2014 IEEE 30th International Conference on Data Engineering 2014
DOI: 10.1109/icde.2014.6816687
|View full text |Cite
|
Sign up to set email alerts
|

Private search on key-value stores with hierarchical indexes

Abstract: Query processing that preserves both the query privacy at the client and the data privacy at the server is a new research problem. It has many practical applications, especially when the queries are about the sensitive attributes of records. However, most existing studies, including those originating from data outsourcing, address the data privacy and query privacy separately. Although secure multiparty computation (SMC) is a suitable computing paradigm for this problem, it has significant computation and comm… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
3
0

Year Published

2015
2015
2024
2024

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 17 publications
(3 citation statements)
references
References 35 publications
0
3
0
Order By: Relevance
“…Secure protocols against semi-honest adversaries, however, are not only useful in practice but also the foundation of designing secure protocols against malicious adversaries. Therefore, following the the work done in [13], [18], and [24], we also adopt the semi-honest adversaries model in this paper.…”
Section: Approachmentioning
confidence: 99%
“…Secure protocols against semi-honest adversaries, however, are not only useful in practice but also the foundation of designing secure protocols against malicious adversaries. Therefore, following the the work done in [13], [18], and [24], we also adopt the semi-honest adversaries model in this paper.…”
Section: Approachmentioning
confidence: 99%
“…During the past few years, for the purpose of handling the aforementioned problem, numerous approaches regarding location privacy protection have been proposed and are gradually showing a personalized trend with the increase of user demands [6]. Although those existing methods have performed very well, there exist some unavoidable limitations.…”
Section: Introductionmentioning
confidence: 99%
“…On the contrary, protocols secure against the semi-honest attack model are not only applicable in real-world scenarios but also serve as a foundation for designing protocols secure against malicious attack models. Hence, in this paper, we conduct research considering the semi-honest attack model as in previous studies [17,[28][29][30]. Definition 1.…”
mentioning
confidence: 99%