Similarity search for encrypted images in secure cloud computing

Y Li, J Ma, Y Miao, Y Wang, X Liu… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
With the emergence of intelligent terminals, the Content-Based Image Retrieval (CBIR)
technique has attracted much attention from many areas (ie, cloud computing, social …

CREDO: Efficient and privacy-preserving multi-level medical pre-diagnosis based on ML-kNN

D Zhu, H Zhu, X Liu, H Li, F Wang, H Li, D Feng - Information Sciences, 2020 - Elsevier
With the promotion of online medical pre-diagnosis system, more and more research has
begun to pay attention to the issue of privacy, and existing privacy-preserving schemes are …

Secure range query over encrypted data in outsourced environments

N Cui, X Yang, B Wang, J Geng, J Li - World Wide Web, 2020 - Springer
With the rapid development of cloud computing paradigm, data owners have the opportunity
to outsource their databases and management tasks to the cloud. Due to privacy concerns, it …

Fast and secure knn query processing in cloud computing

X Lei, GH Tu, AX Liu, T Xie - 2020 IEEE Conference on …, 2020 - ieeexplore.ieee.org
Advances in sensing and tracking technology lead to the proliferation of location-based
services. Location service providers (LSPs) often resort to commercial public clouds to store …

QuickN: Practical and secure nearest neighbor search on encrypted large-scale data

B Wang, Y Hou, M Li - IEEE Transactions on Cloud Computing, 2020 - ieeexplore.ieee.org
In this article, we propose a scheme, named QuickN, which can efficiently and securely
enable nearest neighbor search over encrypted data on untrusted clouds. Specifically, we …

: privacy-preserving data outsourcing framework with differential privacy

GG Dagher, BCM Fung, N Mohammed… - Knowledge and Information …, 2020 - Springer
Abstract Data-as-a-service (DaaS) is a cloud computing service that emerged as a viable
option to businesses and individuals for outsourcing and sharing their collected data with …

Resolving a common vulnerability in secret sharing scheme–based data outsourcing schemes

R Ghasemi - Concurrency and Computation: Practice and …, 2020 - Wiley Online Library
Every day, the amount of generated data from different resources are increasing significantly
and posing new serious challenges in terms of data storage and maintaining. As a solution …

A secure location-based alert system with tunable privacy-performance trade-off

G Ghinita, K Nguyen, M Maruseac, C Shahabi - GeoInformatica, 2020 - Springer
Monitoring location updates from mobile users has important applications in many areas,
ranging from public health (eg, COVID-19 contact tracing) and national security to social …

Adaptive secure nearest neighbor query processing over encrypted data

R Li, AX Liu, H Xu, Y Liu, H Yuan - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
Nearest neighbor query processing is a fundamental problem that arises in many fields such
as spatial databases and machine learning. This article aims to address the Secure Nearest …

Spatial dynamic searchable encryption with forward security

X Wang, J Ma, X Liu, Y Miao, D Zhu - … 24–27, 2020, Proceedings, Part II …, 2020 - Springer
Nowadays, spatial search services bring unprecedented convenience in people's daily life
(eg, location-based services, social networking) and are becoming more and more popular …