Practical and Secure Nearest Neighbor Search on Encrypted Large-Scale Data Source : IEEE INFOCOM 2016 - IEEE International Conference on Computer Communications,

Slides:



Advertisements
Similar presentations
Kerberos Assisted Authentication in Mobile Ad-hoc Networks Authors: Asad Amir Pirzada and Chris McDonald Sources: Proceedings of the 27th Australasian.
Advertisements

Further improvement on the modified authenticated key agreement scheme Authors: N.Y. Lee and M.F. Lee Source: Applied Mathematics and Computation, Vol.157,
INTRODUCTION PROBLEM FORMULATION FRAMEWORK AND PRIVACY REQUIREMENTS FOR MRSE PRIVACY-PRESERVING AND EFFICIENT MRSE PERFORMANCE ANALYSIS RELATED WORK CONCLUSION.
Using Auxiliary Sensors for Pair-Wise Key Establishment in WSN Source: Lecture Notes in Computer Science (2010) Authors: Qi Dong and Donggang Liu Presenter:
Efficient aggregation of encrypted data in Wireless Sensor Network Author: Einar Mykletun, Gene Tsudik Presented by Yi Cheng Lin Date: March 13, 2007.
12006/9/26 Load Balancing in Dynamic Structured P2P Systems Brighten Godfrey, Karthik Lakshminarayanan, Sonesh Surana, Richard Karp, Ion Stoica INFOCOM.
An Enhanced Two-factor User Authentication Scheme in Wireless Sensor Networks DAOJING HE, YI GAO, SAMMY CHAN, CHUN CHEN, JIAJUN BU Ad Hoc & Sensor Wireless.
Miao Zhao, Ming Ma and Yuanyuan Yang
A Routing-Driven Elliptic Curve Cryptography Based Key Management Scheme for Heterogeneous Sensor Networks Author: Xiaojiang Du, Guizani M., Yang Xiao.
Function Computation over Heterogeneous Wireless Sensor Networks Xuanyu Cao, Xinbing Wang, Songwu Lu Department of Electronic Engineering Shanghai Jiao.
Efficient remote mutual authentication and key agreement Improvement of Chien et al. ’ s remote user authentication scheme using smart cards An efficient.
Secure Authentication Scheme with Anonymity for Wireless Communications Speaker : Hong-Ji Wei Date :
A New Time-Memory-Resource Trade-Off Method for Password Recovery Communications and Intelligence Information Security (ICCIIS), 2010 International Conference.
P2: Privacy-Preserving Communication and Precise Reward Architecture for V2G Networks in Smart Grid P2: Privacy-Preserving Communication and Precise Reward.
Two-tier authentication for cluster and individual sets in mobile ad hoc networks Authors: Yuh-Ren Tsai and Shiuh-Jeng Wang Sources: Computer Networks,
Bounded relay hop mobile data gathering in wireless sensor networks
Secure Communication between Set-top Box and Smart Card in DTV Broadcasting Authors: T. Jiang, Y. Hou and S. Zheng Source: IEEE Transactions on Consumer.
SPEAKER: HONG-JI WEI DATE: Secure Anonymous Authentication Scheme with Roaming for Mobile Networks.
A New Spatial Index Structure for Efficient Query Processing in Location Based Services Speaker: Yihao Jhang Adviser: Yuling Hsueh 2010 IEEE International.
User authentication schemes with pseudonymity for ubiquitous sensor network in NGN Authors: Binod Vaidya, Joel J. Rodrigues and Jong Hyuk Park Source:
Presented By Amarjit Datta
Password-based user authentication and key distribution protocols for client-server applications Authors: Her-Tyan Yeh and Hung-Min Sun Sources: The Journal.
Data Gathering in Wireless Sensor Networks with Mobile Collectors Ming Ma and Yuanyuan Yang State University of New York, Stony Brook 1 IEEE Parallel and.
SPEAKER: HONG-JI WEI DATE: Efficient and Secure Anonymous Authentication Scheme with Roaming Used in Mobile Networks.
A Secure Authentication Scheme with Anonymity for Wireless Communications IEEE COMMUNICATIONS LETTERS, VOL. 12, NO. 10, OCTOBER 2008 Chia-Chun Wu, Wei-Bin.
1 SFS: Secure File Sharing For Dynamic Groups In Cloud Shruthi Suresh M-tech CSE RCET.
An Efficient and Practical Authenticated Communication Scheme for Vehicular Ad Hoc Networks Source: IEEE Transactions on Vehicular Technology, Reviewing.
Source: Computers & Security, Vol. 24, No. 5, pp , August 2005
Non-PKI Methods for Public Key Distribution
Lightweight Mutual Authentication for IoT and Its Applications
A Dynamic ID-Based Generic Framework for Anonymous Authentication Scheme for Roaming Service in Global Mobility Networks Source: Wireless Personal Communications,
Reporter :Chien-Wen Huang
Cryptanalyses and improvements of two cryptographic key assignment schemes for dynamic access control in a user hierarchy Source: Computer & Security,
網路環境中通訊安全技術之研究 Secure Communication Schemes in Network Environments
Cryptanalysis on Mu–Varadharajan's e-voting schemes
Source: Computers & Security, vol.23, pp , 2004 Author: Heba K. Aslan
A secure and traceable E-DRM system based on mobile device
Efficient password authenticated key agreement using smart cards
Anonymous Wireless Authentication on a Portable Cellular Mobile System
State of the art – Part 1 Xin Jin
Efficient Time-Bound Hierarchical Key Assignment Scheme
Chair Professor Chin-Chen Chang Feng Chia University
Image camouflage by reversible image transformation
Privacy Preserving Ranked Multi-Keyword
Source: Journal of Visual Communication and Image Representation, Vol
Authors : Parwinder Kaur Dhillon and Sheetal Kalra
Encryption, Cryptography, and Steganography:
QR Code Authentication with Embedded Message Authentication Code
Source: J. Vis. Commun. Image R. 41 (2016) 58–64
Privacy Preservation and Protection Scheme over ALARM on Geographical routing B. Muthusenthil, S. Murugavalli Results The PPS is geographical routing protocol,
A Novel Latin Square-based Secret Sharing for M2M Communications
Advisor: Chin-Chen Chang1, 2 Student: Yi-Pei Hsieh2
An efficient biometric based remote user authentication scheme for secure internet of things environment Source: Journal of Intelligent & Fuzzy Systems.
Authors:Debiao He, Sherali Zeadally, Neeraj Kumar and Wei Wu
Date:2011/09/28 報告人:向峻霈 出處: Ren-Chiun Wang  Wen-Shenq Juang 
A lightweight biometrics based remote user authentication scheme for IoT services Source: Journal of Information Security and Applications Volume 34, Part.
Improved joint reversible data hiding in encrypted images
Reversible data hiding in encrypted images based on absolute mean difference of multiple neighboring pixels Source: Journal of Visual Communication and.
Data hiding method using image interpolation
A new chaotic algorithm for image encryption
Digital Watermarking for Image Authentication with Localization
Data hiding method using image interpolation
Published in 2016 International Computer Symposium (ICS) Authors
New Framework for Reversible Data Hiding in Encrypted Domain
J. Byun et al. In Secure Data Management, LNCS 4165,
Source: IEEE Access. (2019/05/13). DOI: /ACCESS
Sourse: Information Sciences, Vol. 494, pp , August 2019
Privacy Protection for E-Health Systems by
A lightweight authentication scheme with privacy protection for smart grid communications Source: Future Generation Computer Systems Volume 100, November.
Reversible data hiding in encrypted binary images by pixel prediction
Presentation transcript:

