User Behavior Clustering Scheme With Automatic Tagging Over Encrypted Data
نویسندگان
چکیده
منابع مشابه
A Verifiable Fuzzy Keyword Search Scheme Over Encrypted Data
As the Cloud Computing technology becomes mature, the need increases rapidly to store sensitive data securely on the cloud server. Since the cloud is not trusted, the data should be stored in an encrypted form at the server. An inherent problem is how to query the encrypted data efficiently. Recently, some searchable encryption schemes have been proposed in the literatures. Although the existin...
متن کاملA New Scheme for Range Queries over Encrypted Data
Cloud servers could provide secure services to data management for encrypted sensitive data, however, the difficulties of querying these data by data owners increase.To solve the problem,this paper proposes a new scheme for range queries over encrypted data. In particular, the indices and interval trapdoors of sensitive data are first created by using circle mapping. Then, these indices and int...
متن کاملEvaluating Predicates over Encrypted Data
Predicate encryption is a new encryption paradigm where the secret key owner can perform fine-grained access control over the encrypted data. In particular, the secret key owner can generate a capability corresponding to a query predicate (e.g., whether an encrypted email contains the keyword MEDICAL), and the capability allows one to evaluate the outcome of this predicate on the encrypted data...
متن کاملData Mining Over Encrypted Data on Cloud
Data Mining has wide applications in many areas such as medicine, scientific, banking, research and among government agencies. For the past decade, due to the rise of various privacy issues, many theoretical and practical solutions to the classification problem have been proposed under different security models. Classification is one of the commonly used tasks in data mining applications Howeve...
متن کاملMachine Learning Classification over Encrypted Data
Machine learning classification is used for numerous tasks nowadays, such as medical or genomics predictions, spam detection, face recognition, and financial predictions. Due to privacy concerns, in some of these applications, it is important that the data and the classifier remain confidential. In this work, we construct three major classification protocols that satisfy this privacy constraint...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IEEE Access
سال: 2019
ISSN: 2169-3536
DOI: 10.1109/access.2019.2956019