
    • R. A. Popa, F. H. Li, and N. Zeldovich, "An ideal-security protocol for order-preserving encoding," in Proc. of 34th IEEE S&P, 2013, pp. 463-477.
    • (2013) Proc. of 34th IEEE S&P , pp. 463-477
    • Popa, R.A.1    Li, F.H.2    Zeldovich, N.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.