{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,19]],"date-time":"2026-01-19T14:35:27Z","timestamp":1768833327043,"version":"3.49.0"},"reference-count":39,"publisher":"Springer Science and Business Media LLC","issue":"18","license":[{"start":{"date-parts":[[2023,6,20]],"date-time":"2023-06-20T00:00:00Z","timestamp":1687219200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,6,20]],"date-time":"2023-06-20T00:00:00Z","timestamp":1687219200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Supercomput"],"published-print":{"date-parts":[[2023,12]]},"DOI":"10.1007\/s11227-023-05495-7","type":"journal-article","created":{"date-parts":[[2023,6,20]],"date-time":"2023-06-20T09:02:20Z","timestamp":1687251740000},"page":"21310-21345","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["Secure kNN query of outsourced spatial data using two-cloud architecture"],"prefix":"10.1007","volume":"79","author":[{"given":"Tasneem","family":"Ghunaim","sequence":"first","affiliation":[]},{"given":"Ibrahim","family":"Kamel","sequence":"additional","affiliation":[]},{"given":"Zaher","family":"Al Aghbari","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,6,20]]},"reference":[{"key":"5495_CR1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2016.12.006","author":"Z Liu","year":"2017","unstructured":"Liu Z, Choo KKR, Zhao M (2017) Practical-oriented protocols for privacy-preserving outsourced big data analysis: challenges and future research directions. Comput Secur. https:\/\/doi.org\/10.1016\/j.cose.2016.12.006","journal-title":"Comput Secur"},{"key":"5495_CR2","unstructured":"Hashim A (2020) Sina Weibo suffered data breach exposing 538 million records now on sale. https:\/\/latesthackingnews.com\/2020\/03\/24\/sina-weibo-suffered-data-breach-exposing-538-million-records-now-on-sale\/#:~:text=SinaWeiboDataBreachReportedly%2CChinesesiteSina,Shu%29%2CCTOMoresec%2CpostedaboutitonWeibo. Accessed 13 Feb 2021"},{"key":"5495_CR3","unstructured":"CBSNewYork (2020) Data breach. CBSNewYork"},{"key":"5495_CR4","doi-asserted-by":"publisher","first-page":"212","DOI":"10.1109\/TDSC.2013.6","volume":"10","author":"JM Bohli","year":"2013","unstructured":"Bohli JM, Gruschka N, Jensen M et al (2013) Security and privacy-enhancing multicloud architectures. IEEE Trans Dependable Secure Comput 10:212\u2013224. https:\/\/doi.org\/10.1109\/TDSC.2013.6","journal-title":"IEEE Trans Dependable Secure Comput"},{"key":"5495_CR5","volume-title":"Encyclopedia of cryptography and security","author":"B Schoenmakers","year":"2011","unstructured":"Schoenmakers B (2011) Homomorphic encryption. In: van Tilborg HCA, Jajodia S (eds) Encyclopedia of cryptography and security. Springer, Boston"},{"key":"5495_CR6","volume-title":"Encyclopedia of cryptography and security","author":"P Paillier","year":"2011","unstructured":"Paillier P (2011) Paillier encryption and signature schemes. In: van Tilborg HCA, Jajodia S (eds) Encyclopedia of cryptography and security. Springer, Boston"},{"key":"5495_CR7","doi-asserted-by":"publisher","DOI":"10.1155\/2017\/8109730","author":"J Hong","year":"2017","unstructured":"Hong J, Wen T, Guo Q, Ye Z (2017) Secure kNN computation and integrity assurance of data outsourcing in the cloud. Math Probl Eng. https:\/\/doi.org\/10.1155\/2017\/8109730","journal-title":"Math Probl Eng"},{"key":"5495_CR8","doi-asserted-by":"publisher","unstructured":"White DA, Jain R (1996) Similarity indexing with the SS-tree. In: Proceedings\u2014International Conference on Data Engineering, pp 516\u2013523. https:\/\/doi.org\/10.1109\/icde.1996.492202","DOI":"10.1109\/icde.1996.492202"},{"key":"5495_CR9","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-47974-2","volume-title":"Introduction