2018
DOI: 10.14569/ijacsa.2018.090446
|View full text |Cite
|
Sign up to set email alerts
|

Outsourcing of Secure k-Nearest Neighbours Interpolation Method

Abstract: Abstract-Cloud computing becomes essential in these days for the enterprises. Most of the large companies are moving their services and data to the cloud servers which offer flexibility and efficiency. Data owner (DO) hires a cloud service provider (CSP) to store its data and carry out the related computation. The query owner (QO) sends a request which is crucial for its future plans to the CSP. The CSP computes all necessary calculations and returns the result back to the QO. Neither the data nor query owners… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
2
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
2
1
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(2 citation statements)
references
References 25 publications
0
2
0
Order By: Relevance
“…On the other hand, a homomorphic encryption scheme that allows the data to be processed in the encrypted form is well suited for this type of scenarios. Within this scope, a large number of secure schemes [9][10][11][12] have been proposed that employ an homomorphic encryption to support processing on the encrypted data.…”
Section: Introductionmentioning
confidence: 99%
“…On the other hand, a homomorphic encryption scheme that allows the data to be processed in the encrypted form is well suited for this type of scenarios. Within this scope, a large number of secure schemes [9][10][11][12] have been proposed that employ an homomorphic encryption to support processing on the encrypted data.…”
Section: Introductionmentioning
confidence: 99%
“…As shown in Fig. 3, the nearest neighbor interpolation 200 method [26], [27] combined with a convolutional layer is 201 applied to upsample the feature map after extracting deep 202 feature, and its size changes from H × W to 2H × 2W . 203 We utilized this upsampling operation twice to achieve a 204 4x upsampling effect.…”
mentioning
confidence: 99%