Secure k-nearest neighbor query over encrypted data in outsourced environments

Y Elmehdwi, BK Samanthula… - 2014 IEEE 30th …, 2014 - ieeexplore.ieee.org
For the past decade, query processing on relational data has been studied extensively, and
many theoretical and practical solutions to query processing have been proposed under …

Efficient verifiable public key encryption with keyword search based on KP-ABE

P Liu, J Wang, H Ma, H Nie - 2014 Ninth International …, 2014 - ieeexplore.ieee.org
As a very attractive cryptographic primitive, the public key encryption with keyword search
(PEKS) enables users to search on encrypted data, and hence is applicable to the setting of …

Privacy-preserving complex query evaluation over semantically secure encrypted data

BK Samanthula, W Jiang, E Bertino - … 7-11, 2014. Proceedings, Part I 19, 2014 - Springer
In the last decade, several techniques have been proposed to evaluate different types of
queries (eg, range and aggregate queries) over encrypted data in a privacy-preserving …

[PDF][PDF] 混合语义相似度计算优化模糊查询的智能信息检索算法

郭猛, 胡秀香, 邵国金 - 科学技术与工程, 2014 - stae.com.cn
摘# 要# 针对搜索引擎领域存在的因查询条件模糊而严重影响信息检索性能的问题,
提出了一种混合语义相似度优化模糊查询算法. 首先, 根据相似度计算概念提出了与其接近的新 …

Similarity of Private Keyword Search over Encrypted Document Collection

Y Elmehdwi, W Jiang, A Hurson - Advances in Computers, 2014 - Elsevier
Due to its cost-efficiency, flexibility, and offload of administrative overhead, cloud computing
has become a viable option for organizations to outsource their data and services. To protect …

BedTree を用いた検証可能なFuzzy データ検索手法の提案

梅澤猛, 大澤範高 - 第76 回全国大会講演論文集, 2014 - ipsj.ixsq.nii.ac.jp
論文抄録 クラウドサーバーは, 計算コストやネットワークの混雑, 一部の検索処理だけ実行して正しく
ない情報をユーザに返す可能性がある. それを防ぐために, トライ木を用いて検証可能な曖昧検索 …

[引用][C] A SURVEY ON SECURED SEARCHING TECHNIQUES FOR EFFECTIVE DATA UTILIZATION IN PUBLIC CLOUD.

MS DEVI, C Arun - Journal of Theoretical & Applied Information …, 2014