2011 IEEE 27th International Conference on Data Engineering 2011
DOI: 10.1109/icde.2011.5767862
|View full text |Cite
|
Sign up to set email alerts
|

Processing private queries over untrusted data cloud through privacy homomorphism

Abstract: Abstract-Query processing that preserves both the data privacy of the owner and the query privacy of the client is a new research problem. It shows increasing importance as cloud computing drives more businesses to outsource their data and querying services. However, most existing studies, including those on data outsourcing, address the data privacy and query privacy separately and cannot be applied to this problem. In this paper, we propose a holistic and efficient solution that comprises a secure traversal … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
120
0

Year Published

2012
2012
2022
2022

Publication Types

Select...
6
1
1

Relationship

1
7

Authors

Journals

citations
Cited by 177 publications
(120 citation statements)
references
References 29 publications
0
120
0
Order By: Relevance
“…For example, N1's MBB overlaps the lower-left 16 cells, so map(N1.mbb) = [0, 15]. The query Q" is also mapped to a value range, which is [4,11] in this example. With these ranges, the boundary verifications of N2 and N3 can be carried out on their 1D mapped values, instead of their 2D MBBs.…”
Section: Linear Ordering and Embeddingmentioning
confidence: 99%
See 2 more Smart Citations
“…For example, N1's MBB overlaps the lower-left 16 cells, so map(N1.mbb) = [0, 15]. The query Q" is also mapped to a value range, which is [4,11] in this example. With these ranges, the boundary verifications of N2 and N3 can be carried out on their 1D mapped values, instead of their 2D MBBs.…”
Section: Linear Ordering and Embeddingmentioning
confidence: 99%
“…As for location privacy, the literature of mobile computing and spatial databases extensively investigates this problem in various research domains, including query processing [12,1,8,6,23,20,11], message communication [7,25], and location data publishing [24,10]. In most works, location cloaking has been the predominant technique of privacy protection.…”
Section: Background and Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…There are two methods for protecting location or point of interest in the specific area of user request for location tagged item. The main goal here is apply the requesting (query), the clients to extract their near point of interest with the confidentiality of user location the first related work is to implementation using Cloaking regions [8,9], but the majority of the solutions using the relating anonymity method and this not that much protective outliers [3,4,5]. The second approach related to proposed work is to use private information retrieval (P.I.R) [6,7].…”
Section: Related Workmentioning
confidence: 99%
“…The goal of cloud computing is to provide high performance computing or super computing power with the cloud computing technologies, large pool of resources can be connected using public or private network. Cloud is maintaining huge amount of resources hence security and privacy are two main concepts which is to be preserved [15]. There are three different types of cloud computing.…”
Section: Introductionmentioning
confidence: 99%