Fig 1.
Database outsourcing model.
Table 1.
Comparison of existing studies.
Table 2.
Definitions of common notations.
Fig 2.
Overall system architecture.
Table 3.
A comparison of amount in secure protocols.
Fig 3.
Proposed parallel kNN classification algorithm.
Fig 4.
Data and query used in example.
Fig 5.
Example of secure index search phase.
Fig 6.
Example of kNN search phase.
Fig 7.
Example of index search in kNN verification phase.
Fig 8.
Example of k-nearest neighbor search in kNN verification phase.
Fig 9.
Example of kNN classification phase.
Table 4.
Parameters used in performance evaluation for synthetic data.
Fig 10.
Processing time with varying the number of data.
Fig 11.
Processing time with varying k.
Fig 12.
Processing time with varying the number of dimensions.
Fig 13.
Processing time with varying the number of threads.
Table 5.
Parameters used in performance evaluation for real data.
Fig 14.
Processing time with varying k.
Fig 15.
Processing time with varying the number of threads.
Fig 16.
Brute force attack time with varying the key size.