2019
DOI: 10.1016/j.future.2018.08.017
|View full text |Cite
|
Sign up to set email alerts
|

A multistage protocol for aggregated queries in distributed cloud databases with privacy protection

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
11
0

Year Published

2019
2019
2022
2022

Publication Types

Select...
4
2
1

Relationship

2
5

Authors

Journals

citations
Cited by 19 publications
(11 citation statements)
references
References 70 publications
0
11
0
Order By: Relevance
“…), while others incorporate homomorphic encryption schemes, pseudonymization, l-diversity, t-closeness, differential privacy, etc. [7]. Each of them has its advantages and shortcomings.…”
Section: Literature Reviewmentioning
confidence: 99%
See 1 more Smart Citation
“…), while others incorporate homomorphic encryption schemes, pseudonymization, l-diversity, t-closeness, differential privacy, etc. [7]. Each of them has its advantages and shortcomings.…”
Section: Literature Reviewmentioning
confidence: 99%
“…Over the years, several research works have been conducted on the data privacy-preservation mechanisms (e.g., secure multi-party communication, k-anonymization, l-diversity, etc.) [7] and the privacy-violating attacks on those mechanisms [8]- [10]. To overcome such privacy-violating attacks while preserving data confidentiality and maintaining a level of data utility, the concept of DP (Differential Privacy) has been introduced by Dwork et al [11].…”
Section: Introductionmentioning
confidence: 99%
“…Early SE schemes focus on private single keyword retrieval over encrypted documents [19]. Afterwards, many SE schemes were proposed to support various search scenarios including multiple keywords search [20], conjunctive keywords search [21], distributed search [22], [23] and similarity search [24]- [26]. However, most of them are not suitable for encrypted image retrieval tasks.…”
Section: Related Workmentioning
confidence: 99%
“…An efficient noise addition framework for privacy preserving data mining was proposed in [11][12][13][14]. An algorithm for the private processing of distributed queries was proposed in [15]. The present paper considers a larger class of queries.…”
Section: Introductionmentioning
confidence: 99%
“…The present paper considers a larger class of queries. The algorithm proposed in [15] was the first and only algorithm applicable in the situation considered in the present paper. However, the procedure proposed in [15] does not provide protection against active attackers and the previous algorithm cannot solve the problem considered in the present paper.…”
Section: Introductionmentioning
confidence: 99%