Privacy enhancing technologies for solving the privacy-personalization paradox: Taxonomy and survey

N Kaaniche, M Laurent, S Belguith - Journal of Network and Computer …, 2020‏ - Elsevier
Personal data are often collected and processed in a decentralized fashion, within different
contexts. For instance, with the emergence of distributed applications, several providers are …

Searchable symmetric encryption: Designs and challenges

GS Poh, JJ Chin, WC Yau, KKR Choo… - ACM Computing …, 2017‏ - dl.acm.org
Searchable Symmetric Encryption (SSE) when deployed in the cloud allows one to query
encrypted data without the risk of data leakage. Despite the widespread interest, existing …

Sok: Cryptographically protected database search

B Fuller, M Varia, A Yerukhimovich… - … IEEE Symposium on …, 2017‏ - ieeexplore.ieee.org
Protected database search systems cryptographically isolate the roles of reading from,
writing to, and administering the database. This separation limits unnecessary administrator …

Geometric range search on encrypted spatial data

B Wang, M Li, H Wang - IEEE Transactions on Information …, 2015‏ - ieeexplore.ieee.org
Geometric range search is a fundamental primitive for spatial data analysis in SQL and
NoSQL databases. It has extensive applications in location-based services, computer-aided …

Enabling efficient and verifiable multi-keyword ranked search over encrypted cloud data

X Jiang, J Yu, J Yan, R Hao - Information Sciences, 2017‏ - Elsevier
With the prevalence of the cloud computing, data owners can outsource their data to the
cloud server to enjoy convenient services. To ensure the user's data confidentiality, the …

Secure skyline queries on cloud platform

J Liu, J Yang, L **ong, J Pei - 2017 IEEE 33rd international …, 2017‏ - ieeexplore.ieee.org
Outsourcing data and computation to cloud server provides a cost-e ective way to support
large scale data storage and query processing. However, due to security and privacy …

Circular range search on encrypted spatial data

B Wang, M Li, H Wang, H Li - 2015 IEEE Conference on …, 2015‏ - ieeexplore.ieee.org
Searchable encryption is a promising technique enabling meaningful search operations to
be performed on encrypted databases while protecting user privacy from untrusted third …

Graphse²: An encrypted graph database for privacy-preserving social search

S Lai, X Yuan, SF Sun, JK Liu, Y Liu, D Liu - Proceedings of the 2019 …, 2019‏ - dl.acm.org
In this paper, we propose GraphSE\textsuperscript2, an encrypted graph database for online
social network services to address massive data breaches. GraphSE\textsuperscript2 …

Secure and efficient skyline queries on encrypted data

J Liu, J Yang, L **ong, J Pei - IEEE transactions on knowledge …, 2018‏ - ieeexplore.ieee.org
Outsourcing data and computation to cloud server provides a cost-effective way to support
large scale data storage and query processing. However, due to security and privacy …

Sorting and searching behind the curtain

F Baldimtsi, O Ohrimenko - … : 19th International Conference, FC 2015, San …, 2015‏ - Springer
We propose a framework where a user can outsource his data to a cloud server in an
encrypted form and then request the server to perform computations on this data and sort the …