4.8 Article

Privacy-Preserving Keyword Similarity Search Over Encrypted Spatial Data in Cloud Computing

Related references

Note: Only part of the references are listed.
Article Computer Science, Information Systems

Location Privacy-Preserving Task Recommendation With Geometric Range Query in Mobile Crowdsensing

Chuan Zhang et al.

Summary: This paper proposes location privacy-preserving task recommendation schemes in mobile crowdsensing, without the need for a trusted database owner. The schemes, named PPTR-L and PPTR-F, achieve linear and faster-than-linear search complexity respectively, while ensuring the confidentiality of workers' locations and data requesters' queries.

IEEE TRANSACTIONS ON MOBILE COMPUTING (2022)

Article Computer Science, Information Systems

DNA Similarity Search With Access Control Over Encrypted Cloud Data

Guowen Xu et al.

Summary: This article introduces an efficient and fine-grained similarity search scheme, EFSS, for encrypted DNA data. It utilizes an approximation algorithm for efficient calculation of edit distances, a novel Boolean search strategy for complex logic queries, and supports data access control and K-means clustering algorithm to improve execution efficiency.

IEEE TRANSACTIONS ON CLOUD COMPUTING (2022)

Article Computer Science, Information Systems

Privacy-Preserving Task Recommendation Services for Crowdsourcing

Jiangang Shu et al.

Summary: This paper proposes a privacy-preserving task recommendation scheme (PPTR) for crowdsourcing, which protects both task privacy and worker privacy by utilizing polynomial functions and matrix decomposition for multi-keyword matching. User accountability and revocation are effectively achieved through PPTR. Extensive privacy analysis and performance evaluations demonstrate that PPTR is secure and efficient.

IEEE TRANSACTIONS ON SERVICES COMPUTING (2021)

Article Computer Science, Theory & Methods

VeriML: Enabling Integrity Assurances and Fair Payments for Machine Learning as a Service

Lingchen Zhao et al.

Summary: Machine Learning as a Service (MLaaS) allows clients to outsource ML tasks to powerful servers, but current solutions lack strong assurances on service correctness, trustworthy accounting, and fair payment. VeriML is introduced as an efficient framework to provide integrity assurances and fair payments, ensuring task execution correctness and equal resource consumption. Utilizing SNARK and ML-specific optimizations, VeriML implements six common algorithms and demonstrates practical performance.

IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS (2021)

Article Computer Science, Information Systems

Verifiable and Secure SVM Classification for Cloud-Based Health Monitoring Services

Jinwen Liang et al.

Summary: This research proposes a verifiable and secure SVM classification scheme (VSSVMC) for cloud-based health monitoring services, ensuring the accuracy and completeness of medical decisions by constructing verifiable indices, and guaranteeing data confidentiality with symmetric key encryption. The VSSVMC showcases high efficiency in computation, communication, and storage, with microsecond-level execution times and kilobyte-level overheads on tested datasets.

IEEE INTERNET OF THINGS JOURNAL (2021)

Article Computer Science, Hardware & Architecture

Efficient and Secure Decision Tree Classification for Cloud-Assisted Online Diagnosis Services

Jinwen Liang et al.

Summary: This study proposes a method to achieve secure online diagnosis services on cloud servers, protecting user privacy and the confidentiality of decision tree classifiers. Performance analysis shows that the scheme has a faster-than-linear classification speed. Experimental results demonstrate that processing diagnosis requests in the tested datasets only takes several microseconds.

IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING (2021)

Article Automation & Control Systems

DeepHealth: A Self-Attention Based Method for Instant Intelligent Predictive Maintenance in Industrial Internet of Things

Weiting Zhang et al.

Summary: This article proposes a self-attention based Perception and Prediction framework, called DeepHealth, for instant IPdM. The framework consists of two submodels for health perception and sequence prediction. Experimental results demonstrate that the proposed solution achieves good prediction accuracy for instant IPdM on the automatic washing equipment and Case Western Reserve University datasets.

IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS (2021)

Article Engineering, Electrical & Electronic

Privacy-Preserving Task Matching With Threshold Similarity Search via Vehicular Crowdsourcing

Fuyuan Song et al.

Summary: The paper proposes a Privacy-Preserving Task Matching method through vehicular crowdsourcing, which protects the privacy of locations and interests of requesters and workers. By transforming the interests of vehicular workers into binary vectors and utilizing Symmetric-key Threshold Predicate Encryption and proxy re-encryption, PPTM achieves privacy-preserving multi-keyword task matching in a multi-worker multi-requester setting.

IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY (2021)

Article Computer Science, Information Systems

Efficient and Privacy-Preserving Decision Tree Classification for Health Monitoring Systems

Jinwen Liang et al.

