{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,9]],"date-time":"2026-03-09T21:30:00Z","timestamp":1773091800813,"version":"3.50.1"},"reference-count":44,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2017,4,8]],"date-time":"2017-04-08T00:00:00Z","timestamp":1491609600000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61472091"],"award-info":[{"award-number":["61472091"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Natural Science Foundation of Guangdong Province for Distinguished Young Scholars","award":["2014A030306020"],"award-info":[{"award-number":["2014A030306020"]}]},{"name":"Science and Technology Planning Project of Guangdong Province, China","award":["2015B010129015"],"award-info":[{"award-number":["2015B010129015"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Cluster Comput"],"published-print":{"date-parts":[[2018,3]]},"DOI":"10.1007\/s10586-017-0849-9","type":"journal-article","created":{"date-parts":[[2017,4,7]],"date-time":"2017-04-07T23:29:00Z","timestamp":1491607740000},"page":"277-286","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":185,"title":["Privacy-preserving outsourced classification in cloud computing"],"prefix":"10.1007","volume":"21","author":[{"given":"Ping","family":"Li","sequence":"first","affiliation":[]},{"given":"Jin","family":"Li","sequence":"additional","affiliation":[]},{"given":"Zhengan","family":"Huang","sequence":"additional","affiliation":[]},{"given":"Chong-Zhi","family":"Gao","sequence":"additional","affiliation":[]},{"given":"Wen-Bin","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Kai","family":"Chen","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,4,8]]},"reference":[{"key":"849_CR1","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1109\/TNNLS.2016.2527796","volume":"4","author":"B Gu","year":"2016","unstructured":"Gu, B., Sheng, V.S.: A robust regularization path algorithm for V-support vector classification. IEEE Trans. Neural Netw. Learn. Syst. 4, 1\u201332 (2016). doi: 10.1109\/TNNLS.2016.2527796","journal-title":"IEEE Trans. Neural Netw. Learn. Syst."},{"key":"849_CR2","doi-asserted-by":"publisher","unstructured":"Gu, B., Sun, X., Sheng, V.S.: Structural minimax probability machine. IEEE Trans. Neural Netw. Learn. Syst. (2016). doi: 10.1109\/TNNLS.2016.2544779","DOI":"10.1109\/TNNLS.2016.2544779"},{"issue":"1","key":"849_CR3","doi-asserted-by":"crossref","first-page":"395","DOI":"10.1016\/j.ins.2014.10.040","volume":"295","author":"XZ Wen","year":"2015","unstructured":"Wen, X.Z., Shao, L., Xue, Y., Fang, W.: A rapid learning algorithm for vehicle classification. Inf. Sci. 295(1), 395\u2013406 (2015)","journal-title":"Inf. Sci."},{"key":"849_CR4","doi-asserted-by":"crossref","unstructured":"Graves, A., Mohamed, A.R., Hinton, G.: Speech recognition with deep recurrent neural networks. In: IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), vol. 2013, pp. 6645\u20136649. IEEE (2013)","DOI":"10.1109\/ICASSP.2013.6638947"},{"key":"849_CR5","first-page":"1","volume":"2016","author":"BB Gupta","year":"2016","unstructured":"Gupta, B.B., Badve, O.P.: Taxonomy of DoS and DDoS attacks and desirable defense mechanism in a cloud computing environment. Neural Comput. Appl. 2016, 1\u201328 (2016)","journal-title":"Neural Comput. Appl."},{"key":"849_CR6","doi-asserted-by":"publisher","unstructured":"Stergiou, C., Psannis, K.E., Kim, B.G., et al.: Secure integration of IoT and cloud computing. Futur. Gener. Comput. Syst. (2016). doi: 10.1016\/j.future.2016.11.031","DOI":"10.1016\/j.future.2016.11.031"},{"issue":"2","key":"849_CR7","doi-asserted-by":"crossref","first-page":"425","DOI":"10.1109\/TC.2013.208","volume":"64","author":"J Li","year":"2015","unstructured":"Li, J., Li, J.W., Chen, X.F., et al.: Identity-based encryption with outsourced revocation in cloud computing. IEEE Trans. Comput. 64(2), 425\u2013437 (2015)","journal-title":"IEEE Trans. Comput."