نتایج جستجو برای: query on encrypted data

تعداد نتایج: 9286813  

Journal: :IEEE Trans. Knowl. Data Eng. 2015
Bharath K. Samanthula Yousef Elmehdwi Wei Jiang

Data Mining has wide applications in many areas such as banking, medicine, scientific research and among government agencies. Classification is one of the commonly used tasks in data mining applications. For the past decade, due to the rise of various privacy issues, many theoretical and practical solutions to the classification problem have been proposed under different security models. Howeve...

Journal: :CoRR 2016
Kapil Vaswani Ravishankar Ramamurthy Ramarathnam Venkatesan

In encrypted databases, sensitive data is protected from an untrusted server by encrypting columns using partially homomorphic encryption schemes, and storing encryption keys in a trusted client. However, encrypting columns and protecting encryption keys does not ensure confidentiality sensitive data can leak during query processing due to information flows through the trusted client. In this p...

2014
Jiangang Shu Xingming Sun Lu Zhou Jin Wang

With the increasing popularity of cloud computing, more and more sensitive or private information has been outsourced onto the cloud server. For protecting data privacy, sensitive data usually has to be encrypted before outsourcing, which makes traditional search techniques based on plaintext useless. In response to the search over encrypted data, searchable encryption is a good solution in Inf...

2011
Hasan KADHEM Toshiyuki AMAGASA Hiroyuki KITAGAWA

Encryption is a well-studied technique for protecting the privacy of sensitive data. However, encrypting relational databases affects the performance during query processing. Multivalued-Partial Order Preserving Encryption Scheme (MV-POPES) allows privacy-preserving queries over encrypted databases with reasonable overhead and an improved security level. It divides the plaintext domain into man...

Journal: :CoRR 2016
Michael Egorov MacLane Wilkison

ZeroDB is an end-to-end encrypted database that enables clients to operate on (search, sort, query, and share) encrypted data without exposing encryption keys or cleartext data to the database server. The familiar client-server architecture is unchanged, but query logic and encryption keys are pushed client-side. Since the server has no insight into the nature of the data, the risk of data bein...

Journal: :Journal of Broadcast Engineering 2008

Journal: :IACR Cryptology ePrint Archive 2016
Myungsun Kim Hyung Tae Lee San Ling Shu Qin Ren Benjamin Hong Meng Tan Huaxiong Wang

Private database query (PDQ) processing has received much attention from the fields of both cryptography and databases. While previous approaches to design PDQ protocols exploit several cryptographic tools concurrently, recently the appearance of fully homomorphic encryption (FHE) schemes enables us to design PDQ protocols without the aid of additional tools. However, to the best of our knowled...

2013
Pham Thi Bach Hue Thuc Dinh Nguyen Dong Thi Bich Thuy Isao Echizen Sven Wohlgemuth

The fact that the data owners outsource their data to external service providers introduces many security and privacy issues. Among them, the most significant research questions relate to data confidentiality and user privacy. Encryption was regarded as a solution for data confidentiality. The privacy of a user is characterized by the query he poses to the server and its result. We explore the ...

2010
Ming Li Shucheng Yu Ning Cao Wenjing Lou

Recently, personal health record (PHR) has emerged as a patient-centric model of health information exchange, which features storing PHRs electronically in one centralized place, such as a third-party cloud service provider. Although this greatly facilitates the management and sharing of patients’ personal health information (PHI), there have been serious privacy concerns about whether these se...

2012
Shiyuan Wang Divyakant Agrawal Amr El Abbadi

Homomorphic encryption has been used for supporting simple aggregations, numeric calculations on encrypted data as well as for private information retrieval. Recently, theoretical breakthroughs on homomorphic encryption resulted in fully homomorphic encryption, which is able to compute arbitrary functions on encrypted data. As a result, homomorphic encryption is generally believed to be the hol...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید