• Àüü
  • ÀüÀÚ/Àü±â
  • Åë½Å
  • ÄÄÇ»ÅÍ
´Ý±â

»çÀÌÆ®¸Ê

Loading..

Please wait....

±¹³» ³í¹®Áö

Ȩ Ȩ > ¿¬±¸¹®Çå > ±¹³» ³í¹®Áö > Çѱ¹Á¤º¸Ã³¸®ÇÐȸ ³í¹®Áö > Á¤º¸Ã³¸®ÇÐȸ ³í¹®Áö ¼ÒÇÁÆ®¿þ¾î ¹× µ¥ÀÌÅÍ °øÇÐ

Á¤º¸Ã³¸®ÇÐȸ ³í¹®Áö ¼ÒÇÁÆ®¿þ¾î ¹× µ¥ÀÌÅÍ °øÇÐ

Current Result Document : 40 / 128 ÀÌÀü°Ç ÀÌÀü°Ç   ´ÙÀ½°Ç ´ÙÀ½°Ç

ÇѱÛÁ¦¸ñ(Korean Title) ¾Æ¿ô¼Ò½Ì ¾Ïȣȭ µ¥ÀÌÅÍ¿¡ ´ëÇÑ È¿À²ÀûÀÎ Top-k ÁúÀÇ Ã³¸® ¾Ë°í¸®Áò
¿µ¹®Á¦¸ñ(English Title) Outsourced-Data in the Cloud
ÀúÀÚ(Author) ±èÁ¾¿í   ¼­¿µ±Õ   Jong Wook Kim   Young-Kyoon Suh  
¿ø¹®¼ö·Ïó(Citation) VOL 04 NO. 12 PP. 0543 ~ 0548 (2015. 12)
Çѱ۳»¿ë
(Korean Abstract)
ÃÖ±Ù ´Ù¾çÇÑ ºÐ¾ß¿¡¼­ »ý»êµÇ´Â µ¥ÀÌÅÍÀÇ ¾çÀÌ Æø¹ßÀûÀ¸·Î Áõ°¡ÇÔ¿¡ µû¶ó »ç¿ëÀÚ°¡ °¡Àå °ü½É ÀÖ¾î ÇÏ´Â ¸î °³ÀÇ µ¥ÀÌÅ͸¦ °Ë»öÇÏ´Â top-k ÁúÀÇ¿¡ ´ëÇÑ °ü½ÉÀÌ °íÁ¶µÇ°í ÀÖ´Ù. Top-k ÁúÀÇ´Â »ç¿ëÀÚÀÇ Á¡¼ö ÇÔ¼ö¸¦ ÀÌ¿ëÇÏ¿©, »ç¿ëÀÚ°¡ ¿øÇÏ´Â ¸ðµç Á¶°ÇÀ» ¸¸Á·½ÃÅ°´Â µ¥ÀÌÅ͵é Áß¿¡¼­ ÃÖ»óÀ§ (¶Ç´Â ÃÖÇÏÀ§) Á¡¼ö¸¦ °¡Áö´Â k°³ÀÇ µ¥ÀÌÅ͸¦ »ç¿ëÀÚ¿¡°Ô ¹ÝȯÇÑ´Ù. ÃÖ±Ù µé¾î Ŭ¶ó¿ìµå ÄÄÇ»Æà ¼­ºñ½ºÀÇ ´ëÁßÈ­·Î ÀÎÇÏ¿© »ç¿ëÀÚÀÇ ´ë¿ë·® µ¥ÀÌÅ͸¦ Ŭ¶ó¿ìµå¿¡ ¾Æ¿ô¼Ò½ÌÇÏ¿© °æÁ¦ÀûÀ¸·Î ÀúÀå ¹× °ü¸®ÇÏ´Â µ¥ÀÌÅÍ ¾Æ¿ô¼Ò½ÌÀÌ Å©°Ô ÁÖ¸ñ¹Þ°í ÀÖ´Ù. ±×·¯³ª µ¥ÀÌÅÍ ¾Æ¿ô¼Ò½ÌÀ¸·Î ÀÎÇÏ¿© »ç¿ëÀÚÀÇ ¹Î°¨ÇÑ µ¥ÀÌÅÍ°¡ Ŭ¶ó¿ìµå ¼­ºñ½º Á¦°øÀÚ¿¡°Ô ³ëÃâµÉ ¼ö ÀÖ´Ù´Â À§ÇèÀÌ Á¸ÀçÇϸç, ÀÌ·¯ÇÑ ¹®Á¦¸¦ ¹æÁöÇϱâ À§Çؼ­´Â »ç¿ëÀÚÀÇ ¹Î°¨ÇÑ µ¥ÀÌÅ͸¦ ¾ÏȣȭÇÏ¿© Ŭ¶ó¿ìµå¿¡ ÀúÀåÇÏ´Â °ÍÀÌ ÇʼöÀûÀ¸·Î ¿ä±¸µÈ´Ù. º» ³í¹®Àº Ŭ¶ó¿ìµå ÄÄÇ»Æà ȯ°æ¿¡¼­ ¾ÏȣȭµÈ µ¥ÀÌÅÍ¿¡ ´ëÇÑ top-k ÁúÀǸ¦ È¿À²ÀûÀ¸·Î ó¸®ÇÏ´Â ¾Ë°í¸®ÁòÀ» Á¦¾ÈÇÑ´Ù. Á¦¾ÈµÇ´Â ¾Ë°í¸®ÁòÀº ¼ø¼­º¸Á¸ ¾Ïȣȭ ±â¹ýÀ» ÀÌ¿ëÇÏ¿©, ¾ÏȣȭµÈ µ¥ÀÌÅ͸¸À» ´ë»óÀ¸·Î top-k ÁúÀÇ °á°ú¿¡ Æ÷ÇÔµÇÁö ¾ÊÀ» °ÍÀ¸·Î ¿¹»óµÇ´Â Áß°£ °á°úµéÀ» Ŭ¶ó¿ìµå ³»¿¡¼­ ¹Ì¸® Á¦°ÅÇÔÀ¸·Î½á È¿À²ÀûÀÎ top-k ÁúÀÇ Ã³¸®°¡ °¡´ÉÇÏ°Ô ÇÑ´Ù. ³í¹®ÀÇ ½ÇÇè °á°ú´Â Á¦¾ÈµÈ top-k ÁúÀÇ Ã³¸® ¾Ë°í¸®ÁòÀÌ ´Ü¼ø ¹æ¹ý°ú ºñ±³ÇÏ¿© »ç¿ëÀÚ ½Ã½ºÅÛÀÇ ºÎÇϸ¦ 10¹è¢¦10000¹è ÁÙÀÏ ¼ö ÀÖÀ½À» Áõ¸íÇÑ´Ù.
