Efficient k -NN query over encrypted data in cloud with limited key-disclosure and offline data owner
Tài liệu tham khảo
Amirbekyan, 2007, Privacy-preserving k-nn for small and large data sets, 699
Arya, 1998, An optimal algorithm for approximate nearest neighbor searching fixed dimensions, J ACM, 45, 891, 10.1145/293347.293348
Beyer, 1999, When is nearest neighbor meaningful?, 217
Cao, 2011, Privacy-preserving query over encrypted graph-structured data in cloud computing, 393
Chen, 2005, Privacy preserving data classification with rotation perturbation
Chen, 2007, Towards attack-resilient geometric data perturbation
Chen, 2011, Rasp: efficient multidimensional range query on attack-resilient encrypted databases, 249
Ciaccia, 2000, Pac nearest neighbor queries: approximate and controlled search in high-dimensional and metric spaces, 244
Elmehdwi, 2013
Fu, 2015, Achieving efficient cloud search services: multi-keyword ranked search over encrypted cloud data supporting parallel computing, IEICE Trans Commun, 98, 190, 10.1587/transcom.E98.B.190
García-Teodoro, 2009, Anomaly-based network intrusion detection: techniques, systems and challenges, Comput Secur, 28, 18, 10.1016/j.cose.2008.08.003
Ghinita, 2011, Approximate and exact hybrid algorithms for private nearest-neighbor queries with database protection, Geoinformatica, 15, 699, 10.1007/s10707-010-0121-4
Goethals, 2004, On private scalar product computation for privacy-preserving data mining, vol. 3506, 104
Goldreich, 2004, Foundations of cryptography, vol. II
Gu, 2014, Known-plaintext attack on secure kNN computation on encrypted databases, Secur Commun Netw
Guo, 2012, Privacy preserving boosting in the cloud with secure half-space queries, 1031
Hashem, 2010, Privacy preserving group nearest neighbor queries, 489
Hore, 2012, Secure multidimensional range queries over outsourced data, VLDB J, 21, 333, 10.1007/s00778-011-0245-7
Hu, 2011, Processing private queries over untrusted data cloud through privacy homomorphism, 601
Kantarcioglu, 2004, Privately computing a distributed k-nn classifier, 279
Li, 2011, Authorized private keyword search over encrypted data in cloud computing, 383
Li, 2007, An active learning based TCM-KNN algorithm for supervised network intrusion detection, Comput Secur, 26, 459, 10.1016/j.cose.2007.10.002
Liao, 2002, Use of k-nearest neighbor classifier for intrusion detection, Comput Secur, 21, 439, 10.1016/S0167-4048(02)00514-X
Liu, 2006, An attacker's view of distance preserving maps for privacy preserving data mining, 297
Ma, 2015, Social network and tag sources based augmenting collaborative recommender system, IEICE Trans Inf Syst, E98.D, 902, 10.1587/transinf.2014EDP7283
Meng
Mykletun, 2006, Aggregation queries in the database-as-a-service model, 89
Pan, 2016, Security analysis on privacy-preserving cloud aided biometric identification schemes, 446
Papadopoulos, 2010, Nearest neighbor search with strong location privacy, vol. 3, 619
Popa, 2013, An ideal-security protocol for order-preserving encoding, 463
Qi, 2008, Efficient privacy-preserving k-nearest neighbor search, 311
Ren, 2015, Mutual verifiable provable data auditing in public cloud storage, J Internet Technol, 16, 317
Samanthula, 2015, K-nearest neighbor classification over semantically secure encrypted relational data, IEEE Trans Knowl Data Eng, 27, 1261, 10.1109/TKDE.2014.2364027
Shi, 2007, Multi-dimensional range query over encrypted data, 350
Su, 2011, Using clustering to improve the KNN-based classifiers for online anomaly network traffic identification, J Netw Comput Appl, 34, 722, 10.1016/j.jnca.2010.10.009
Wang, 2016, Practical and secure nearest neighbor search on encrypted large-scale data
Wang, 2010, Secure ranked keyword search over encrypted cloud data, 253
Wang, 2015, CloudBI: practical privacy-preserving outsourcing of biometric identification in the cloud, vol. 9327
Wen, 2015, A rapid learning algorithm for vehicle classification, Inf Sci (Ny), 295, 395, 10.1016/j.ins.2014.10.040
Wong, 2009, Secure knn computation on encrypted databases, 139
Xia, 2016, A secure and dynamic multi-keyword ranked search scheme over encrypted cloud data, IEEE Trans Parallel Distrib Syst, 27, 340, 10.1109/TPDS.2015.2401003
Xiong, 2007, Mining multiple private databases using a knn classifier, 435
Xu, 2014, Building confidential and efficient query services in the cloud with RASP data perturbation, IEEE Trans Knowl Data Eng, 26, 322, 10.1109/TKDE.2012.251
Yang, 2006, Privacy-preserving queries on encrypted data, 479
Yao, 1982, Protocols for secure computations, 160
Yao, 2013, Secure nearest neighbor revisited, 733
Yiu, 2012, Outsourced similarity search on metric data assets, IEEE Trans Knowl Data Eng, 24, 338, 10.1109/TKDE.2010.222
Yuan, 2013, Efficient privacy-preserving biometric identification in cloud computing, 2652
Zhu, 2012, Efficient secure primitive for privacy preserving distributed computations, vol. 7631, 233
Zhu, 2013, Secure k-nn computation on encrypted cloud data without sharing key with query users, 55
Zhu, 2013, Secure k-NN query on encrypted cloud database without key-sharing, Int J Electron Secur Dig Forens, 5, 201, 10.1504/IJESDF.2013.058654
Zhu, 2014, Security analysis of collusion-resistant nearest neighbor query scheme on encrypted cloud data, IEICE Trans Inf Syst, E97-D, 10.1587/transinf.E97.D.326
Zhu, 2015, Fast secure scalar product protocol with (almost) optimal efficiency, 234
Zhu, 2016, Secure and controllable k-NN query over encrypted cloud data with key confidentiality, J Parallel Distrib Comput, 89, 1, 10.1016/j.jpdc.2015.11.004
Zhu, 2016, Collusion-resisting secure nearest neighbor query over encrypted data in cloud, revisited
Zhu, 2016, Secure k-NN query on encrypted cloud data with limited key-disclosure and offline data owner, 401