to cryptography principles and applications","author":"H Delfs","year":"2015","unstructured":"Delfs H, Knebl H (2015) Introduction to cryptography principles and applications, 3rd edn. Springer, Berlin","edition":"3"},{"key":"5495_CR10","doi-asserted-by":"crossref","unstructured":"Goethals B, Laur S, Lipmaa H, Mielik T (2004) On private scalar product computation for privacy-preserving data mining Bart. In: International Conference on Information Security and Cryptology, vol 3506, pp 104\u2013120","DOI":"10.1007\/11496618_9"},{"key":"5495_CR11","unstructured":"Oliveira SRM, Za\u00efane OR (2003) Privacy preserving clustering by data transformation. In: Proceedings of the 18th Brazilian Symposium on Databases, vol 1, pp 304\u2013318. 10.1.1.2.42"},{"key":"5495_CR12","doi-asserted-by":"publisher","unstructured":"Zhu X, Wu J, Chang W, et al (2019) Authentication of multi-dimensional top-K query on untrusted server. In: IEEE\/ACM 26th International Symposium on Quality of Service, IWQoS, pp 1\u20136. https:\/\/doi.org\/10.1109\/IWQoS.2018.8624145","DOI":"10.1109\/IWQoS.2018.8624145"},{"key":"5495_CR13","doi-asserted-by":"publisher","unstructured":"Yang G, Cai Y, Hu Z (2016) Authentication of function queries. In: IEEE 32nd International Conference on Data Engineering, ICDE 2016, pp 337\u2013348. https:\/\/doi.org\/10.1109\/ICDE.2016.7498252","DOI":"10.1109\/ICDE.2016.7498252"},{"key":"5495_CR14","doi-asserted-by":"publisher","unstructured":"Liu AX, Li R (2021) K-nearest neighbor queries over encrypted data. Algorithms for data and computation privacy. Springer, pp 79\u2013108. https:\/\/doi.org\/10.1007\/978-3-030-58896-0","DOI":"10.1007\/978-3-030-58896-0"},{"key":"5495_CR15","doi-asserted-by":"publisher","first-page":"422","DOI":"10.1145\/362686.362692","volume":"13","author":"BH Bloom","year":"1970","unstructured":"Bloom BH (1970) Space\/time trade-offs in hash coding with allowable errors. Commun ACM 13:422\u2013426. https:\/\/doi.org\/10.1145\/362686.362692","journal-title":"Commun ACM"},{"key":"5495_CR16","doi-asserted-by":"crossref","unstructured":"Wong WK, Cheung DW, Kao B, Mamoulis N (2009) Secure kNN encrypted databases. In: Proceedings of the 2009 ACM SIGMOD International Conference on Management of Data, pp 139\u2013152","DOI":"10.1145\/1559845.1559862"},{"key":"5495_CR17","doi-asserted-by":"publisher","unstructured":"Hu H, Xu J, Ren C, Choi B (2011) Processing private queries over untrusted data cloud through privacy homomorphism. In: Proceedings\u2014International Conference on Data Engineering, pp 601\u2013612. https:\/\/doi.org\/10.1109\/ICDE.2011.5767862","DOI":"10.1109\/ICDE.2011.5767862"},{"key":"5495_CR18","doi-asserted-by":"publisher","unstructured":"Yi X, Paulet R, Bertino E, Varadharajan V (2014) Practical k nearest neighbor queries with location privacy. In: Proceedings\u2014International Conference on Data Engineering, pp 640\u2013651. https:\/\/doi.org\/10.1109\/ICDE.2014.6816688","DOI":"10.1109\/ICDE.2014.6816688"},{"key":"5495_CR19","doi-asserted-by":"crossref","unstructured":"Wang B, Hou Y, Li M (2016) Practical and secure nearest neighbor search on encrypted large-scale data. In: Proceedings\u2014IEEE Conference on Computer Communications, INFOCOM","DOI":"10.1109\/INFOCOM.2016.7524389"},{"key":"5495_CR20","doi-asserted-by":"publisher","unstructured":"Yao B, Li F, Xiao X (2013) Secure nearest neighbor revisited. In: Proceedings\u2014International Conference on Data Engineering, pp 