STOC '87 Proceedings of the nineteenth annual ACM symposium on Theory of computing
Non-Interactive and Information-Theoretic Secure Verifiable Secret Sharing
CRYPTO '91 Proceedings of the 11th Annual International Cryptology Conference on Advances in Cryptology
Foundations of Cryptography: Volume 2, Basic Applications
Foundations of Cryptography: Volume 2, Basic Applications
Privately computing a distributed k-nn classifier
PKDD '04 Proceedings of the 8th European Conference on Principles and Practice of Knowledge Discovery in Databases
Privacy Preserving Data Classification with Rotation Perturbation
ICDM '05 Proceedings of the Fifth IEEE International Conference on Data Mining
Mining multiple private databases using a kNN classifier
Proceedings of the 2007 ACM symposium on Applied computing
Privacy Preserving Nearest Neighbor Search
ICDMW '06 Proceedings of the Sixth IEEE International Conference on Data Mining - Workshops
Privacy-Preserving k-NN for Small and Large Data Sets
ICDMW '07 Proceedings of the Seventh IEEE International Conference on Data Mining Workshops
Protocols for secure computations
SFCS '82 Proceedings of the 23rd Annual Symposium on Foundations of Computer Science
How to generate and exchange secrets
SFCS '86 Proceedings of the 27th Annual Symposium on Foundations of Computer Science
Privacy-Preserving Data Mining: Models and Algorithms
Privacy-Preserving Data Mining: Models and Algorithms
Efficient Privacy-Preserving k-Nearest Neighbor Search
ICDCS '08 Proceedings of the 2008 The 28th International Conference on Distributed Computing Systems
Secure kNN computation on encrypted databases
Proceedings of the 2009 ACM SIGMOD International Conference on Management of data
Privacy preserving group nearest neighbor queries
Proceedings of the 13th International Conference on Extending Database Technology
A cryptography based privacy preserving solution to mine cloud data
Proceedings of the Third Annual ACM Bangalore Conference
Public-key cryptosystems based on composite degree residuosity classes
EUROCRYPT'99 Proceedings of the 17th international conference on Theory and application of cryptographic techniques
Secure Ranked Keyword Search over Encrypted Cloud Data
ICDCS '10 Proceedings of the 2010 IEEE 30th International Conference on Distributed Computing Systems
FC'10 Proceedings of the 14th international conference on Financial cryptograpy and data security
Nearest neighbor search with strong location privacy
Proceedings of the VLDB Endowment
Processing private queries over untrusted data cloud through privacy homomorphism
ICDE '11 Proceedings of the 2011 IEEE 27th International Conference on Data Engineering
Privacy-Preserving Query over Encrypted Graph-Structured Data in Cloud Computing
ICDCS '11 Proceedings of the 2011 31st International Conference on Distributed Computing Systems
An attacker's view of distance preserving maps for privacy preserving data mining
PKDD'06 Proceedings of the 10th European conference on Principle and Practice of Knowledge Discovery in Databases
On private scalar product computation for privacy-preserving data mining
ICISC'04 Proceedings of the 7th international conference on Information Security and Cryptology
TCC'06 Proceedings of the Third conference on Theory of Cryptography
Secure multidimensional range queries over outsourced data
The VLDB Journal — The International Journal on Very Large Data Bases
Toward Privacy-Assured Cloud Data Services with Flexible Search Functionalities
ICDCSW '12 Proceedings of the 2012 32nd International Conference on Distributed Computing Systems Workshops
Enabling Secure and Efficient Ranked Keyword Search over Outsourced Cloud Data
IEEE Transactions on Parallel and Distributed Systems
Secure nearest neighbor revisited
ICDE '13 Proceedings of the 2013 IEEE International Conference on Data Engineering (ICDE 2013)
Building Confidential and Efficient Query Services in the Cloud with RASP Data Perturbation
IEEE Transactions on Knowledge and Data Engineering
Hi-index | 0.00 |
In cloud computing, secure analysis on outsourced encrypted data is a significant topic. As a frequently used query for online applications, secure k-nearest neighbours k-NN computation on encrypted cloud data has received much attention, and several solutions for it have been put forward. However, most existing schemes assume the query users are fully trusted and all query users know the entire key which is used to encrypt and decrypt data owner's outsourced database. It is constitutionally not feasible in lots of real-world applications. In this paper, we propose a novel secure and practical scheme for preserving data privacy and supporting k-NN query on encrypted cloud data. In the new approach, only limited information about the key of data owner is disclosed to query users, and the data privacy can be protected even when query users leak their knowledge about the key to adversary. Theoretical analysis and experiment results confirm the security and practicality of our scheme.