},{"key":"849_CR8","unstructured":"Li, J., Yan, H.Y., Liu, Z.L., et al.: Location-sharing systems with enhanced privacy in mobile online social networks. IEEE Syst. J. (2015)"},{"issue":"12","key":"849_CR9","doi-asserted-by":"crossref","first-page":"3569","DOI":"10.1109\/TC.2015.2401017","volume":"64","author":"J Li","year":"2015","unstructured":"Li, J., Chen, X.F., Huang, X.Y., et al.: Secure distributed deduplication systems with improved reliability. IEEE Trans. Comput. 64(12), 3569\u20133579 (2015)","journal-title":"IEEE Trans. Comput."},{"key":"849_CR10","doi-asserted-by":"crossref","unstructured":"Badve, O.P., Gupta, B.B.: Taxonomy of recent DDoS attack prevention, detection, and response schemes in cloud environment. In: Proceedings of the International Conference on Recent Cognizance in Wireless Communication and Image Processing, pp. 683\u2013693. Springer, Delhi (2016)","DOI":"10.1007\/978-81-322-2638-3_76"},{"key":"849_CR11","doi-asserted-by":"crossref","unstructured":"Gou, Z., Yamaguchi, S., Gupta, B.B.: Analysis of various security issues and challenges in cloud computing environment: a survey. In: Handbook of Research on Modern Cryptographic Solutions for Computer and Cyber Security, pp. 393\u2013419. IGI Global (2016)","DOI":"10.4018\/978-1-5225-0105-3.ch017"},{"issue":"2","key":"849_CR12","first-page":"340","volume":"27","author":"ZH Xia","year":"2015","unstructured":"Xia, Z.H., Wang, X.H., Sun, X.M., et al.: A secure and dynamic multi-keyword ranked search scheme over encrypted cloud data. IEEE Trans. Parallel Distrib. Syst. 27(2), 340\u2013352 (2015)","journal-title":"IEEE Trans. Parallel Distrib. Syst."},{"key":"849_CR13","doi-asserted-by":"crossref","unstructured":"Fu, Z.J., Huang, F.X., Sun, X.M. et al.: Enabling semantic search based on conceptual graphs over encrypted outsourced data. IEEE Trans. Serv. Comput. (2016)","DOI":"10.1109\/TSC.2016.2622697"},{"issue":"9","key":"849_CR14","doi-asserted-by":"crossref","first-page":"2546","DOI":"10.1109\/TPDS.2015.2506573","volume":"27","author":"ZJ Fu","year":"2016","unstructured":"Fu, Z.J., Ren, K., Shu, J.G., et al.: Enabling personalized search over encrypted outsourced data with efficiency improvement. IEEE Trans. Parallel Distrib. Syst. 27(9), 2546\u20132559 (2016)","journal-title":"IEEE Trans. Parallel Distrib. Syst."},{"key":"849_CR15","doi-asserted-by":"crossref","unstructured":"Erkin, Z., Franz, M., Guajardo, J., et al.: Privacy-preserving face recognition. In: International Symposium on Privacy Enhancing Technologies Symposium, pp. 235\u2013253. Springer, Berlin (2009)","DOI":"10.1007\/978-3-642-03168-7_14"},{"issue":"1","key":"849_CR16","doi-asserted-by":"crossref","first-page":"212","DOI":"10.1109\/TPDS.2013.18","volume":"25","author":"JW Yuan","year":"2014","unstructured":"Yuan, J.W., Yu, S.C.: Privacy preserving back-propagation neural network learning made practical with cloud computing. IEEE Trans. Parallel Distrib. Syst. 25(1), 212\u2013221 (2014)","journal-title":"IEEE Trans. Parallel Distrib. Syst."},{"key":"849_CR17","doi-asserted-by":"crossref","unstructured":"Boneh, D., Goh, E.J., Nissim, K.: Evaluating 2-DNF formulas on ciphertexts. In: Theory of Cryptography Conference, pp. 325\u2013341. Springer, Heidelberg (2005)","DOI":"10.1007\/978-3-540-30576-7_18"},{"issue":"5","key":"849_CR18","doi-asserted-by":"crossref","first-page":"1351","DOI":"10.1109\/TC.2015.2470255","volume":"65","author":"Q Zhang","year":"2016","unstructured":"Zhang, Q., Yang, L.T., Chen, Z.: Privacy preserving deep computation model on cloud for big data feature learning. IEEE Trans. Comput. 65(5), 1351\u20131362 (2016)","journal-title":"IEEE Trans. Comput."