An Effective Encrypted Scheme Over Outsourcing Data for Query on Cloud Platform
نویسندگان
چکیده
منابع مشابه
Private Key based query on encrypted data
Nowadays, users of information systems have inclination to use a central server to decrease data transferring and maintenance costs. Since such a system is not so trustworthy, users' data usually upkeeps encrypted. However, encryption is not a nostrum for security problems and cannot guarantee the data security. In other words, there are some techniques that can endanger security of encrypted d...
متن کاملData Mining Over Encrypted Data on Cloud
Data Mining has wide applications in many areas such as medicine, scientific, banking, research and among government agencies. For the past decade, due to the rise of various privacy issues, many theoretical and practical solutions to the classification problem have been proposed under different security models. Classification is one of the commonly used tasks in data mining applications Howeve...
متن کاملSESOS: A Verifiable Searchable Outsourcing Scheme for Ordered Structured Data in Cloud Computing
While cloud computing is growing at a remarkable speed, privacy issues are far from being solved. One way to diminish privacy concerns is to store data on the cloud in encrypted form. However, encryption often hinders useful computation cloud services. A theoretical approach is to employ the so-called fully homomorphic encryption, yet the overhead is so high that it is not considered a viable s...
متن کاملA query privacy-enhanced and secure search scheme over encrypted data in cloud computing
Article history: Received 17 December 2015 Received in revised form 4 December 2016 Accepted 16 December 2016 Available online xxxx
متن کاملThe Survey of an Efficient Search Scheme over Encrypted Data on Mobile Cloud Tees
Cloud storage provides a convenient and more storage at low cost, but data security is a main concept that prevents users from storing documents on the cloud. One of the methods for improving security from the data owner point of view is to encrypt the document before outsourcing them onto the cloud and decrypt the documents after downloading them. In this paper there is some limitation as foll...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IEEE Access
سال: 2019
ISSN: 2169-3536
DOI: 10.1109/access.2019.2917227