Lightweight edge‐based kNN privacy‐preserving classification scheme in cloud computing circumstance
暂无分享,去创建一个
Ming Xian | Jian Liu | Wei Wu | Huimei Wang | Yejin Tan | Ming Xian | Huimei Wang | Jian Liu | Wei Wu | Yejin Tan
[1] Oded Goldreich. General Cryptographic Protocols: The Very Basics , 2013, Secure Multi-Party Computation.
[2] Tsuyoshi Takagi,et al. Secure and controllable k-NN query over encrypted cloud data with key confidentiality , 2016, J. Parallel Distributed Comput..
[3] Oded Goldreich. Foundations of Cryptography: Encryption Schemes , 2004 .
[4] Hong Rong,et al. Fine-grained data access control with attribute-hiding policy for cloud-based IoT , 2019, Comput. Networks.
[5] Wei Wu,et al. Secure and Fine-Grained Self-Controlled Outsourced Data Deletion in Cloud-Based IoT , 2020, IEEE Internet of Things Journal.
[6] Keke Gai,et al. Privacy‐preserving smart data storage for financial industry in cloud computing , 2018, Concurr. Comput. Pract. Exp..
[7] Qing Yu,et al. A multi‐dimensional index for privacy‐preserving queries in cloud computing , 2019, Concurr. Comput. Pract. Exp..
[8] Xiaoqing Liu,et al. A privacy‐preserving density peak clustering algorithm in cloud computing , 2020, Concurr. Comput. Pract. Exp..
[9] Jian Liu,et al. Reliable and confidential cloud storage with efficient data forwarding functionality , 2016, IET Commun..
[10] Xuan Li,et al. Cloud-assisted privacy-preserving profile-matching scheme under multiple keys in mobile social network , 2018, Cluster Computing.
[11] ChenXiao,et al. Location privacy-preserving k nearest neighbor query under user's preference , 2016 .
[12] Dave Evans,et al. How the Next Evolution of the Internet Is Changing Everything , 2011 .
[13] Xiao Chen,et al. Location privacy-preserving k nearest neighbor query under user's preference , 2016, Knowl. Based Syst..
[14] Silvio Micali,et al. The Knowledge Complexity of Interactive Proof Systems , 1989, SIAM J. Comput..
[15] Wei Jiang,et al. Secure k-nearest neighbor query over encrypted data in outsourced environments , 2013, 2014 IEEE 30th International Conference on Data Engineering.
[16] Hong Rong,et al. Efficient k-Nearest Neighbor Classification Over Semantically Secure Hybrid Encrypted Cloud Database , 2018, IEEE Access.
[17] Bing Chen,et al. Data Security and Privacy-Preserving in Edge Computing Paradigm: Survey and Open Issues , 2018, IEEE Access.
[18] Weisong Shi,et al. Edge Computing: Vision and Challenges , 2016, IEEE Internet of Things Journal.
[19] Rajarshi Shahu,et al. K-Nearest Neighbor Classification over Semantically Secure Encrypted Relational Data , 2016 .
[20] Tsuyoshi Takagi,et al. Security Analysis of Collusion-Resistant Nearest Neighbor Query Scheme on Encrypted Cloud Data , 2014, IEICE Trans. Inf. Syst..
[21] Dong Hoon Lee,et al. Privacy Preserving k-Nearest Neighbor for Medical Diagnosis in e-Health Cloud , 2018, Journal of healthcare engineering.
[22] Silvio Micali,et al. How to play ANY mental game , 1987, STOC.
[23] Ali A. Ghorbani,et al. A Lightweight Privacy-Preserving Data Aggregation Scheme for Fog Computing-Enhanced IoT , 2017, IEEE Access.
[24] Bing Chen,et al. LPDA-EC: A Lightweight Privacy-Preserving Data Aggregation Scheme for Edge Computing , 2018, 2018 IEEE 15th International Conference on Mobile Ad Hoc and Sensor Systems (MASS).
[25] Pascal Paillier,et al. Public-Key Cryptosystems Based on Composite Degree Residuosity Classes , 1999, EUROCRYPT.
[26] Nikos Mamoulis,et al. Secure kNN computation on encrypted databases , 2009, SIGMOD Conference.
[27] Taher El Gamal. A public key cryptosystem and a signature scheme based on discrete logarithms , 1984, IEEE Trans. Inf. Theory.
[28] Yvo Desmedt,et al. Encryption Schemes , 1999, Algorithms and Theory of Computation Handbook.
[29] Nong Xiao,et al. Edge-Based Efficient Search over Encrypted Data Mobile Cloud Storage , 2018, Sensors.
[30] Silvio Micali,et al. The knowledge complexity of interactive proof-systems , 1985, STOC '85.
[31] Matt Blaze,et al. Divertible Protocols and Atomic Proxy Cryptography , 1998, EUROCRYPT.