Trustworthy artificial intelligence: a review

D Kaur, S Uslu, KJ Rittichier, A Durresi - ACM computing surveys (CSUR …, 2022 - dl.acm.org
Artificial intelligence (AI) and algorithmic decision making are having a profound impact on
our daily lives. These systems are vastly used in different high-stakes applications like …

Security and privacy implications on database systems in big data era: A survey

GD Samaraweera, JM Chang - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
For over many decades, relational database model has been considered as the leading
model for data storage and management. However, as the Big Data explosion has …

Enabling efficient and geometric range query with access control over encrypted spatial data

G Xu, H Li, Y Dai, K Yang, X Lin - IEEE Transactions on …, 2018 - ieeexplore.ieee.org
As a basic query function, range query has been exploited in many scenarios such as SQL
retrieves, location-based services, and computational geometry. Meanwhile, with explosive …

Leakage-abuse attacks against order-revealing encryption

P Grubbs, K Sekniqi, V Bindschaedler… - … IEEE symposium on …, 2017 - ieeexplore.ieee.org
Order-preserving encryption and its generalization order-revealing encryption (OPE/ORE)
allow sorting, performing range queries, and filtering data-all while only having access to …

Improved reconstruction attacks on encrypted data using range query leakage

MS Lacharité, B Minaud… - 2018 IEEE Symposium on …, 2018 - ieeexplore.ieee.org
We analyse the security of database encryption schemes supporting range queries against
persistent adversaries. The bulk of our work applies to a generic setting, where the …

Order-revealing encryption: New constructions, applications, and lower bounds

K Lewi, DJ Wu - Proceedings of the 2016 ACM SIGSAC Conference on …, 2016 - dl.acm.org
In the last few years, there has been significant interest in developing methods to search
over encrypted data. In the case of range queries, a simple solution is to encrypt the contents …

Context-aware generative adversarial privacy

C Huang, P Kairouz, X Chen, L Sankar, R Rajagopal - Entropy, 2017 - mdpi.com
Preserving the utility of published datasets while simultaneously providing provable privacy
guarantees is a well-known challenge. On the one hand, context-free privacy solutions, such …

Practical order-revealing encryption with limited leakage

N Chenette, K Lewi, SA Weis, DJ Wu - Fast Software Encryption: 23rd …, 2016 - Springer
In an order-preserving encryption scheme, the encryption algorithm produces ciphertexts
that preserve the order of their plaintexts. Order-preserving encryption schemes have been …

Querying in internet of things with privacy preserving: Challenges, solutions and opportunities

H Ren, H Li, Y Dai, K Yang, X Lin - IEEE Network, 2018 - ieeexplore.ieee.org
IoT is envisioned as the next stage of the information revolution, enabling various daily
applications and providing better service by conducting a deep fusion with cloud and fog …

Enabling verifiable and dynamic ranked search over outsourced data

Q Liu, Y Tian, J Wu, T Peng… - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
Cloud computing as a promising computing paradigm is increasingly utilized as potential
hosts for users' massive dataset. Since the cloud service provider (CSP) is outside the users' …