
This Article  
 
Share  
Bibliographic References  
Add to:  
Digg Furl Spurl Blink Simpy Del.icio.us Y!MyWeb  
Search  
 
ASCII Text  x  
Man Lung Yiu, Ira Assent, Christian S. Jensen, Panos Kalnis, "Outsourced Similarity Search on Metric Data Assets," IEEE Transactions on Knowledge and Data Engineering, vol. 24, no. 2, pp. 338352, February, 2012.  
BibTex  x  
@article{ 10.1109/TKDE.2010.222, author = {Man Lung Yiu and Ira Assent and Christian S. Jensen and Panos Kalnis}, title = {Outsourced Similarity Search on Metric Data Assets}, journal ={IEEE Transactions on Knowledge and Data Engineering}, volume = {24}, number = {2}, issn = {10414347}, year = {2012}, pages = {338352}, doi = {http://doi.ieeecomputersociety.org/10.1109/TKDE.2010.222}, publisher = {IEEE Computer Society}, address = {Los Alamitos, CA, USA}, }  
RefWorks Procite/RefMan/Endnote  x  
TY  JOUR JO  IEEE Transactions on Knowledge and Data Engineering TI  Outsourced Similarity Search on Metric Data Assets IS  2 SN  10414347 SP338 EP352 EPD  338352 A1  Man Lung Yiu, A1  Ira Assent, A1  Christian S. Jensen, A1  Panos Kalnis, PY  2012 KW  Query processing KW  Security KW  integrity KW  and protection. VL  24 JA  IEEE Transactions on Knowledge and Data Engineering ER   
[1] G. Aggarwal, T. Feder, K. Kenthapadi, S. Khuller, R. Panigrahy, D. Thomas, and A. Zhu, "Achieving Anonymity via Clustering," Proc. 25th ACM SIGMODSIGACTSIGART Symp. Principles of Database Systems (PODS), pp. 153162, 2006.
[2] R. Agrawal, P.J. Haas, and J. Kiernan, "Watermarking Relational Data: Framework, Algorithms and Analysis," The Int'l J. Very Large Data Bases, vol. 12, no. 2, pp. 157169, 2003.
[3] R. Agrawal, J. Kiernan, R. Srikant, and Y. Xu, "OrderPreserving Encryption for Numeric Data," Proc. ACM SIGMOD Int'l Conf. Management of Data, pp. 563574, 2004.
[4] R. Agrawal and R. Srikant, "PrivacyPreserving Data Mining," Proc. ACM SIGMOD Int'l Conf. Management of Data, pp. 439450, 2000.
[5] C.A. Ardagna, M. Cremonini, E. Damiani, S.D.C. di Vimercati, and P. Samarati, "Location Privacy Protection Through ObfuscationBased Techniques," Proc. 21st Ann. IFIP WG 11.3 Working Conf. Data and Applications Security (DBSec), pp. 4760, 2007.
[6] V. Athitsos, M. Potamias, P. Papapetrou, and G. Kollios, "Nearest Neighbor Retrieval Using DistanceBased Hashing," Proc. IEEE 24th Int'l Conf. Data Eng. (ICDE), pp. 327336, 2008.
[7] N. Beckmann, H.P. Kriegel, R. Schneider, and B. Seeger, "The R∗Tree: An Efficient and Robust Access Method for Points and Rectangles," Proc. ACM SIGMOD Int'l Conf. Management of Data, pp. 322331, 1990.
[8] S. Berchtold, D.A. Keim, and H.P. Kriegel, "The XTree : An Index Structure for HighDimensional Data," Proc. 22nd Int'l Conf. Very Large Databases, pp. 2839, 1996.
[9] T. Bozkaya and Z.M. Özsoyoglu, "Indexing Large Metric Spaces for Similarity Search Queries," ACM Trans. Database Systems, vol. 24, no. 3, pp. 361404, 1999.
[10] E. Chávez, G. Navarro, R.A. BaezaYates, and J.L. Marroquín, "Searching in Metric Spaces," ACM Computing Surveys, vol. 33, no. 3, pp. 273321, 2001.
[11] P. Ciaccia, M. Patella, and P. Zezula, "MTree: An Efficient Access Method for Similarity Search in Metric Spaces," Proc. Very Large Databases (VLDB), pp. 426435, 1997.
[12] E. Damiani, S.D.C. Vimercati, S. Jajodia, S. Paraboschi, and P. Samarati, "Balancing Confidentiality and Efficiency in Untrusted Relational DBMSs," Proc. 10th ACM Conf. Computer and Comm. Security (CCS), pp. 93102, 2003.