¿µ¹®³»¿ë
(English Abstract)
Recently top-k query processing has been extremely important along with the explosion of data produced by a variety of applications. Top-k queries return the best k results ordered by a user-provided monotone scoring function. As cloud computing service has been getting more popular than ever, a hot attention has been paid to cloud-based data outsourcing in which clients' data are stored and managed by the cloud. The cloud-based data outsourcing, though, exposes a critical secuity concern of sensitive data, resulting in the misuse of unauthorized users. Hence it is essential to encrypt sensitive data before outsourcing the data to the cloud. However, there has been little attention to efficient top-k processing on the encrypted cloud data. In this paper we propose a novel top-k processing algorithm that can efficiently process a large amount of encrypted data in the cloud. The main idea of the algorithm is to prune unpromising intermediate results at the early phase without decrypting the encrypted data by leveraging an order-preserving encrypted technique. Experiment results show that the proposed top-k processing algorithm significantly reduces the overhead of client systems from 10X to 10000X.
Å°¿öµå(Keyword) Ŭ¶ó¿ìµå ÄÄÇ»Æà  ¾Ïȣȭ   Top-k ÁúÀÇ   Cloud Computing   Encryption   Top-k Query  
ÆÄÀÏ÷ºÎ PDF ´Ù¿î·Îµå