733\u2013744. https:\/\/doi.org\/10.1109\/ICDE.2013.6544870","DOI":"10.1109\/ICDE.2013.6544870"},{"key":"5495_CR21","first-page":"350","volume":"62","author":"H Demsetz","year":"2020","unstructured":"Demsetz H, Alchian A (2020) One-time, oblivious, and unlinkable query processing over encrypted data on cloud. Inf Commun Secur 62:350\u2013365","journal-title":"Inf Commun Secur"},{"key":"5495_CR22","volume-title":"Privacy preserving outsourced k nearest neighbors classification: comprehensive study","author":"VS Gaikwad","year":"2022","unstructured":"Gaikwad VS, Walse KH, Thakare VM (2022) Privacy preserving outsourced k nearest neighbors classification: comprehensive study. Springer, Singapore"},{"key":"5495_CR23","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2021.102456","volume":"111","author":"F Sun","year":"2021","unstructured":"Sun F, Yu J, Ge X et al (2021) Constrained top-k nearest fuzzy keyword queries on encrypted graph in road network. Comput Secur 111:102456. https:\/\/doi.org\/10.1016\/j.cose.2021.102456","journal-title":"Comput Secur"},{"key":"5495_CR24","doi-asserted-by":"publisher","unstructured":"Yang Y, Miao Y, Choo KKR, Deng RH (2022) Lightweight privacy-preserving spatial keyword query over encrypted cloud data. In: Proceedings\u2014International Conference on Distributed Computing Systems 2022-July, pp 392\u2013402. https:\/\/doi.org\/10.1109\/ICDCS54860.2022.00045","DOI":"10.1109\/ICDCS54860.2022.00045"},{"key":"5495_CR25","doi-asserted-by":"publisher","DOI":"10.1155\/2022\/7333175","author":"Z Song","year":"2022","unstructured":"Song Z, Ren Y, He G (2022) Privacy-preserving KNN classification algorithm for smart grid. Secur Commun Netw. https:\/\/doi.org\/10.1155\/2022\/7333175","journal-title":"Secur Commun Netw"},{"key":"5495_CR26","volume-title":"Foundations of cryptography: basic applications","author":"G Oded","year":"2004","unstructured":"Oded G (2004) Foundations of cryptography: basic applications, vol 2. Cambridge University Press, Cambridge"},{"key":"5495_CR27","doi-asserted-by":"publisher","unstructured":"Mohassel P, Zhang Y (2017) SecureML: a system for scalable privacy-preserving machine learning. In: Proceedings\u2014IEEE Symposium on Security and Privacy, pp 19\u201338. https:\/\/doi.org\/10.1109\/SP.2017.12","DOI":"10.1109\/SP.2017.12"},{"key":"5495_CR28","unstructured":"Data61 C (2018) Python Paillier documentation"},{"key":"5495_CR29","unstructured":"Openstreetmap. https:\/\/www.openstreetmap.org"},{"key":"5495_CR30","doi-asserted-by":"publisher","unstructured":"Paillier P (1999) Public-key cryptosystems based on composite degree residuosity classes. In: Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), vol 1592, pp 223\u2013238. https:\/\/doi.org\/10.1007\/3-540-48910-X_16","DOI":"10.1007\/3-540-48910-X_16"},{"key":"5495_CR31","doi-asserted-by":"crossref","unstructured":"Cai C, Awano H, Ikeda M (2019) High-speed ASIC implementation of Paillier cryptosystem with homomorphism. In: IEEE 13th International Conference on ASIC, pp 1\u20134","DOI":"10.1109\/ASICON47005.2019.8983588"},{"key":"5495_CR32","first-page":"864","volume":"8","author":"C Jost","year":"2015","unstructured":"Jost C, Lam H, Maximov A, Smeets B (2015) Encryption performance improvements of the Paillier cryptosystem. IACR Cryptol Int Assoc Cryptol Res 8:864","journal-title":"IACR Cryptol Int Assoc Cryptol Res"},{"key":"5495_CR33","doi-asserted-by":"publisher","unstructured":"Harerimana R, Tan SY, Yau WC (2017) A Java implementation of Paillier homomorphic encryption scheme. In: 2017 5th International Conference on Information and Communication Technology, ICoIC7 2017 