نتایج جستجو برای: encrypted database

تعداد نتایج: 273905  

2014
Nidhi Mouje Nikita Chavhan

Wireless sensor networks (WSNs) are ad-hoc networks composed of tiny devices with limited computation and energy capacities. For such devices, data transmission is a very energy-consuming operation. It thus becomes essential to the lifetime of a WSN to minimize the number of bits sent by each device. Concealed data aggregation (CDA) schemes that are based on the homomorphic characteristics of a...

2004
Steven K. Miller Kofi Annan

Context of Youth Employment More than 1 billion people today are between 15 and 25 years of age and nearly 40 per cent of the world’s population is below the age of 20. Eighty-five per cent of these young people live in developing countries where many are especially vulnerable to extreme poverty. At the same time, the rate of urbanization is by far the highest in developing countries, and by 20...

2004
Richard Brinkman Jeroen Doumen Willem Jonker

When outsourcing data to an untrusted database server, the data should be encrypted. When using thin clients or low-bandwidth networks it is best to perform most of the work at the server. In this paper we present a method, inspired by secure multi-party computation, to search efficiently in encrypted data. XML elements are translated to polynomials. A polynomial is split into two parts: a rand...

Journal: :JCP 2013
Yubin Guo Liankuan Zhang Fengren Lin Ximing Li

Privacy of data owners and query users is vital in modern clouding data management. Many researches have been done on cloud security, but most of them are focused on the privacy of data owners or of query users separately. How to protect the privacy of the data owners and users simultaneously is a great challenge. In this paper, a solution of data storage and query protocol based on classical h...

2003
Kenny C.K. Fong

Hacıgümüş, Iyer, Li and Mehrotra proposed the first scheme of executing SQL over encrypted data in the database-service-provider model. However, they did not address the security strength of the scheme over different attack models. While Hacıgümüş’ scheme looks secure in a general setting, this paper attempts to explore any plausible attacks against this scheme in specific environments. We pres...

Journal: :Journal of the American Medical Informatics Association : JAMIA 2007
Adam Wright Dean F. Sittig

Personal health records (PHRs) hold great promise for empowering patients and increasing the accuracy and completeness of health information. We reviewed two small USB-based PHR devices that allow a patient to easily store and transport their personal health information. Both devices offer password protection and encryption features. Analysis of the devices shows that they store their data in a...

Journal: :Knowl.-Based Syst. 2015
Jin Li Zheli Liu Xiaofeng Chen Fatos Xhafa Xiao Tan Duncan S. Wong

With the advent of cloud computing, individuals and organizations have become interested in moving their databases from local to remote cloud servers. However, data owners and cloud service providers are not in the same trusted domain in practice. For the protection of data privacy, sensitive data usually have to be encrypted before outsourcing, which makes effective database utilization a very...

2010
Christian Rathgeb Andreas Uhl

In this work we present a new technique for generating cryptographic keys out of iris textures implementing a key-generation scheme. In contrast to existing approaches to iris-biometric cryptosystems the proposed scheme does not store any biometric data, neither in raw nor in encrypted form, providing high secrecy in terms of template protection. The proposed approach is tested on a widely used...

Journal: :IEEE Trans. Knowl. Data Eng. 2013
HweeHwa Pang Jilian Zhang Kyriakos Mouratidis

Users of databases that are hosted on shared servers cannot take for granted that their queries will not be disclosed to unauthorized parties. Even if the database is encrypted, an adversary who is monitoring the I/O activity on the server may still be able to infer some information about a user query. For the particular case of a B-tree that has its nodes encrypted, we identify properties that...

2014
Jung Hee Cheon Miran Kim Myungsun Kim

Private query processing on encrypted databases allows users to obtain data from encrypted databases in such a way that the user’s sensitive data will be protected from exposure. Given an encrypted database, the users typically submit queries similar to the following examples: – How many employees in an organization make over $100,000? – What is the average age of factory workers suffering from...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید