Skip to main content
Advertisement
Browse Subject Areas
?

Click through the PLOS taxonomy to find articles in your field.

For more information about PLOS Subject Areas, click here.

< Back to Article

Fig 1.

Database outsourcing model.

More »

Fig 1 Expand

Table 1.

Comparison of existing studies.

More »

Table 1 Expand

Table 2.

Definitions of common notations.

More »

Table 2 Expand

Fig 2.

Overall system architecture.

More »

Fig 2 Expand

Table 3.

A comparison of amount in secure protocols.

More »

Table 3 Expand

Fig 3.

Proposed parallel kNN classification algorithm.

More »

Fig 3 Expand

Fig 4.

Data and query used in example.

More »

Fig 4 Expand

Fig 5.

Example of secure index search phase.

More »

Fig 5 Expand

Fig 6.

Example of kNN search phase.

More »

Fig 6 Expand

Fig 7.

Example of index search in kNN verification phase.

More »

Fig 7 Expand

Fig 8.

Example of k-nearest neighbor search in kNN verification phase.

More »

Fig 8 Expand

Fig 9.

Example of kNN classification phase.

More »

Fig 9 Expand

Table 4.

Parameters used in performance evaluation for synthetic data.

More »

Table 4 Expand

Fig 10.

Processing time with varying the number of data.

More »

Fig 10 Expand

Fig 11.

Processing time with varying k.

More »

Fig 11 Expand

Fig 12.

Processing time with varying the number of dimensions.

More »

Fig 12 Expand

Fig 13.

Processing time with varying the number of threads.

More »

Fig 13 Expand

Table 5.

Parameters used in performance evaluation for real data.

More »

Table 5 Expand

Fig 14.

Processing time with varying k.

More »

Fig 14 Expand

Fig 15.

Processing time with varying the number of threads.

More »

Fig 15 Expand

Fig 16.

Brute force attack time with varying the key size.

More »

Fig 16 Expand