[PDF][PDF] 云计算环境安全综述

张玉清, 王晓菲, 刘雪峰, 刘玲 - 软件学报, 2016 - jos.org.cn
伴随云计算技术的飞速发展, 其所面临的安全问题日益凸显, 在工业界和学术界引起了广泛的
关注. 传统的云基础架构中存在较高安全风险, 攻击者对虚拟机的非法入侵破坏了云服务或资源 …

Toward highly secure yet efficient KNN classification scheme on outsourced cloud data

L Liu, J Su, X Liu, R Chen, K Huang… - IEEE Internet of …, 2019 - ieeexplore.ieee.org
Nowadays, outsourcing data and machine learning tasks, eg,-nearest neighbor (KNN)
classification, to clouds has become a scalable and cost-effective way for large scale data …

Secure and controllable k-NN query over encrypted cloud data with key confidentiality

Y Zhu, Z Huang, T Takagi - Journal of Parallel and Distributed Computing, 2016 - Elsevier
To enjoy the advantages of cloud service while preserving security and privacy, huge data
are increasingly outsourced to cloud in encrypted form. Unfortunately, most conventional …

Efficient k-NN query over encrypted data in cloud with limited key-disclosure and offline data owner

L Zhou, Y Zhu, A Castiglione - Computers & Security, 2017 - Elsevier
Several schemes for k-nearest neighbors (k-NN) query over encrypted data in cloud have
been proposed recently. Nevertheless, existing schemes either suppose each query user is …

Achieving efficient and privacy-preserving exact set similarity search over encrypted data

Y Zheng, R Lu, Y Guan, J Shao… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
Set similarity search, aiming to search the similar sets to a query set, has wide application in
today's recommendation services. Meanwhile, the rapid advance in cloud technique has …

Privacy preserving k-nearest neighbor classification over encrypted database in outsourced cloud environments

W Wu, U Parampalli, J Liu, M Xian - World Wide Web, 2019 - Springer
To utilize the cost-saving advantages of the cloud computing paradigm, individuals and
enterprises increasingly resort to outsource their databases and data operations to cloud …

SecKNN: FSS-Based Secure Multi-Party KNN Classification Under General Distance Functions

Z Li, H Wang, S Zhang, W Zhang… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
As a practical machine learning method, the K-nearest neighbors (KNN) classification has
received widespread attention. The achievement of the KNN classification relies heavily on …

Efficient k-nearest neighbor classification over semantically secure hybrid encrypted cloud database

W Wu, J Liu, H Rong, H Wang, M Xian - IEEE Access, 2018 - ieeexplore.ieee.org
Nowadays, individuals and companies increasingly tend to outsource their databases and
further data operations to cloud service provides. However, utilizing the cost-saving …

Cancelable permutation-based indexing for secure and efficient biometric identification

T Murakami, R Fujita, T Ohki, Y Kaga, M Fujio… - IEEE …, 2019 - ieeexplore.ieee.org
Cancelable biometric schemes have been widely studied to protect templates in biometric
authentication over networks. These schemes transform biometric features and perform …

A privacy-preserving framework for outsourcing location-based services to the cloud

X Zhu, E Ayday, R Vitenberg - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
Thanks to the popularity of mobile devices numerous location-based services (LBS) have
emerged. While several privacy-preserving solutions for LBS have been proposed, most of …