[13] M. Dunham, Data Mining: Introductory and Advanced Topics. Prentice Hall, 2002.
[14] C. Faloutsos and K.I. Lin, "FastMap: A Fast Algorithm for Indexing, DataMining and Visualization of Traditional and Multimedia Data Sets," Proc. ACM SIGMOD Int'l Conf. Management of Data, pp. 163174, 1995.
[15] G. Ghinita, P. Kalnis, A. Khoshgozaran, C. Shahabi, and K.L. Tan, "Private Queries in Location Based Services: Anonymizers Are Not Necessary," Proc. ACM SIGMOD Int'l Conf. Management of Data, pp. 121132, 2008.
[16] A. Gionis, P. Indyk, and R. Motwani, "Similarity Search in High Dimensions via Hashing," Proc. 25th Int'l Conf. Very Large Databases (VLDB), pp. 518529, 1999.
[17] H. Hacigümüs, B.R. Iyer, C. Li, and S. Mehrotra, "Executing SQL over Encrypted Data in the DatabaseServiceProvider Model," Proc. ACM SIGMOD Int'l Conf. Management of Data, pp. 216227, 2002.
[18] H. Hacigümüs, S. Mehrotra, and B.R. Iyer, "Providing Database as a Service," Proc. 18th Int'l Conf. Data Eng. (ICDE), pp. 2940, 2002.
[19] A. Hinneburg, C.C. Aggarwal, and D.A. Keim, "What Is the Nearest Neighbor in High Dimensional Spaces?," Proc. 26th Int'l Conf. Very Large Data Bases (VLDB), pp. 506515, 2000.
[20] G.R. Hjaltason and H. Samet, "IndexDriven Similarity Search in Metric Spaces," ACM Trans. Database Systems, vol. 28, no. 4, pp. 517580, 2003.
[21] H.V. Jagadish, B.C. Ooi, K.L. Tan, C. Yu, and R.Z. 0003, "iDistance: An Adaptive B$^{+}$ Tree Based Indexing Method for Nearest Neighbor Search," ACM Trans. Database Systems, vol. 30, no. 2, pp. 364397, 2005.
[22] C.T. Jr, A.J.M. Traina, B. Seeger, and C. Faloutsos, "SlimTrees: High Performance Metric Trees Minimizing Overlap between Nodes," Proc. Seventh Int'l Conf. Extending Database Technology (EDBT), pp. 5165, 2000.
[23] H. Kargupta, S. Datta, Q. Wang, and K. Sivakumar, "On the Privacy Preserving Properties of Random Data Perturbation Techniques," Proc. IEEE Third Int'l Conf. Data Mining (ICDM), pp. 99106, 2003.
[24] A. Khoshgozaran and C. Shahabi, "Blind Evaluation of Nearest Neighbor Queries Using Space Transformation to Preserve Location Privacy," Proc. 10th Int'l Conf. Advances in Spatial and Temporal Databases (SSTD), pp. 239257, 2007.
[25] K. LeFevre, D.J. DeWitt, and R. Ramakrishnan, "Mondrian Multidimensional KAnonymity," Proc. 22nd Int'l Conf. Data Eng. (ICDE), p. 25, 2006.
[26] T. Seidl and H.P. Kriegel, "Optimal MultiStep kNearest Neighbor Search," Proc. ACM SIGMOD Int'l Conf. Management of Data, pp. 154165, 1998.
[27] L. Sweeney, "$k$ Anonymity: A Model for Protecting Privacy," Int'l J. Uncertainty, Fuzziness and KnowledgeBased Systems, vol. 10, no. 5, pp. 557570, 2002.
[28] W.K. Wong, D.W. Cheung, B. Kao, and N. Mamoulis, "Secure kNN Computation on Encrypted Databases," Proc. 35th ACM SIGMOD Int'l Conf. Management of Data, pp. 139152, 2009.
[29] P. Yianilos, "Data Structures and Algorithms for Nearest Neighbor Search in General Metric Spaces," Proc. Fourth Ann. ACMSIAM Symp. Discrete Algorithms (SODA), pp. 311321, 1993.
[30] M.L. Yiu, I. Assent, C.S. Jensen, and P. Kalnis, "Outsourced Similarity Search on Metric Data Assets," DB Technical Report TR28, Aalborg Univ., 2010.
[31] M.L. Yiu, G. Ghinita, C.S. Jensen, and P. Kalnis, "Outsourcing Search Services on Private Spatial Data," Proc. IEEE 25th Int'l Conf. Data Eng. (ICDE), pp. 11401143, 2009.