과제정보
연구 과제번호 : 대규모 트랜잭션 처리와 실시간 복합 분석을 통합한 일체형 엔지니어링 기술 개발
연구 과제 주관 기관 : 한국연구재단, 정보통신기술진흥센터
참고문헌
- A. Gutscher, "Coordinate transformation - a solution for the privacy problem of location based services?," Proc. of the 20th IPDPS, pp. 354, 2006.
- W. K. Wong, D. W. Cheung, B. Kao, and N. Mamoulis, "Secure knn computation on encrypted databases," Proc. of the SIGMOD, pp. 139-152, 2009.
- M. L. Yiu, G. Ghinita, C. S. Jensen and P. Kalnis, "Enabling Search Services on Outsourced Private Spatial Data," The VLDB Journal, Vol. 19, No. 3, pp 363-384, Oct. 2010. https://doi.org/10.1007/s00778-009-0169-7
- A. Boldyreva, N. Chenette, and A. O'Neill, "Orderpreserving encryption revisited: Improved security analysis and alternative solutions," CRYPTO, LNCS, Vol. 6841, pp. 578-595, Aug. 2011.
- H. Kim, S. Hong, and J. Chang, "Hilbert curvebased cryptographic transformation scheme for spatial query processing on outsourced private data," Data & Knowledge Engineering, Vol. 104, pp. 32-44, Jul. 2015.
- P. Paillier, "Public-key cryptosystems based on composite degree residuosity classes," EUROCRYPT, LNCS, Vol. 1592, pp. 223-238, Apr. 1999.
- J. Domingo-Ferrer, "A provably secure additive and multiplicative privacy homomorphism," ISC, LNCS, Vol. 2433, pp. 471-483, Sep. 2002.
- D. Boneh and B. Waters, "Conjunctive, Subset, and Range Queries on Encrypted Data," Theory of cryptography, LNCS, Vol. 4392, pp. 535-554, Feb. 2007.
- A. Boldyreva, N. Chenette, Y. Lee, and A. O'Neill, "Order-preserving symmetric encryption," EUROCRYPT, LNCS, Vol. 5479, pp. 224-241, Apr. 2009.
- H. Hu, J. Xu, C. Ren, and B. Choi, "Processing private queries over untrusted data cloud through privacy homomorphism," Proc. of the 27th ICDE, pp. 601-612, 2011.
- B. Wang, Y. Hou, M. Li, H. Wang, and H. Li, "Maple: scalable multi-dimensional range search over encrypted cloud data with tree-based index," Proc. of the 9th ACM symposium on Information, computer and communications security, pp. 111-122, 2014.
- Y. Elmehdwi, B. K. Samanthula, and W. Jiang, "Secure k-nearest neighbor query over encrypted data in outsourced environments," Proc. of the 30th ICDE, pp. 664-675, 2014.
- P. Wang and C. V. Ravishankar, "Secure and efficient range queries on outsourced databases using R-trees," Proc. of the 29th ICDE, pp. 314-325, 2013.
- M. Burkhart and X. Dimitropoulos, "Fast privacypreserving top-k queries using secret sharing," Proc. of the 19th ICCCN, pp. 1-7, 2010.
- B. Hore, S. Mehrotra, M. Canim, and M. Kantarcioglu, "Secure multidimensional range queries over outsourced data," The VLDB Journal, Vol. 21, No. 3, pp. 333-358, Jun. 2012. https://doi.org/10.1007/s00778-011-0245-7
- J. Vaidya, and C. W. Clifton, "Privacy-preserving kth element score over vertically partitioned data," TKDE, IEEE, Vol. 21, No. 2, pp. 253-258, Feb. 2009.
- Y. Zhu, R. Xu, and T. Takagi, "Secure k-nn computation on encrypted cloud data without sharing key with query users," Proc. of the 2013 international workshop on Security in Cloud Computing, pp. 55-60. 2013.
- A. C. Yao, "How to Generate and Exchange Secrets," Proc. of the 27th IEEE Symposium on Foundations of Computer Science, pp. 162-167, 1986.
- Y. Lindell and B. Pinkas, "A proof of security of yao's protocol for two party computation," Journal of Cryptology, Vol. 22, No. 2, pp. 161-188, Apr. 2009. https://doi.org/10.1007/s00145-008-9036-8
- M. O. Rabin, "How to Exchange Secrets with Oblivious Transfer," Technical Report-81, Harvard University, 1981.
- C. Hazay and Y. Lindell, "Efficient Secure Two- Party Protocols: Techniques and Constructions," Information Security and Cryptography, Springer, 2010.
- A. Liu, K. Zhengy, L. Liz, G. Liu, L. Zhao, and X. Zhou, "Efficient Secure Similarity Computation on Encrypted Trajectory Data," Proc. of the 31st ICDE, pp. 66-77, 2015.
- B. K. Samanthula, Y. Elmehdwi, and W. Jiang, "k-nearest neighbor classification over semantically secure encrypted relational data," TKDE, IEEE, Vol. 27, No. 5, pp. 1261-1273, May. 2015.
- O. Goldreich, "Foundations of Cryptography: Volume 2, Basic Applications," Cambridge university press, Vol. 2, 2009.