2017
DOI: 10.1007/s11277-017-4299-8
|View full text |Cite
|
Sign up to set email alerts
|

Privacy Preserving in Cloud Environment for Obstructed Shortest Path Query

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
17
0

Year Published

2018
2018
2022
2022

Publication Types

Select...
9

Relationship

1
8

Authors

Journals

citations
Cited by 23 publications
(17 citation statements)
references
References 23 publications
0
17
0
Order By: Relevance
“…To compute the shortest path with obstructions (such as by a traffic jam) in a graph, Zhang et al [289] proposed a secure outsourcing solution using combined cryptographic methods, including MPC, Paillier cryptosystem, and oblivious transfer. In the proposed scheme, the LBS server and cloud server iteratively calculate the shortest path by communicating with each other, based on Floyd-Warshall algorithm.…”
Section: Graph Computationmentioning
confidence: 99%
See 1 more Smart Citation
“…To compute the shortest path with obstructions (such as by a traffic jam) in a graph, Zhang et al [289] proposed a secure outsourcing solution using combined cryptographic methods, including MPC, Paillier cryptosystem, and oblivious transfer. In the proposed scheme, the LBS server and cloud server iteratively calculate the shortest path by communicating with each other, based on Floyd-Warshall algorithm.…”
Section: Graph Computationmentioning
confidence: 99%
“…The protocols protect the privacy of both the users and the LBS server. However, the computation overhead of the system [289] should be further reduced.…”
Section: Graph Computationmentioning
confidence: 99%
“…Since then, other schemes such as the semantic p -sensitivity [11] and the query l -diversity [12] had evolved from the conception of k -anonymity. In recent years, researchers have began to pay close attention to the generalization of location trajectory in continuous query[13, 14], the privacy protection scheme without central server [15–17], as well as the correlation in attributes during the routing of continuous query[1821],others include the schemes of encryption[2224].…”
Section: Related Workmentioning
confidence: 99%
“…In this algorithm, the CS is just used to expand the anonymous range, and the anonymous user with similar attribute is selected by the ability of decryption. Similar to above algorithm, Zhang et al [ 21 ] completed the private shortest path calculation without any attribute to be observed in cloud environment with the help of homomorphic encryption.…”
Section: Introductionmentioning
confidence: 99%