Secure knn computation on encrypted databases. In: SIGMOD, pp 139–152 (2009) Wu, S., Li, Q., Li, G., Yuan, D., Yuan, X., Wang, C.: ServeDB: Secure, verifiable, and efficient range queries on outsourced database. In: ICDE, pp 626–637 (2019) Xie, D., Li, F., Yao, ...
Privacy-preserving kNN query processing algorithmEncrypted databaseDatabase outsourcingCloud computingSince studies on privacy-preserving database outsourcing have been spotlighted in a cloud computing, databases need to be encrypted before being outsourced to the cloud. Therefore, a couple of privacy-...
around extending query terms in the plaintext. These techniques subsequently construct secure indexes utilizing the SecKnn algorithm [7]. Word embedding is a methodology for representing words in a vector format to retain their semantic context. Yang and Zhu [8] utilize word embeddings to introduce...
KNN CLASSIFICATION SCHEME BASED PRIVACY PRESERVING POLICY OVER SEMANTICALLY SECURE ENCRYPTED DATABASEData mining is used in variety of fields such as banking as well as medicine.Data mining not only used in scientific research but also in government agencies. Our ceter of research is to solve the ...
Although there exist a number of studies on kNN query processing over encrypted data, few of them can provide security and efficiency simultaneously. To this end, we present a secure and efficient kNN query (SEkQ) scheme. In this scheme, a new encryption method, namely, asymmetric scalar-...
On the other hand, Yao et al. pointed out that the pair of encryption functions is insecure when the attacker can get plaintext鈥揷iphertext pairs. To prevent this attack, some countermeasures are given in the applications, e.g., randomizing plaintexts before encrypted. In this paper, we...
Databases need to be encrypted before being outsourced to the cloud so that they can be protected from adversaries. However, the existing kNN classification scheme over encrypted databases in the cloud suffers from high computation overhead. So we proposed a secure and efficient kNN classi...
Secure kNN searchRanked keyword searchKey-recovery attackWong et al. proposed a novel symmetric encryption scheme in which we can find the k-nearest neighbors from encrypted data and an encrypted query. Their scheme uses a pair of encryption functions that has an inner-product preserving property....
Secure Outsourced kNN Data Classification over Encrypted Data Using Secure Chain Distance MatricesThe paper introduces the Secure kNN (SkNN) approach to data classification and querying. The approach is founded on the concept of Secure Chain Distance Matrices (SCDMs) whereby the classification and ...
2.2 Related work The typical kNN query processing schemes on encrypted databases are as follows. Wong et al. [18] processed a kNN query by devising an encryption scheme that sup- ports distance comparison on the encrypted data. However, the scheme is vulner- able to chosen-plaintext...