[go: up one dir, main page]

Cheng et al., 2015 - Google Patents

Enabling secure and efficient kNN query processing over encrypted spatial data in the cloud

Cheng et al., 2015

Document ID
7568787549452854649
Author
Cheng X
Su S
Teng Y
Xiao K
Publication year
Publication venue
Security and Communication Networks

External Links

Snippet

With rapid advances in wireless communication, mobile devices and positioning technologies, location‐based services (LBS) have recently emerged as one of today's most important applications in mobile networks. To obtain great flexibility and cost savings, LBS …
Continue reading at onlinelibrary.wiley.com (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1425Traffic logging, e.g. anomaly detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1416Event detection, e.g. attack signature detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/1458Denial of Service
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/80Wireless
    • H04L2209/805Lightweight hardware, e.g. radio-frequency identification [RFID] or sensor
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3271Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using challenge-response
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W12/00Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity
    • H04W12/06Authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/16Implementing security features at a particular protocol layer

Similar Documents

Publication Publication Date Title
Henzinger et al. Private web search with Tiptoe
Song et al. A privacy-preserved full-text retrieval algorithm over encrypted data for cloud storage applications
Zhu et al. A privacy-preserving framework for outsourcing location-based services to the cloud
Su et al. Privacy-preserving top-k spatial keyword queries in untrusted cloud environments
Chen et al. EliMFS: achieving efficient, leakage-resilient, and multi-keyword fuzzy search on encrypted cloud data
Sun et al. Privacy-preserving keyword search over encrypted data in cloud computing
Chen et al. DMRS: an efficient dynamic multi-keyword ranked search over encrypted cloud data
Negi et al. Pystin: Enabling Secure LBS in Smart Cities With Privacy-Preserving Top-$ k $ Spatial–Textual Query
Wodi et al. Fast privacy-preserving keyword search on encrypted outsourced data
Zhu et al. Improved collusion‐resisting secure nearest neighbor query over encrypted data in cloud
Xiangyang et al. MUSE: an efficient and accurate verifiable privacy‐preserving multikeyword text search over encrypted cloud data
Singh et al. Privacy-preserving multi-keyword hybrid search over encrypted data in cloud
Guo et al. A provably secure and efficient range query scheme for outsourced encrypted uncertain data from cloud-based Internet of Things systems
Yang et al. TRQED: Secure and fast tree-based private range queries over encrypted cloud
Yu et al. Privacy-preserving multikeyword similarity search over outsourced cloud data
Zhang et al. Privacy‐assured substructure similarity query over encrypted graph‐structured data in cloud
Song et al. Achieving efficient and privacy-preserving location-based task recommendation in spatial crowdsourcing
CN117951730A (en) Cloud security searchable encryption method based on hash index
Chen et al. One-time, oblivious, and unlinkable query processing over encrypted data on cloud
Cheng et al. Enabling secure and efficient kNN query processing over encrypted spatial data in the cloud
Zhou et al. EVSS: An efficient verifiable search scheme over encrypted cloud data
Tzouramanis et al. Secure reverse k-nearest neighbours search over encrypted multi-dimensional databases
Hamsanandhini et al. IoT data encryption and phrase search-based efficient processing using a Fully Homomorphic-based SE (FHSE) scheme
Wang et al. Search ranges efficiently and compatibly as keywords over encrypted data
Zhang et al. Tree‐Based Public Key Encryption with Conjunctive Keyword Search