0. https:\/\/doi.org\/10.1109\/ICoICT.2017.8074646","DOI":"10.1109\/ICoICT.2017.8074646"},{"key":"5495_CR34","doi-asserted-by":"publisher","first-page":"1596","DOI":"10.1109\/TIFS.2017.2675864","volume":"12","author":"K Xue","year":"2017","unstructured":"Xue K, Li S, Hong J et al (2017) Two-cloud secure database for numeric-related SQL range queries with privacy preserving. IEEE Trans Inf Forensics Secur 12:1596\u20131608. https:\/\/doi.org\/10.1109\/TIFS.2017.2675864","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"5495_CR35","doi-asserted-by":"publisher","first-page":"1","DOI":"10.3390\/computers9010001","volume":"9","author":"YC Hsu","year":"2020","unstructured":"Hsu YC, Hsueh CH, Wu JL (2020) A privacy preserving cloud-based K-NN search scheme with lightweight user loads. Computers 9:1\u201327. https:\/\/doi.org\/10.3390\/computers9010001","journal-title":"Computers"},{"key":"5495_CR36","doi-asserted-by":"publisher","first-page":"261","DOI":"10.1007\/978-3-031-15777-6","volume":"1","author":"M Li","year":"2022","unstructured":"Li M, Zhang M, Gao J et al (2022) Repetitive, oblivious, and unlinkable SkNN over encrypted-and-updated data on cloud. Inf Commun Secur 1:261\u2013280. https:\/\/doi.org\/10.1007\/978-3-031-15777-6","journal-title":"Inf Commun Secur"},{"key":"5495_CR37","doi-asserted-by":"publisher","first-page":"11","DOI":"10.1016\/j.tcs.2016.08.003","volume":"651","author":"P D\u2019Arco","year":"2016","unstructured":"D\u2019Arco P, De Prisco R (2016) Secure computation without computers. Theor Comput Sci 651:11\u201336. https:\/\/doi.org\/10.1016\/j.tcs.2016.08.003","journal-title":"Theor Comput Sci"},{"key":"5495_CR38","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1155\/2018\/6909703","volume":"2018","author":"Y Zhu","year":"2018","unstructured":"Zhu Y, Zhang Y, Yuan J, Wang X (2018) FTP: an approximate fast privacy-preserving equality test protocol for authentication in Internet of Things. Secur Commun Netw 2018:1\u20139. https:\/\/doi.org\/10.1155\/2018\/6909703","journal-title":"Secur Commun Netw"},{"key":"5495_CR39","first-page":"205","volume-title":"Encyclopedia of cryptography and security","author":"A Biryukov","year":"2011","unstructured":"Biryukov A (2011) Chosen plaintext and chosen ciphertext attack. In: van Tilborg HCA, Jajodia S (eds) Encyclopedia of cryptography and security. Springer, Boston, p 205"}],"container-title":["The Journal of Supercomputing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11227-023-05495-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11227-023-05495-7\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11227-023-05495-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,10,20]],"date-time":"2023-10-20T21:12:03Z","timestamp":1697836323000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11227-023-05495-7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,6,20]]},"references-count":39,"journal-issue":{"issue":"18","published-print":{"date-parts":[[2023,12]]}},"alternative-id":["5495"],"URL":"https:\/\/doi.org\/10.1007\/s11227-023-05495-7","relation":{},"ISSN":["0920-8542","1573-0484"],"issn-type":[{"value":"0920-8542","type":"print"},{"value":"1573-0484","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,6,20]]},"assertion":[{"value":"8 June 2023","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"20 June 2023","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no known competing financial interests or personal relationships that could have appeared to influence the work reported in this paper.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}},{"value":"Not applicable.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical approval"}}]}}