최소 단어 이상 선택하여야 합니다.
최대 10 단어까지만 선택 가능합니다.
다음과 같은 기능을 한번의 로그인으로 사용 할 수 있습니다.
NTIS 바로가기정보과학회논문지 = Journal of KIISE, v.43 no.12, 2016년, pp.1437 - 1457
김형일 (전북대학교 컴퓨터공학과) , 김형진 (전북대학교 컴퓨터공학과) , 신영성 (전북대학교 컴퓨터공학과) , 장재우 (전북대학교 IT정보공학과)
In outsourced databases, the cloud provides an authorized user with querying services on the outsourced database. However, sensitive data, such as financial or medical records, should be encrypted before being outsourced to the cloud. Meanwhile, k-Nearest Neighbor (kNN) query is the typical query ty...
A. Gutscher, "Coordinate transformation - a solution for the privacy problem of location based services?," Proc. of the 20th IPDPS, pp. 354, 2006.
W. K. Wong, D. W. Cheung, B. Kao, and N. Mamoulis, "Secure knn computation on encrypted databases," Proc. of the SIGMOD, pp. 139-152, 2009.
M. L. Yiu, G. Ghinita, C. S. Jensen and P. Kalnis, "Enabling Search Services on Outsourced Private Spatial Data," The VLDB Journal, Vol. 19, No. 3, pp 363-384, Oct. 2010.
A. Boldyreva, N. Chenette, and A. O'Neill, "Orderpreserving encryption revisited: Improved security analysis and alternative solutions," CRYPTO, LNCS, Vol. 6841, pp. 578-595, Aug. 2011.
H. Kim, S. Hong, and J. Chang, "Hilbert curvebased cryptographic transformation scheme for spatial query processing on outsourced private data," Data & Knowledge Engineering, Vol. 104, pp. 32-44, Jul. 2015.
P. Paillier, "Public-key cryptosystems based on composite degree residuosity classes," EUROCRYPT, LNCS, Vol. 1592, pp. 223-238, Apr. 1999.
J. Domingo-Ferrer, "A provably secure additive and multiplicative privacy homomorphism," ISC, LNCS, Vol. 2433, pp. 471-483, Sep. 2002.
D. Boneh and B. Waters, "Conjunctive, Subset, and Range Queries on Encrypted Data," Theory of cryptography, LNCS, Vol. 4392, pp. 535-554, Feb. 2007.
A. Boldyreva, N. Chenette, Y. Lee, and A. O'Neill, "Order-preserving symmetric encryption," EUROCRYPT, LNCS, Vol. 5479, pp. 224-241, Apr. 2009.
H. Hu, J. Xu, C. Ren, and B. Choi, "Processing private queries over untrusted data cloud through privacy homomorphism," Proc. of the 27th ICDE, pp. 601-612, 2011.
B. Wang, Y. Hou, M. Li, H. Wang, and H. Li, "Maple: scalable multi-dimensional range search over encrypted cloud data with tree-based index," Proc. of the 9th ACM symposium on Information, computer and communications security, pp. 111-122, 2014.
Y. Elmehdwi, B. K. Samanthula, and W. Jiang, "Secure k-nearest neighbor query over encrypted data in outsourced environments," Proc. of the 30th ICDE, pp. 664-675, 2014.
P. Wang and C. V. Ravishankar, "Secure and efficient range queries on outsourced databases using R-trees," Proc. of the 29th ICDE, pp. 314-325, 2013.
M. Burkhart and X. Dimitropoulos, "Fast privacypreserving top-k queries using secret sharing," Proc. of the 19th ICCCN, pp. 1-7, 2010.
B. Hore, S. Mehrotra, M. Canim, and M. Kantarcioglu, "Secure multidimensional range queries over outsourced data," The VLDB Journal, Vol. 21, No. 3, pp. 333-358, Jun. 2012.
J. Vaidya, and C. W. Clifton, "Privacy-preserving kth element score over vertically partitioned data," TKDE, IEEE, Vol. 21, No. 2, pp. 253-258, Feb. 2009.
Y. Zhu, R. Xu, and T. Takagi, "Secure k-nn computation on encrypted cloud data without sharing key with query users," Proc. of the 2013 international workshop on Security in Cloud Computing, pp. 55-60. 2013.
A. C. Yao, "How to Generate and Exchange Secrets," Proc. of the 27th IEEE Symposium on Foundations of Computer Science, pp. 162-167, 1986.
Y. Lindell and B. Pinkas, "A proof of security of yao's protocol for two party computation," Journal of Cryptology, Vol. 22, No. 2, pp. 161-188, Apr. 2009.
M. O. Rabin, "How to Exchange Secrets with Oblivious Transfer," Technical Report-81, Harvard University, 1981.
C. Hazay and Y. Lindell, "Efficient Secure Two- Party Protocols: Techniques and Constructions," Information Security and Cryptography, Springer, 2010.
A. Liu, K. Zhengy, L. Liz, G. Liu, L. Zhao, and X. Zhou, "Efficient Secure Similarity Computation on Encrypted Trajectory Data," Proc. of the 31st ICDE, pp. 66-77, 2015.
B. K. Samanthula, Y. Elmehdwi, and W. Jiang, "k-nearest neighbor classification over semantically secure encrypted relational data," TKDE, IEEE, Vol. 27, No. 5, pp. 1261-1273, May. 2015.
O. Goldreich, "Foundations of Cryptography: Volume 2, Basic Applications," Cambridge university press, Vol. 2, 2009.
*원문 PDF 파일 및 링크정보가 존재하지 않을 경우 KISTI DDS 시스템에서 제공하는 원문복사서비스를 사용할 수 있습니다.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.