نتایج جستجو برای: query on encrypted data
تعداد نتایج: 9286813 فیلتر نتایج به سال:
In this thesis, I took advantage of a model-free compression architecture, where the encoder only makes decision about coding and leaves to the decoder to apply the knowledge of the source for decoding, to attack the problem of compressing encrypted data. Results for compressing different sources encrypted by different class of ciphers are shown and analyzed. Moreover, we generalize the problem...
Cloud makes data storage very smart. It provides enormous amount of space to store the user’s data. These data are instantly available for the users at any time and it reduces the cost with respect to hardware support, technical experts available and license of the database. It leverages the small and medium scale enterprise straight away to start their business. Nevertheless cloud has many adv...
Encrypting data before sending it to the cloud ensures confidentiality but requires compute on encrypted data. Trusted execution environments, such as Intel SGX enclaves, promise provide a secure environment in which can be decrypted and then processed. However, vulnerabilities executed program give attackers ample opportunities execute arbitrary code inside enclave. This modify dataflow of lea...
Many DBMS products in the market provide built in encryption support to deal with the security concerns of the organizations. This solution is quite effective in preventing data leakage from compromised/stolen storage devices. However, recent studies show that a significant part of the leaked records have been done so by using specialized malwares that can access the main memory of systems. The...
Despite extensive research on cryptography, secure and efficient query processing over outsourced data remains an open challenge. This paper continues along the emerging trend in secure data processing that recognizes that the entire dataset may not be sensitive, and hence, non-sensitivity of data can be exploited to overcome some of the limitations of existing encryption-based approaches. Taki...
With searchable encryption, a data user is able to perform meaningful search on encrypted data stored in the public cloud without revealing data privacy. Besides handling simple queries (e.g., keyword queries), complex search functions, such as multi-dimensional (conjunctive) range queries, have also been studied in several approaches to support the search of multi-dimensional data. However, cu...
With the growing popularity of cloud computing, more and more users outsource their private data to the cloud. To ensure the security of private data, data owners usually encrypt their private data before outsourcing the data to the cloud server, which brings incommodity of data operating. This paper proposes a scheme for similar search on encrypted images. In the setup phase, image owner extra...
Individuals and organizations tend to migrate their data to clouds, especially in a DataBase as a Service (DBaaS) pattern. The major obstacle is the conflict between secrecy and utilization of the relational database to be outsourced. We address this obstacle with a Transparent DataBase (T-DB) system strictly following the unmodified DBaaS framework. A database owner outsources an encrypted dat...
Abstract We study the problem of privacy-preserving approximate kNN search in an outsourced environment — client sends encrypted data to untrusted server and later can perform secure updates. design a security model propose generic construction based on locality-sensitive hashing, symmetric encryption, oblivious map. The provides very strong guarantees, not only hiding information about data, b...
To protect the privacy, sensitive information has to be encrypted before outsourcing to the cloud. Thus the effective data utilization becomes a significant challenge. Searchable encryption scheme has been developed to conduct retrieval over encrypted data. However, these schemes only support exact keyword search. Recent fuzzy search schemes mainly evaluate the similarity of keywords from the s...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید