{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,30]],"date-time":"2025-10-30T07:08:03Z","timestamp":1761808083767,"version":"3.41.0"},"publisher-location":"Cham","reference-count":18,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319547046"},{"type":"electronic","value":"9783319547053"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-54705-3_28","type":"book-chapter","created":{"date-parts":[[2017,3,2]],"date-time":"2017-03-02T14:03:43Z","timestamp":1488463423000},"page":"451-471","source":"Crossref","is-referenced-by-count":2,"title":["Secure Collaborative Outsourced k-Nearest Neighbor Classification with Multiple Owners in Cloud Environment"],"prefix":"10.1007","author":[{"given":"Hong","family":"Rong","sequence":"first","affiliation":[]},{"given":"Huimei","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Jian","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Wei","family":"Wu","sequence":"additional","affiliation":[]},{"given":"Jialu","family":"Hao","sequence":"additional","affiliation":[]},{"given":"Ming","family":"Xian","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,3,3]]},"reference":[{"key":"28_CR1","doi-asserted-by":"crossref","unstructured":"Wong, W.K., Cheung, D.W., Kao, B., Mamoulis, N.: Secure kNN computation on encrypted database. In: SIGMOD, pp. 139\u2013152 (2009)","DOI":"10.1145\/1559845.1559862"},{"issue":"2","key":"28_CR2","doi-asserted-by":"crossref","first-page":"322","DOI":"10.1109\/TKDE.2012.251","volume":"26","author":"H Xu","year":"2014","unstructured":"Xu, H., Guo, S., Chen, K.: Building confidential and efficient query services in the cloud with RASP data perturbation. IEEE Trans. Knowl. Data Eng. 26(2), 322\u2013335 (2014)","journal-title":"IEEE Trans. Knowl. Data Eng."},{"key":"28_CR3","doi-asserted-by":"crossref","unstructured":"Elmehdwi, Y., Samanthula, B.K., Jiang, W.: Secure k-nearest neighbor query over encrypted data in outsourced environments. In: ICDE, pp. 664\u2013675 (2014)","DOI":"10.1109\/ICDE.2014.6816690"},{"issue":"5","key":"28_CR4","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1109\/TKDE.2014.2364027","volume":"27","author":"BK Samanthula","year":"2015","unstructured":"Samanthula, B.K., Elmehdwi, Y., Jiang, W.: K-nearest neighbor classification over semantically secure encrypted relational data. IEEE Trans. Knowl. Data Eng. 27(5), 1\u201314 (2015)","journal-title":"IEEE Trans. Knowl. Data Eng."},{"key":"28_CR5","doi-asserted-by":"crossref","unstructured":"Li, F., Shin, R., Paxson, V.: Exploring privacy preservation in outsourced K-nearest neighbors with multiple data owners. In: CCSW 2015, pp. 53\u201364 (2015)","DOI":"10.1145\/2808425.2808430"},{"issue":"12","key":"28_CR6","doi-asserted-by":"crossref","first-page":"2046","DOI":"10.1109\/TIFS.2013.2288131","volume":"8","author":"A Peter","year":"2013","unstructured":"Peter, A., Tews, E., Katzenbeisser, S.: Efficiently outsourcing multiparty computation under multiple keys. IEEE Trans. Inf. Forensics Secur. 