4.5 Article

Secure kNN query of outsourced spatial data using two-cloud architecture

Related references

Note: Only part of the references are listed.
Article Computer Science, Information Systems

Privacy-Preserving KNN Classification Algorithm for Smart Grid

Zhuhuan Song et al.

Summary: This paper proposes a privacy-preserving KNN classification algorithm, which is implemented with a single cloud server. It protects the privacy of smart meters and control centers, while keeping the classification results private for the server. The algorithm is more efficient compared to the original KNN and is suitable for small devices in IoT.

SECURITY AND COMMUNICATION NETWORKS (2022)

Proceedings Paper Computer Science, Hardware & Architecture

Lightweight Privacy-Preserving Spatial Keyword Query over Encrypted Cloud Data

Yutao Yang et al.

Summary: This paper presents an enhanced spatial keyword query scheme that utilizes random numbers and a random permutation to enhance encryption security. Furthermore, a privacy-preserving spatial keyword query scheme is proposed based on the enhanced encryption scheme and the Geohash algorithm. Additionally, a lightweight spatial keyword query scheme is designed by using a unified index for query, reducing storage and computational costs.

2022 IEEE 42ND INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS (ICDCS 2022) (2022)

Article Computer Science, Information Systems

Constrained top-k nearest fuzzy keyword queries on encrypted graph in road network

Fangyuan Sun et al.

Summary: As road networks grow, outsourcing large-scale graphs to the cloud improves query efficiency and reduces user burden. However, to protect data privacy, graphs must be encrypted before uploading to the cloud.

COMPUTERS & SECURITY (2021)

Article Computer Science, Interdisciplinary Applications

A Privacy Preserving Cloud-Based K-NN Search Scheme with Lightweight User Loads

Yeong-Cherng Hsu et al.

COMPUTERS (2020)

Article Computer Science, Information Systems

FTP: An Approximate Fast Privacy-Preserving Equality Test Protocol for Authentication in Internet of Things

Youwen Zhu et al.

SECURITY AND COMMUNICATION NETWORKS (2018)

Article Computer Science, Theory & Methods

Two-Cloud Secure Database for Numeric-Related SQL Range Queries With Privacy Preserving

Kaiping Xue et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2017)

Article Engineering, Multidisciplinary

Secure kNN Computation and Integrity Assurance of Data Outsourcing in the Cloud

Jun Hong et al.

MATHEMATICAL PROBLEMS IN ENGINEERING (2017)

Article Computer Science, Theory & Methods

Secure computation without computers

Paolo D'Arco et al.

THEORETICAL COMPUTER SCIENCE (2016)

Article Computer Science, Hardware & Architecture

Security and Privacy-Enhancing Multicloud Architectures

Jens-Matthias Bohli et al.

IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING (2013)