In this article, we propose a scheme, named QuickN, which can efficiently and securely enable nearest neighbor search over encrypted data on untrusted clouds. Specifically, we modify the search algorithm of nearest neighbors in tree structures (e.g., R-trees), such that the modified algorithm adapts to lightweight cryptographic primitives (e.g., Order-Preserving Encryption) without affecting the original faster-than-linear search complexity. Moreover, we propose an optimized algorithm on top of our modified search algorithm, where it can significantly save communication overheads of a client without introducing any additional information leakage. We devise an approximate algorithm to k-nearest neighbor search to improve search efficiency by...
Searching on remote encrypted data (commonly known as searchable en-cryption) has become an importan...
Nearest neighbor search is a fundamental building-block for a wide range of applications. A privacy-...
In mobile cloud computing, a fundamental application is to outsource the mobile data to external clo...
Abstract—In this paper, we investigate the secure nearest neighbor (SNN) problem, in which a client ...
For the past decade, query processing on relational data has been studied extensively, and many theo...
International audienceThis paper presents a moderately secure but very efficient approximate nearest...
Data mining is frequently obstructed by privacy concerns. In many cases, data is distributed and br...
We study the problem of privacy-preserving approximate kNN search in an outsourced environment — the...
Several schemes for k-nearest neighbors (k-NN) query over encrypted data in cloud have been proposed...
Abstract — In recent years, due to the appealing features of cloud computing, large amount of data h...
Searching on remote encrypted data (commonly known as searchable encryption) has become an important...
Aim: During the last decade, various type of cloud services have encouraged individuals and enterpri...
A Secure and Effective Multi-keyword Ranked Search Scheme on Encrypted Cloud Data. Cloud computing i...
Focusing on the diversified demands of location privacy in mobile social networks (MSNs), we propose...
Cloud computing promises users massive scale outsourced data storage services with much lower costs ...
Searching on remote encrypted data (commonly known as searchable en-cryption) has become an importan...
Nearest neighbor search is a fundamental building-block for a wide range of applications. A privacy-...
In mobile cloud computing, a fundamental application is to outsource the mobile data to external clo...
Abstract—In this paper, we investigate the secure nearest neighbor (SNN) problem, in which a client ...
For the past decade, query processing on relational data has been studied extensively, and many theo...
International audienceThis paper presents a moderately secure but very efficient approximate nearest...
Data mining is frequently obstructed by privacy concerns. In many cases, data is distributed and br...
We study the problem of privacy-preserving approximate kNN search in an outsourced environment — the...
Several schemes for k-nearest neighbors (k-NN) query over encrypted data in cloud have been proposed...
Abstract — In recent years, due to the appealing features of cloud computing, large amount of data h...
Searching on remote encrypted data (commonly known as searchable encryption) has become an important...
Aim: During the last decade, various type of cloud services have encouraged individuals and enterpri...
A Secure and Effective Multi-keyword Ranked Search Scheme on Encrypted Cloud Data. Cloud computing i...
Focusing on the diversified demands of location privacy in mobile social networks (MSNs), we propose...
Cloud computing promises users massive scale outsourced data storage services with much lower costs ...
Searching on remote encrypted data (commonly known as searchable en-cryption) has become an importan...
Nearest neighbor search is a fundamental building-block for a wide range of applications. A privacy-...
In mobile cloud computing, a fundamental application is to outsource the mobile data to external clo...