},{"issue":"3","key":"849_CR19","first-page":"13","volume":"6","author":"Z Brakerski","year":"2014","unstructured":"Brakerski, Z., Gentry, C., Vaikuntanathan, V.: (Leveled) fully homomorphic encryption without bootstrapping. ACM Trans. Comput. Theory (TOCT) 6(3), 13 (2014)","journal-title":"ACM Trans. Comput. Theory (TOCT)"},{"issue":"9","key":"849_CR20","first-page":"169","volume":"2009","author":"C Gentry","year":"2009","unstructured":"Gentry, C.: Fully homomorphic encryption using ideal lattices. STOC 2009(9), 169\u2013178 (2009)","journal-title":"STOC"},{"key":"849_CR21","unstructured":"Goldreich, O.: Secure multi-party computation. Manuscript. Preliminary version, pp. 86\u201397 (1998)"},{"key":"849_CR22","doi-asserted-by":"crossref","unstructured":"Van Dijk, M.. Gentry, C., Halevi, S. et al.: Fully homomorphic encryption over the integers. In: Annual International Conference on the Theory and Applications of Cryptographic Techniques, pp. 24\u201343. Springer, Berlin (2010)","DOI":"10.1007\/978-3-642-13190-5_2"},{"key":"849_CR23","doi-asserted-by":"crossref","unstructured":"Yao, A.C.: How to generate and exchange secrets. In: 27th Annual Symposium on Foundations of Computer Science, vol. 1986, 162\u2013167. IEEE (1986)","DOI":"10.1109\/SFCS.1986.25"},{"key":"849_CR24","unstructured":"Schlitter, N.: A protocol for privacy preserving neural network learning on horizontally partitioned data. PSD (2008)"},{"issue":"2","key":"849_CR25","doi-asserted-by":"crossref","first-page":"439","DOI":"10.1145\/335191.335438","volume":"29","author":"D Agrawal","year":"2000","unstructured":"Agrawal, D., Srikant, R.: Privacy-preserving data mining. Proc. ACM Conf. Manag. Data 29(2), 439\u2013450 (2000)","journal-title":"Proc. ACM Conf. Manag. Data"},{"issue":"4","key":"849_CR26","doi-asserted-by":"crossref","first-page":"879","DOI":"10.1007\/s00778-006-0041-y","volume":"17","author":"J Vaidya","year":"2008","unstructured":"Vaidya, J., Kantarco\u01e7lu, M., Clifton, C.: Privacy-preserving naive bayes classification. VLDB J. Int. J. Very Large Data Bases 17(4), 879\u2013898 (2008)","journal-title":"Int. J. Very Large Data Bases"},{"key":"849_CR27","unstructured":"Samanthula, B.K., Rao, F.Y., Bertino, E., et al.: Privacy-Preserving and Outsourced Multi-User k-Means Clustering. arXiv preprint arXiv:1412.4378 (2014)"},{"key":"849_CR28","doi-asserted-by":"crossref","unstructured":"Jagannathan, G., Wright, R.: Privacy-preserving distributed k-means clustering over arbitrarily partitioned data. In: Proceedings of the Eleventh ACM SIGKDD International Conference on Knowledge Discovery in Data Mining, pp. 593\u2013599. ACM (2005)","DOI":"10.1145\/1081870.1081942"},{"issue":"3","key":"849_CR29","doi-asserted-by":"crossref","first-page":"885","DOI":"10.1007\/s10115-016-0923-2","volume":"49","author":"KP Lin","year":"2016","unstructured":"Lin, K.P.: Privacy-preserving kernel k-means clustering outsourcing with random transformation. Knowl. Inf. Syst. 49(3), 885\u2013908 (2016)","journal-title":"Knowl. Inf. Syst."},{"key":"849_CR30","doi-asserted-by":"crossref","unstructured":"Vaidya, J., Clifton, C.: Privacy preserving association rule mining in vertically partitioned data. In: Proceedings of the Eighth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 639\u2013644. ACM (2002)","DOI":"10.1145\/775047.775142"},{"issue":"2","key":"849_CR31","doi-asserted-by":"crossref","first-page":"439","DOI":"10.1145\/335191.335438","volume":"29","author":"R Agrawal","year":"2000","unstructured":"Agrawal, R., Srikant, R.: Privacy-preserving data mining. ACM Sigmod Record. ACM 29(2), 439\u2013450 (2000)","journal-title":"ACM Sigmod Record. ACM"},{"issue":"1","key":"849_CR32","first-page":"3","volume":"8","author":"FK Dankar","year":"2015","unstructured":"Dankar, F.K.: Privacy preserving linear regression on distributed databases. Trans. Data Priv. 8(1), 3\u201328 (2015)","journal-title":"Trans. Data Priv."},{"key":"849_CR33","unstructured":"Dankar, F., Brien, R., Adams, C., Matwin, S.: Secure multi-party linear regression. In: EDBT\/ICDT Workshops, p. 406414 (2014)"},{"issue":"3","key":"849_CR34","doi-asserted-by":"crossref","first-page":"14","DOI":"10.1145\/1409620.1409624","volume":"2","author":"J Vaidya","year":"2008","unstructured":"Vaidya, J., Clifton, C., Kantarcioglu, M., et al.: Privacy-preserving decision trees over vertically partitioned data. ACM Trans. Knowl. Discov. from Data (TKDD) 2(3), 14 (2008)","journal-title":"ACM Trans. Knowl. Discov. from Data (TKDD)"},{"issue":"1","key":"849_CR35","doi-asserted-by":"crossref","first-page":"143","DOI":"10.1007\/s00521-010-0346-z","volume":"20","author":"A Bansal","year":"2011","unstructured":"Bansal, A., Chen, T., Zhong, S.: Privacy preserving back-propagation neural network learning over arbitrarily partitioned data. Neural Comput. Appl. 20(1), 143\u2013150 (2011)","journal-title":"Neural Comput. Appl."