نتایج جستجو برای: query on encrypted data

تعداد نتایج: 9286813  

2016
A. ABIRAMI Dr. D. CHANDRAKALA

Data mining has large applications in many real world areas. Classification is one of the frequently needed tasks in data mining frameworks. For the existing studies, due to the rise of different privacy problems, various solutions to the theoretical and practical classification issues have been suggested under different security models. In this paper proposed a protected k-NN classifier over P...

2007
Tao-Ku Chang Gwan-Hwan Hwang

XQuery is a powerful and convenient language that is designed for querying the data in XML documents. In this paper, we address how to optimally query encrypted XML documents using XQuery, with the key point being how to eliminate redundant decryption so as to accelerate the querying. We propose a processing model that can automatically and appropriately translate the XQuery statements for encr...

2018
Manish Kesarwani Akshar Kaul Prasad Naldurg Sikhar Patranabis Gagandeep Singh Sameep Mehta Debdeep Mukhopadhyay

Enterprise customers of cloud services are wary of outsourcing sensitive user and business data due to inherent security and privacy concerns. In this context, storing and computing directly on encrypted data is an attractive solution, especially against insider attacks. Homomorphic encryption, the keystone enabling technology is unfortunately prohibitively expensive. In this paper, we focus on...

2016
Fahad Shaon Murat Kantarcioglu

Over the last few years, data storage in cloud based services has been very popular due to easy management and monetary advantages of cloud computing. Recent developments showed that such data could be leaked due to various attacks. To address some of these attacks, encrypting sensitive data before sending to cloud emerged as an important protection mechanism. If the data is encrypted with trad...

2006
Yin Yang Wilfred Ng Ho Lam Lau James Cheng

Data security is well-recognized a vital issue in an information system that is supported in an outsource environment. However, most of conventional XML encryption proposals treat confidential parts of an XML document as whole blocks of text and apply encryption algorithms directly on them. As a result, queries involving the encrypted part cannot be efficiently processed. In order to address th...

Journal: :Proceedings of the VLDB Endowment 2014

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه تحصیلات تکمیلی علوم پایه زنجان - دانشکده شیمی 1391

in this thesis a calibration transfer method is used to achieve bilinearity for augmented first order kinetic data. first, the proposed method is investigated using simulated data and next the concept is applied to experimental data. the experimental data consists of spectroscopic monitoring of the first order degradation reaction of carbaryl. this component is used for control of pests in frui...

Journal: :IEEE Transactions on Knowledge and Data Engineering 2022

Data have significant economic or social value in many application fields including science, business, governance, etc. This naturally leads to the emergence of data markets such as GBDEx and YoueData. As a result, trade through has started receive attentions from both industry academia. During buying selling, how price is an indispensable problem. However, pricing incomplete more challenging, ...

2015
Miyoung Jang Min Yoon Jae-Woo Chang

Due to advancement in cloud computing technology, the research on the outsourced database has been spotlighted. In database outsourcing, because the service provider might be untrusted or compromised, two issues of data security emerge: data confidentiality and data integrity. Many data transformation schemes were widely studied for preserving data confidentiality, but they are vulnerable to da...

Journal: :Proceedings of the AAAI Conference on Artificial Intelligence 2019

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید