KNN queryAccess controlInner-productHomomorphic encryptionWith the increased data volume, data query service outsourcing to cloud servers is widely used. However, enabling authorized users to access confidential
Secure knn computation on encrypted databases. In: SIGMOD, pp 139–152 (2009) Wu, S., Li, Q., Li, G., Yuan, D., Yuan, X., Wang, C.: ServeDB: Secure, verifiable, and efficient range queries on outsourced database. In: ICDE, pp 626–637 (2019) Xie, D., Li, F., Yao, ...
around extending query terms in the plaintext. These techniques subsequently construct secure indexes utilizing the SecKnn algorithm [7]. Word embedding is a methodology for representing words in a vector format to retain their semantic context. Yang and Zhu [8] utilize word embeddings to introduce...
The problem of this scheme lies in the heavy computing load and lack of support to encrypted datasets under multiple keys. Liu et al. [27] constructed a secure KNN multilabel data classification scheme based on Paillier cryptosystem. 1.2.3. Multikey Clustering Gheid and Challal [28] presented...
KNN CLASSIFICATION SCHEME BASED PRIVACY PRESERVING POLICY OVER SEMANTICALLY SECURE ENCRYPTED DATABASEData mining is used in variety of fields such as banking as well as medicine.Data mining not only used in scientific research but also in government agencies. Our ceter of research is to solve the ...
Secure kNN searchRanked keyword searchKey-recovery attackWong et al. proposed a novel symmetric encryption scheme in which we can find the k-nearest neighbors from encrypted data and an encrypted query. Their scheme uses a pair of encryption functions that has an inner-product preserving property....
On the other hand, Yao et al. pointed out that the pair of encryption functions is insecure when the attacker can get plaintext鈥揷iphertext pairs. To prevent this attack, some countermeasures are given in the applications, e.g., randomizing plaintexts before encrypte...
Databases need to be encrypted before being outsourced to the cloud so that they can be protected from adversaries. However, the existing kNN classification scheme over encrypted databases in the cloud suffers from high computation overhead. So we proposed a secure and efficient kNN classif...
Privacy-preserving kNN query processing algorithmEncrypted databaseDatabase outsourcingCloud computingSince studies on privacy-preserving database outsourcing have been spotlighted in a cloud computing, databases need to be encrypted before being outsourced to the cloud. Therefore, a couple of privacy-...
Secure Outsourced kNN Data Classification over Encrypted Data Using Secure Chain Distance MatricesThe paper introduces the Secure kNN (SkNN) approach to data classification and querying. The approach is founded on the concept of Secure Chain Distance Matrices (SCDMs) whereby the classification and ...