Sciweavers

Share
42 search results - page 1 / 9
» Secure kNN computation on encrypted databases
Sort
View
SIGMOD
2009
ACM
197views Database» more  SIGMOD 2009»
9 years 10 months ago
Secure kNN computation on encrypted databases
Service providers like Google and Amazon are moving into the SaaS (Software as a Service) business. They turn their huge infrastructure into a cloud-computing environment and aggr...
Wai Kit Wong, David Wai-Lok Cheung, Ben Kao, Nikos...
ADC
2007
Springer
145views Database» more  ADC 2007»
9 years 4 months ago
The Privacy of k-NN Retrieval for Horizontal Partitioned Data -- New Methods and Applications
Recently, privacy issues have become important in clustering analysis, especially when data is horizontally partitioned over several parties. Associative queries are the core retr...
Artak Amirbekyan, Vladimir Estivill-Castro
BTW
2015
Springer
37views Database» more  BTW 2015»
3 years 5 months ago
Using different encryption schemes for secure deletion while supporting queries
: As more and more private and confidential data is stored in databases and in the wake of cloud computing services hosted by third parties, the privacyaware and secure handling of...
Maik Schott, Claus Vielhauer, Christian Krätz...
ICDE
2007
IEEE
164views Database» more  ICDE 2007»
9 years 4 months ago
Secure Mediation of Join Queries by Processing Ciphertexts
In a secure mediated information system, confidentiality is one of the main concerns when transmitting data from datasources to clients via a mediator. We present three approache...
Joachim Biskup, Christian Tsatedem, Lena Wiese
CCS
2015
ACM
3 years 5 months ago
Equivalence-based Security for Querying Encrypted Databases: Theory and Application to Privacy Policy Audits
To reduce costs, organizations may outsource data storage and data processing to third-party clouds. This raises confidentiality concerns, since the outsourced data may have sens...
Omar Chowdhury, Deepak Garg 0001, Limin Jia, Anupa...
books