SecurekNNComputationonEncryptedDatabases 系统标签: encryptedsecurecomputationdatabasesedbmsdatabase SecurekNNComputationonEncryptedDatabasesW.K.WongTheUniversityofHongKongwkwong2@cs.hku.hkDavidW.CheungTheUniversityofHongKongdcheung@cs.hku.hkBenKaoTheUniversityofHongKongkao@cs.hku.hkNikosMamoulisTheUniversityofHongK...
Secure Outsourced kNN Data Classification over Encrypted Data Using Secure Chain Distance MatricesThe paper introduces the Secure kNN (SkNN) approach to data classification and querying. The approach is founded on the concept of Secure Chain Distance Matrices (SCDMs) whereby the classification and ...
The experiment results show that, compared with the existing approaches, the FHOPE scheme incurs less overhead on computation and communication. It is suitable for large batch complex SQL queries over encrypted data in cloud environment. 展开 ...
Wong WK, Cheung DWl, Kao B, Mamoulis N (2009) Secure kNN computation on encrypted databases. In: Proceedings of the ACM SIGMOD international conference on management of data. ACM, pp 139–152 Wu Z, Liang B, You L, Jian Z, Li J (2016a) High-dimension space projection-based biometric ...
Secure kNN searchRanked keyword searchKey-recovery attackWong et al. proposed a novel symmetric encryption scheme in which we can find thek-nearest neighbors from encrypted data and an encrypted query. Their scheme uses a pair of encryption functions that has an inner-product preserving property. ...
KNN CLASSIFICATION SCHEME BASED PRIVACY PRESERVING POLICY OVER SEMANTICALLY SECURE ENCRYPTED DATABASEData mining is used in variety of fields such as banking as well as medicine.Data mining not only used in scientific research but also in government agencies. Our ceter of research is to solve the ...
Databases need to be encrypted before being outsourced to the cloud so that they can be protected from adversaries. However, the existing kNN classification scheme over encrypted databases in the cloud suffers from high computation overhead. So we proposed a secure and efficient kNN class...
we propose an integrated deep hash algorithm to extract the high-level features of images. In the index encryption process, we use secure kNN to encrypt the index. Through experimental analysis and argumentation, the proposed privacy protection algorithm has a lower correlation coefficient and a bett...
Secure kNN searchRanked keyword searchKey-recovery attackWong et al. proposed a novel symmetric encryption scheme in which we can find the k-nearest neighbors from encrypted data and an encrypted query. Their scheme uses a pair of encryption functions that has an inner-product preserving property....
Databases need to be encrypted before being outsourced to the cloud so that they can be protected from adversaries. However, the existing k NN classification scheme over encrypted databases in the cloud suffers from high computation overhead. So we proposed a secure and efficient k NN ...