},{"issue":"10","key":"849_CR36","doi-asserted-by":"crossref","first-page":"1554","DOI":"10.1109\/TNN.2009.2026902","volume":"20","author":"TT Chen","year":"2009","unstructured":"Chen, T.T., Zhong, S.: Privacy-preserving back-propagation neural network learning. IEEE Trans. Neural Netw. 20(10), 1554\u20131564 (2009)","journal-title":"IEEE Trans. Neural Netw."},{"key":"849_CR37","first-page":"121","volume-title":"Information Security and Cryptology (ICISC)","author":"T Graepel","year":"2012","unstructured":"Graepel, T., Lauter, K., Naehrig, M.: ML confidential: Machine learning on encrypted data. Information Security and Cryptology (ICISC), p. 121. Springer, Berlin (2012)"},{"key":"849_CR38","doi-asserted-by":"crossref","unstructured":"Shokri, R., Shmatikov, V.: Privacy-preserving deep learning. In: Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, pp. 1310\u20131321. ACM (2015)","DOI":"10.1145\/2810103.2813687"},{"key":"849_CR39","doi-asserted-by":"crossref","unstructured":"Barni, M., Failla, P., Lazzeretti, R.: Efficient privacy-preserving classification of ECG signals. In: First IEEE International Workshop on, Information Forensics and Security, et al.: WIFS 2009, pp. 91\u201395. IEEE (2009)","DOI":"10.1109\/WIFS.2009.5386475"},{"issue":"2","key":"849_CR40","doi-asserted-by":"crossref","first-page":"655","DOI":"10.1109\/JBHI.2015.2407157","volume":"20","author":"X Liu","year":"2016","unstructured":"Liu, X., Lu, R., Ma, J., et al.: Privacy-preserving patient-centric clinical decision support system on naive Bayesian classification. IEEE J. Biomed. Health Inf. 20(2), 655\u2013668 (2016)","journal-title":"IEEE J. Biomed. Health Inf."},{"key":"849_CR41","doi-asserted-by":"crossref","unstructured":"Bost, R., Popa, R.A., Tu, S., Goldwasser, S.: Machine learning classification over encrypted data. NDSS (2015)","DOI":"10.14722\/ndss.2015.23241"},{"issue":"1","key":"849_CR42","doi-asserted-by":"crossref","first-page":"172","DOI":"10.1109\/TIFS.2016.2607691","volume":"12","author":"T Zhang","year":"2017","unstructured":"Zhang, T., Zhu, Q.: Dynamic differential privacy for ADMM-based distributed classification learning. IEEE Trans. Inf. Forensics Secur. 12(1), 172\u2013187 (2017)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"849_CR43","unstructured":"Di Vimercati, S.D.C., Foresti, S., Jajodia, S., et al.: Over-encryption: management of access control evolution on outsourced data. In: Proceedings of the 33rd International Conference on Very Large Data Bases. VLDB endowment, pp. 123\u2013134 (2007)"},{"issue":"2","key":"849_CR44","doi-asserted-by":"crossref","first-page":"270","DOI":"10.1016\/0022-0000(84)90070-9","volume":"28","author":"S Goldwasser","year":"1984","unstructured":"Goldwasser, S., Micali, S.: Probabilistic encryption. J. Comput. Syst. Sci. 28(2), 270\u2013299 (1984)","journal-title":"J. Comput. Syst. Sci."}],"container-title":["Cluster Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10586-017-0849-9\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10586-017-0849-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10586-017-0849-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,20]],"date-time":"2019-09-20T16:15:49Z","timestamp":1568996149000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10586-017-0849-9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,4,8]]},"references-count":44,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2018,3]]}},"alternative-id":["849"],"URL":"https:\/\/doi.org\/10.1007\/s10586-017-0849-9","relation":{},"ISSN":["1386-7857","1573-7543"],"issn-type":[{"value":"1386-7857","type":"print"},{"value":"1573-7543","type":"electronic"}],"subject":[],"published":{"date-parts":[[2017,4,8]]}}}