Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- research-articleMay 2013
Secure k-NN computation on encrypted cloud data without sharing key with query users
Cloud Computing '13: Proceedings of the 2013 international workshop on Security in cloud computingMay 2013, pp 55–60https://doi.org/10.1145/2484402.2484415In cloud computing, secure analysis on outsourced encrypted data is a significant topic. As a frequently used query for online applications, secure k-nearest neighbors (k-NN) computation on encrypted cloud data has received much attention, and several ...
- research-articleMay 2013
Hub: heterogeneous bucketization for database outsourcing
Cloud Computing '13: Proceedings of the 2013 international workshop on Security in cloud computingMay 2013, pp 47–54https://doi.org/10.1145/2484402.2484414Encrypting database before stored in cloud storage so far has been the most practical solution for preserving data privacy in an un-trusted cloud environment. This, however, makes the operation over database more complicated. Even for very simple ...