Privacy-preserving big data analytics a comprehensive survey

HY Tran, J Hu - Journal of Parallel and Distributed Computing, 2019 - Elsevier
In this paper, we present a comprehensive survey of privacy-preserving big data analytics.
We introduce well-designed taxonomies which offer both systematic views and a detailed …

Enabling efficient and geometric range query with access control over encrypted spatial data

G Xu, H Li, Y Dai, K Yang, X Lin - IEEE Transactions on …, 2018 - ieeexplore.ieee.org
As a basic query function, range query has been exploited in many scenarios such as SQL
retrieves, location-based services, and computational geometry. Meanwhile, with explosive …

Comprehensive Survey on Privacy-Preserving Spatial Data Query in Transportation Systems

Y Miao, Y Yang, X Li, KKR Choo… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
With the rapid development of Intelligent Transportation System (ITS), a large number of
spatial data are generated in ITS. Although outsourcing spatial data to the cloud server can …

Querying in internet of things with privacy preserving: Challenges, solutions and opportunities

H Ren, H Li, Y Dai, K Yang, X Lin - IEEE Network, 2018 - ieeexplore.ieee.org
IoT is envisioned as the next stage of the information revolution, enabling various daily
applications and providing better service by conducting a deep fusion with cloud and fog …

Privacy-preserving keyword similarity search over encrypted spatial data in cloud computing

F Song, Z Qin, L Xue, J Zhang, X Lin… - IEEE Internet of Things …, 2021 - ieeexplore.ieee.org
With the proliferation of cloud computing, data owners can outsource the spatial data from
the Internet of Things devices to a cloud server to enjoy the pay-as-you-go storage …

Data recovery on encrypted databases with k-nearest neighbor query leakage

EM Kornaropoulos, C Papamanthou… - … IEEE Symposium on …, 2019 - ieeexplore.ieee.org
Recent works by Kellaris et al.(CCS'16) and Lacharite et al.(SP'18) demonstrated attacks of
data recovery for encrypted databases that support rich queries such as range queries. In …

PassBio: Privacy-preserving user-centric biometric authentication

K Zhou, J Ren - IEEE Transactions on Information Forensics …, 2018 - ieeexplore.ieee.org
The proliferation of online biometric authentication has necessitated security requirements of
biometric templates. The existing secure biometric authentication schemes feature a server …

SVkNN: Efficient secure and verifiable k-nearest neighbor query on the cloud platform

N Cui, X Yang, B Wang, J Li… - 2020 IEEE 36th …, 2020 - ieeexplore.ieee.org
With the boom in cloud computing, data outsourcing in location-based services is
proliferating and has attracted increasing interest from research communities and …

Toward highly secure yet efficient KNN classification scheme on outsourced cloud data

L Liu, J Su, X Liu, R Chen, K Huang… - IEEE Internet of …, 2019 - ieeexplore.ieee.org
Nowadays, outsourcing data and machine learning tasks, eg,-nearest neighbor (KNN)
classification, to clouds has become a scalable and cost-effective way for large scale data …

Hybrid keyword-field search with efficient key management for industrial internet of things

Y Miao, X Liu, RH Deng, H Wu, H Li… - IEEE Transactions on …, 2018 - ieeexplore.ieee.org
Equipped with the emerging cloud computing, clients prefer to outsource the increasing
number of Industrial Internet of things (IIoT) data to cloud to reduce the high storage and …