Summary: This article proposes an efficient and privacy-preserving decision tree (PPDT) classification scheme for health monitoring systems. The scheme involves converting a decision tree classifier into Boolean vectors and encrypting them with symmetric key encryption to achieve PPDT classification. Experimental evaluations demonstrate the high efficiency of PPDT in terms of execution time, communication costs, and storage costs on the test data set.

IEEE INTERNET OF THINGS JOURNAL (2021)

Article Engineering, Electrical & Electronic

SDN/NFV-Empowered Future IoV With Enhanced Communication, Computing, and Caching

Weihua Zhuang et al.

PROCEEDINGS OF THE IEEE (2020)

Article Computer Science, Information Systems

Enabling Strong Privacy Preservation and Accurate Task Allocation for Mobile Crowdsensing

Jianbing Ni et al.

IEEE TRANSACTIONS ON MOBILE COMPUTING (2020)

Article Automation & Control Systems

Balancing Privacy and Accountability for Industrial Mortgage Management

Liang Xue et al.

IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS (2020)

Article Computer Science, Information Systems

Secure and Efficient Distributed Network Provenance for IoT: A Blockchain-Based Approach

Dongxiao Liu et al.

IEEE INTERNET OF THINGS JOURNAL (2020)

Proceedings Paper Computer Science, Hardware & Architecture

Search Me in the Dark: Privacy-preserving Boolean Range Query over Encrypted Spatial Data

Xiangyu Wang et al.

IEEE INFOCOM 2020 - IEEE CONFERENCE ON COMPUTER COMMUNICATIONS (2020)

Article Engineering, Electrical & Electronic

Edge-Aided Computing and Transmission Scheduling for LTE-U-Enabled IoT

Hongli He et al.

IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS (2020)

Article Computer Science, Information Systems

A Flexible Privacy-Preserving Data Sharing Scheme in Cloud-Assisted IoT

Hua Deng et al.

IEEE INTERNET OF THINGS JOURNAL (2020)

Article Computer Science, Hardware & Architecture

FastGeo: Efficient Geometric Range Queries on Encrypted Spatial Data

Boyang Wang et al.

IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING (2019)

Article Computer Science, Theory & Methods

Enabling Efficient and Geometric Range Query With Access Control Over Encrypted Spatial Data

Guowen Xu et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2019)

Article Engineering, Electrical & Electronic

Toward Privacy-Preserving Valet Parking in Autonomous Driving Era

Jianbing Ni et al.

IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY (2019)

Proceedings Paper Computer Science, Hardware & Architecture

Search in My Way: Practical Outsourced Image Retrieval Framework Supporting Unshared Key

Xiangyu Wang et al.

IEEE CONFERENCE ON COMPUTER COMMUNICATIONS (IEEE INFOCOM 2019) (2019)

Article Computer Science, Information Systems

Privacy-Preserving Top-k Spatial Keyword Queries in Untrusted Cloud Environments

Sen Su et al.

IEEE TRANSACTIONS ON SERVICES COMPUTING (2018)

Article Computer Science, Theory & Methods

Outsourced Biometric Identification With Privacy

Shengshan Hu et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2018)

Article Computer Science, Theory & Methods

PassBio: Privacy-Preserving User-Centric Biometric Authentication

Kai Zhou et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2018)

Article Computer Science, Information Systems

A Dual Privacy Preserving Scheme in Continuous Location-Based Services

Shaobo Zhang et al.

IEEE INTERNET OF THINGS JOURNAL (2018)

Article Computer Science, Information Systems

Fine-grained search and access control in multi-user searchable encryption without shared keys

Manju S. Nair et al.

JOURNAL OF INFORMATION SECURITY AND APPLICATIONS (2018)

Article Engineering, Electrical & Electronic

Vehicular Fog Computing: Architecture, Use Case, and Security and Forensic Challenges

Cheng Huang et al.

IEEE COMMUNICATIONS MAGAZINE (2017)

Article Computer Science, Theory & Methods

Two-Cloud Secure Database for Numeric-Related SQL Range Queries With Privacy Preserving

Kaiping Xue et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2017)

Article Engineering, Electrical & Electronic

An Efficient Privacy-Preserving Location-Based Services Query Scheme in Outsourced Cloud

Hui Zhu et al.

IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY (2016)

Article Computer Science, Hardware & Architecture

Fast and Scalable Range Query Processing With Strong Privacy Protection for Cloud Computing

Rui Li et al.

IEEE-ACM TRANSACTIONS ON NETWORKING (2016)

Article Computer Science, Theory & Methods

New Algorithms for Secure Outsourcing of Modular Exponentiations

Xiaofeng Chen et al.

IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS (2014)

Article Mathematics, Applied

Solving cubics by polynomial fitting

Peter Strobach

JOURNAL OF COMPUTATIONAL AND APPLIED MATHEMATICS (2011)