Secure K-NN Query on Encrypted Cloud Data with Multiple Keys
نویسندگان
چکیده
منابع مشابه
Secure k-NN query on encrypted cloud database without key-sharing
In cloud computing, secure analysis on outsourced encrypted data is a significant topic. As a frequently used query for online applications, secure k-nearest neighbours (k-NN) computation on encrypted cloud data has received much attention, and several solutions for it have been put forward. However, most existing schemes assume the query users are fully trusted and all query users know the ent...
متن کاملSecure Encrypted Relational Data with using K-Nn Classification
With the recent quality of cloud computing, users currently have the chance to source their information, in encrypted kind, still because the data processing tasks to the cloud. Since the info on the cloud is in encrypted kind, existing privacy-preserving classification techniques aren't applicable. During this paper, we tend to target resolution the classification drawback over encrypted infor...
متن کاملPrivate Key based query on encrypted data
Nowadays, users of information systems have inclination to use a central server to decrease data transferring and maintenance costs. Since such a system is not so trustworthy, users' data usually upkeeps encrypted. However, encryption is not a nostrum for security problems and cannot guarantee the data security. In other words, there are some techniques that can endanger security of encrypted d...
متن کاملSecure Count Query on Encrypted Genomic Data
Human genomic information can yield more effective healthcare by guiding medical decisions. Therefore, genomics research is gaining popularity as it can identify potential correlations between a disease and a certain gene, which improves the safety and efficacy of drug treatment and can also develop more effective prevention strategies [1]. To reduce the sampling error and to increase the stati...
متن کاملDes Secured K-nn Query over Secure Data in Clouds
Protecting databases or data contents from the web world environment is a tough task for a company. Because every Company/ Financial Institute/ Hospital was hiding their customers or end users list secretly and will not open for all. But now Tom’s gang (Hackers) made this possible and tries stealing the data and major portion. In these conditions securing the data outsourcing area such as web h...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Journal of Physics: Conference Series
سال: 2021
ISSN: 1742-6588,1742-6596
DOI: 10.1088/1742-6596/1770/1/012034