SCIENCE CHINA Information Sciences, Volume 61, Issue 3: 039101(2018) https://doi.org/10.1007/s11432-017-9090-6

Secure and efficient $k$-nearest neighbor query for location-based services in outsourced environments

More info
  • ReceivedJan 16, 2017
  • AcceptedApr 19, 2017
  • PublishedJun 30, 2017


There is no abstract available for this article.


This work was supported by National Natural Science Foundation of China (Grant Nos. 61272074, U1405255), and Industrial Science and Technology Foundation of Zhenjiang City (Grant No. GY2013030).


Appendixes A–C.


[1] Wong W K, Cheung D W, Kao B, et al. Secure kNN computation on encrypted databases. In: Proceedings of the ACM SIGMOD International Conference on Management of data, New York, 2009. 139--152. Google Scholar

[2] Hu H, Xu J, Ren C, et al. Processing private queries over untrusted data cloud through privacy homomorphism. In: Proceedings of IEEE 27th International Conference on Data Engineering, Hannover, 2011. 601--612. Google Scholar

[3] Padashetty N, Nadagoudar R. Confidential and secure query services in the cloud with rasp. Int J Comput Sci Mobile Comput, 2015, 4: 592--600. Google Scholar

[4] Elmehdwi Y, Samanthula B K, Jiang W. Secure k-nearest neighbor query over encrypted data in outsourced environments. In: Proceedings of IEEE 30th International Conference on Data Engineering, Chicago, 2014. 664--675. Google Scholar

[5] Yao B, Li F F, Xiao X K. Secure nearest neighbor revisited. In: Proceedings of IEEE 29th International Conference on Data Engineering (ICDE), Brisbane, 2013. 733--744. Google Scholar

[6] Choi S, Ghinita G, Lim H S, et al. Secure knn query processing in untrusted cloud environments. IEEE Trans Knowl Data Eng, 2014, 26: 2818--2831. Google Scholar

[7] Kim H I, Hong S, Chang J W. Hilbert curve-based cryptographic transformation scheme for spatial query processing on outsourced private data. Data Knowl Eng, 2016, 104: 32--44. Google Scholar

[8] Xu H. An approximate nearest neighbor query algorithm based on Hilbert curve. In: Proceedings of IEEE International Conference on Internet Computing & Information Services (ICICIS). Washington: IEEE Computer Society, 2011. 514--517. Google Scholar

Copyright 2020 Science China Press Co., Ltd. 《中国科学》杂志社有限责任公司 版权所有

京ICP备18024590号-1       京公网安备11010102003388号