8(12), 2046\u20132058 (2013)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"28_CR7","doi-asserted-by":"crossref","unstructured":"Wang, B., Li, M., Chow, S.S.M., Li, H.: Computing encrypted cloud data efficiently under multiple keys. In: 4th International Workshop on Security and Privacy in Cloud Computing, pp. 504\u2013513 (2013)","DOI":"10.1109\/CNS.2013.6682768"},{"key":"28_CR8","doi-asserted-by":"crossref","unstructured":"Wang, B., Li, M., Chow, S.S.M., Li, H.: A tale of two clouds: computing on data encrypted under multiple keys. In: IEEE CNS, pp. 337\u2013345 (2014)","DOI":"10.1109\/CNS.2014.6997502"},{"key":"28_CR9","doi-asserted-by":"crossref","unstructured":"Zhu, Y., Xu, R., Takagi, T.: Secure k-NN computation on encrypted cloud data without sharing key with query users. In: ACM Cloud Computing, pp. 55\u201360 (2013)","DOI":"10.1145\/2484402.2484415"},{"key":"28_CR10","unstructured":"Chow, S.S.M., Lee, J.H., Strauss, M.: Two-party computation model for privacy-preserving queries over distributed databases. In: NDSS (2009)"},{"key":"28_CR11","unstructured":"Van, M.D., Juels, A.: On the impossibility of cryptography alone for privacy-preserving cloud computing. In: HotSec 2010, pp. 1\u20138 (2010)"},{"key":"28_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"127","DOI":"10.1007\/BFb0054122","volume-title":"Advances in Cryptology \u2014 EUROCRYPT\u201998","author":"M Blaze","year":"1998","unstructured":"Blaze, M., Bleumer, G., Strauss, M.: Divertible protocols and atomic proxy cryptography. In: Nyberg, K. (ed.) EUROCRYPT 1998. LNCS, vol. 1403, pp. 127\u2013144. Springer, Heidelberg (1998). doi: 10.1007\/BFb0054122"},{"key":"28_CR13","doi-asserted-by":"crossref","first-page":"5077","DOI":"10.1016\/j.ins.2010.08.017","volume":"180","author":"J Weng","year":"2010","unstructured":"Weng, J., Deng, R.H., Liu, S., Chen, K.: Chosen-ciphertext secure bidirectional proxy re-encryption schemes without pairings. Inf. Sci. 180, 5077\u20135089 (2010)","journal-title":"Inf. Sci."},{"key":"28_CR14","doi-asserted-by":"crossref","unstructured":"Canetti, R., Hohenberger, S.: Chosen-ciphertext secure proxy re-encrytpion. In: CCS 2007, pp. 185\u2013194 (2007)","DOI":"10.1145\/1315245.1315269"},{"key":"28_CR15","unstructured":"Goldreich, O.: The Foundations of Cryptography: Volume 2, Basic Applications, pp. 600\u2013759. Cambridge University Press, Cambridge (2004)"},{"key":"28_CR16","unstructured":"Cortez, P., Cerdeira, A., Almeida, F., Matos, T., Reis, J.: The UCI Machine Learning Repository. http:\/\/archive.ics.uci.edu\/ml\/datasets\/Wine+Quality"},{"issue":"10","key":"28_CR17","first-page":"2655","volume":"9","author":"Y Huang","year":"2014","unstructured":"Huang, Y., Lu, Q., Xiong, Y.: Collaborative outsourced data mining for secure cloud computing. J. Netw. 9(10), 2655\u20132664 (2014)","journal-title":"J. Netw."},{"key":"28_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"248","DOI":"10.1007\/978-3-319-46257-8_27","volume-title":"Intelligent Data Engineering and Automated Learning \u2013 IDEAL 2016","author":"H Rong","year":"2016","unstructured":"Rong, H., Wang, H., Huang, K., Liu, J., Xian, M.: Privacy-preserving scalar product computation in cloud environments under multiple keys. In: Yin, H., Gao, Y., Li, B., Zhang, D., Yang, M., Li, Y., Klawonn, F., Tall\u00f3n-Ballesteros, A.J. (eds.) IDEAL 2016. LNCS, vol. 9937, pp. 248\u2013258. Springer, Cham (2016). doi: 10.1007\/978-3-319-46257-8_27"}],"container-title":["Lecture Notes in Computer Science","Information Security and Cryptology"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-54705-3_28","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,15]],"date-time":"2025-06-15T23:15:32Z","timestamp":1750029332000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-54705-3_28"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319547046","9783319547053"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-54705-3_28","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2017]]}}}