نتایج جستجو برای: encrypted database

تعداد نتایج: 273905  

Journal: :CoRR 2016
Sudharaka Palamakumbura Hamid Usefi

Homomorphic encryption is an encryption method that enables computing over encrypted data. This has a wide range of real world ramifications such as being able to blindly compute a search result sent to a remote server without revealing its content. This paper discusses how database search queries can be made secure using a homomorphic encryption scheme. We propose a new database search techniq...

Journal: :IEEE Communications Letters 2023

Semantic communication is implemented based on shared background knowledge, but the sharing mechanism risks privacy leakage. In this letter, we propose an encrypted semantic system (ESCS) for preserving, which combines universality and confidentiality. The reflected in fact that structures of all network modules proposed ESCS are public, training database shared, suitable large-scale deployment...

2017
Claudio Hidalgo-Cantabrana Marco A. Moro-García Aitor Blanco-Míguez Florentino Fdez-Riverola Anália Lourenço Rebeca Alonso-Arias Borja Sánchez

Scientific studies focused on the role of the human microbiome over human health have generated billions of gigabits of genetic information during the last decade. Nowadays integration of all this information in public databases and development of pipelines allowing us to biotechnologically exploit this information are urgently needed. Prediction of the potential bioactivity of the products enc...

Journal: :IACR Cryptology ePrint Archive 2007
Dan Boneh Eyal Kushilevitz Rafail Ostrovsky William E. Skeith

Consider the following problem: Alice wishes to maintain her email using a storage-provider Bob (such as a Yahoo! or hotmail e-mail account). This storage-provider should provide for Alice the ability to collect, retrieve, search and delete emails but, at the same time, should learn neither the content of messages sent from the senders to Alice (with Bob as an intermediary), nor the search crit...

2009
William Harrower Changyu Dong

Company data are very often outsourced to datacentres in order to lower costs of maintaining hardware. If the outsourced data are to be kept secure from a third party, the connection between the datacentre and the company could be secured by a protocol similar to SSL. This, however, requires that the data is stored at the datacentre in plaintext form, meaning the company has to trust the datace...

2017
Florian Kerschbaum Martin Härterich

Processing queries on encrypted data protects sensitive data stored in cloud databases. CryptDB has introduced the approach of adjustable encryption for such processing. A database column is adjusted to the necessary level of encryption, e.g. order-preserving, for the set of executed queries, but never reversed. This has the drawback that long running cloud databases will eventually transform i...

2006
Tran Khanh DANG

Advances in networking technologies and the continued growth of the Internet have triggered a new trend towards outsourcing data management and information technology needs to external service providers. As a recent manifestation of this trend, there has been growing interest in outsourcing database services in both the commercial world and the research community. Although the outsourced databa...

2008
Nishanth Chandran Rafail Ostrovsky William E. Skeith

Searching and modifying public-key encrypted data has received a lot of attention in recent literature. In this paper we re-visit this important topic and achieve improved amortized bounds including resolving a prominent open question posed by Boneh et al. [3]. First, we consider the following much simpler to state problem: A server holds a copy of Alice’s database that has been encrypted under...

ژورنال: محاسبات نرم 2014

In this paper, a new structure for image encryption using hybrid cellular automata is presented. The image encryption is done in two steps. At the first step, each pixel is encrypted by rules of hybrid cellular automata. In the next step, each pixel converted to a binary number and each bit is encrypted by rules of cellular automata. The rules are made by a function. Due to reversibility of cel...

2010
Ozan Ünay Taflan İmre Gündem

Data-owners who possess large confidential data are looking for methods to securely store and efficiently query their data when using database services. In this paper we focus on “database as a service” concept and propose a methodology that securely and efficiently queries encrypted XML documents using parallel processing. The content of the database is not revealed to the service provider and...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید