نتایج جستجو برای: encrypted database

تعداد نتایج: 273905  

2003
Luc Bouganim François Dang Ngoc Philippe Pucheral Lilan Wu

The democratization of ubiquitous computing (access data anywhere, anytime, anyhow), the increasing connection of corporate databases to the Internet and the today’s natural resort to Web hosting companies and Database Service Providers strongly emphasize the need for data confidentiality. Users have no other choice than trusting Web companies arguing that their systems are fully secured and th...

Journal: :CoRR 2016
Emiliano De Cristofaro Kaitai Liang Yuruo Zhang

An increasing number of individuals are turning to Direct-To-Consumer (DTC) genetic testing to learn about their predisposition to diseases, traits, and/or ancestry. DTC companies like 23andme and Ancestry.com have started to offer popular and affordable ancestry and genealogy tests, with services allowing users to find unknown relatives and long-distant cousins. Naturally, access and possible ...

2010
Hua Dai Al F. Salam

The purpose of this study is to provide insights into consumers’ perception of service convenience and services consumption experience (conceptualized as two second-order formative constructs) and their potential influence on the development of long-term exchange relationship among consumers and service providers in the context of E-Services or broadly Services in the Electronic Meditated Envir...

Journal: :Computers & Mathematics with Applications 2007
Chien-Yuan Chen Cheng-Yuan Ku David C. Yen

In this paper, a field authentication scheme, suitable for providing more efficient operations within an encrypted database, is introduced and discussed. Applying the concept of this proposed scheme, the database will be safeguarded and protected for situations such as a ciphertext search attack, a plaintext substitution attack, and/or a ciphertext substitution attack. In addition, this propose...

Journal: :CoRR 2016
Kapil Vaswani Ravishankar Ramamurthy Ramarathnam Venkatesan

In encrypted databases, sensitive data is protected from an untrusted server by encrypting columns using partially homomorphic encryption schemes, and storing encryption keys in a trusted client. However, encrypting columns and protecting encryption keys does not ensure confidentiality sensitive data can leak during query processing due to information flows through the trusted client. In this p...

2016
M. Raghavi

Authentication is the demonstration of confirming reality of a quality of a datum or substance. For Robust Authentication using a Biometric verification which is considered a subset of biometric authentication. It can be particularly recognized through one or all the more recognizing natural qualities, for example, fingerprints. This paper proposed the concept of Embedding and Extracting the En...

2015
G. GUNASEKARAN

Data collection is an essential step in data miningprocess. Collecting data of varying nature and still preserving privacy is essential for many applications. Privacy concerns maypreventdirect sharing of data andhow multipleparties collaboratively conduct data mining withoutbreaching data privacy presents a challenge.Cryptography involves converting a message text into anunreadable cipher and s...

2016
Tim Waage

Order-preserving encryption (OPE) allows encrypting without losing information about the order relation between the encrypted data items. Thus, the execution of compare, order and grouping operations can be done like on plaintext data. In particular it allows databases to do range queries over encrypted data, which is a useful feature especially for cloud databases that usually run in untrusted...

2010
Bogdan Carbunar Radu Sion

We introduce WORM-ORAM, a first mechanism that combines Oblivious RAM (ORAM) access privacy and data confidentiality with Write Once Read Many (WORM) regulatory data retention guarantees. Clients can outsource their database to a server with full confidentiality and data access privacy, and, for data retention, the server ensures client access WORM semantics. In general simple confidentiality a...

2014
Gajendra Singh Chandel Pragna Patel

In this paper we have applied RSA algorithm to encrypt the image files to enhance the security in the communication area for data sending. The image file is first selected from the database then we first perform the splitting of the images. Then we apply the RSA algorithm on the split files. Then we apply the decryption mechanism on the same image and achieve the split image and combine it for ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید