Cheng et al., 2015 - Google Patents
Enabling secure and efficient kNN query processing over encrypted spatial data in the cloudCheng et al., 2015
- Document ID
- 7568787549452854649
- Author
- Cheng X
- Su S
- Teng Y
- Xiao K
- Publication year
- Publication venue
- Security and Communication Networks
External Links
Snippet
With rapid advances in wireless communication, mobile devices and positioning technologies, location‐based services (LBS) have recently emerged as one of today's most important applications in mobile networks. To obtain great flexibility and cost savings, LBS …
- 238000004458 analytical method 0 abstract description 9
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1425—Traffic logging, e.g. anomaly detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1416—Event detection, e.g. attack signature detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/1458—Denial of Service
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/80—Wireless
- H04L2209/805—Lightweight hardware, e.g. radio-frequency identification [RFID] or sensor
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3271—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using challenge-response
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W12/00—Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity
- H04W12/06—Authentication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/16—Implementing security features at a particular protocol layer
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Henzinger et al. | Private web search with Tiptoe | |
Song et al. | A privacy-preserved full-text retrieval algorithm over encrypted data for cloud storage applications | |
Zhu et al. | A privacy-preserving framework for outsourcing location-based services to the cloud | |
Su et al. | Privacy-preserving top-k spatial keyword queries in untrusted cloud environments | |
Chen et al. | EliMFS: achieving efficient, leakage-resilient, and multi-keyword fuzzy search on encrypted cloud data | |
Sun et al. | Privacy-preserving keyword search over encrypted data in cloud computing | |
Chen et al. | DMRS: an efficient dynamic multi-keyword ranked search over encrypted cloud data | |
Negi et al. | Pystin: Enabling Secure LBS in Smart Cities With Privacy-Preserving Top-$ k $ Spatial–Textual Query | |
Wodi et al. | Fast privacy-preserving keyword search on encrypted outsourced data | |
Zhu et al. | Improved collusion‐resisting secure nearest neighbor query over encrypted data in cloud | |
Xiangyang et al. | MUSE: an efficient and accurate verifiable privacy‐preserving multikeyword text search over encrypted cloud data | |
Singh et al. | Privacy-preserving multi-keyword hybrid search over encrypted data in cloud | |
Guo et al. | A provably secure and efficient range query scheme for outsourced encrypted uncertain data from cloud-based Internet of Things systems | |
Yang et al. | TRQED: Secure and fast tree-based private range queries over encrypted cloud | |
Yu et al. | Privacy-preserving multikeyword similarity search over outsourced cloud data | |
Zhang et al. | Privacy‐assured substructure similarity query over encrypted graph‐structured data in cloud | |
Song et al. | Achieving efficient and privacy-preserving location-based task recommendation in spatial crowdsourcing | |
CN117951730A (en) | Cloud security searchable encryption method based on hash index | |
Chen et al. | One-time, oblivious, and unlinkable query processing over encrypted data on cloud | |
Cheng et al. | Enabling secure and efficient kNN query processing over encrypted spatial data in the cloud | |
Zhou et al. | EVSS: An efficient verifiable search scheme over encrypted cloud data | |
Tzouramanis et al. | Secure reverse k-nearest neighbours search over encrypted multi-dimensional databases | |
Hamsanandhini et al. | IoT data encryption and phrase search-based efficient processing using a Fully Homomorphic-based SE (FHSE) scheme | |
Wang et al. | Search ranges efficiently and compatibly as keywords over encrypted data | |
Zhang et al. | Tree‐Based Public Key Encryption with Conjunctive Keyword Search |