Practical and Secure Nearest Neighbor Search on Encrypted Large-Scale Data Source : IEEE INFOCOM 2016 - IEEE International Conference on Computer Communications, pp. 1-9 Authors :Boyang Wang, Yantian Hou, Ming Li Speaker : Pengxu Tian Date: 2017/10/12 In this paper, authors proposed a new authentication scheme for heterogeneous WSN. Therefore, I will introduce heterogeneous WSN later.

Outline Introduction Proposed scheme Performance analysis This is my outline First, I will introduce what is heterogeneous WSN. And then is Proposed scheme.

Introduction Two directions about Searchable Encryption: Multiple data owners Similarity search

Introduction System model

Introduction R-tree Minimum bounding rectangle

Introduction R-tree

Introduction OPE (Order-Preserving Encryption)

Proposed scheme(1/9) Search process in plaintext domain

Proposed scheme(2/9) Search process in plaintext domain

Proposed scheme(3/9) Search process in plaintext domain

Proposed scheme(4/9) Search process in ciphertext domain

Proposed scheme(5/9) Search process in ciphertext domain

Proposed scheme(6/9) Search process in ciphertext domain

Proposed scheme(7/9) An example of special situation

Proposed scheme(8/9) Details:

Proposed scheme(9/9) Details:

Performance analysis identity or password bytes, nonce 16 bytes, timestamp 19 bytes, hash value 20 bytes, symmetric key 16 bytes

Performance analysis identity or password bytes, nonce 16 bytes, timestamp 19 bytes, hash value 20 bytes, symmetric key 16 bytes

Performance analysis identity or password bytes, nonce 16 bytes, timestamp 19 bytes, hash value 20 bytes, symmetric key 16 bytes

Thanks for attention