Research Article

Secure kNN Computation and Integrity Assurance of Data Outsourcing in the Cloud

Figure 5

Encryption time.
(a) Encryption time versus data cardinality
(b) Encryption time versus dimension