نتایج جستجو برای: encrypted database

تعداد نتایج: 273905  

Journal: :IACR Cryptology ePrint Archive 2017
Jung Hee Cheon Miran Kim Yong Soo Song

As genome sequencing technology develops rapidly, there has lately been an increasing need to keep genomic data secure even when stored in the cloud and still used for research. In this paper, we are interested in designing a protocol for the secure outsourcing matching problem on encrypted data. We propose an efficient method to securely search a matching position with the query data and extra...

Journal: :J. Applied Mathematics 2012
Nadia M. G. Al-Saidi Mohamad Rushdan Md. Said Wan Ainun M. Othman

Password authentication is a mechanism used to authenticate user identity over insecure communication channel. In this paper, a new method to improve the security of password authentication is proposed. It is based on the compression capability of the fractal image coding to provide an authorized user a secure access to registration and login process. In the proposed scheme, a hashed password s...

2014
M. M. Waghmare

Data mining-as-a-service has been selected as considerable research issue by researchers. An organization (data owner) can outsource its mining needs like resources or expertise to a third party service provider (server). However, both the association rules and the items of the outsourced transaction database are private property of data owner. The data owner encrypts its data, send data and mi...

Journal: :IACR Cryptology ePrint Archive 2003
Eu-Jin Goh

A secure index is a data structure that allows a querier with a " trapdoor " for a word x to test in O(1) time only if the index contains x; The index reveals no information about its contents without valid trapdoors, and trapdoors can only be generated with a secret key. Secure indexes are a natural extension of the problem of constructing data structures with privacy guarantees such as those ...

Journal: :IACR Cryptology ePrint Archive 2016
Marc Joye Alain Passelègue

Multi-input functional encryption is a paradigm that allows an authorized user to compute a certain function —and nothing more— over multiple plaintexts given only their encryption. The particular case of two-input functional encryption has very exciting applications like comparing the relative order of two plaintexts from their encrypted form, making range queries over an encrypted database, t...

2014
Patrick Grofig Martin Härterich Isabelle Hang Florian Kerschbaum Mathias Kohler Andreas Schaad Axel Schröpfer Walter Tighzert

This paper presents an industrial report on the implementation of a system that supports execution of queries over encrypted data. While this idea is not new, e.g. [HILM02, AKRX04, PRZB11], the implementation in a real world large scale in-memory database is still challenging. We will provide an overview of our architecture and detail two use cases to give the reader an insight into how we tech...

Journal: :Signal, Image and Video Processing 2013
Kannan Karthik Sachin Kashyap

Search through a database of encrypted images against a crumpled and encrypted query will remain privacy preserving only if comparisons between selective features derived from these images is executed in the encrypted domain itself. To facilitate this, the encryption process must remain transparent to specific image statistics computed in the spatial or transform domain. Consequently, the perce...

2016
P. Gowri K. Sangeetha

Prominent issue in cloud computing is security in which storing and retrieving the data in a third party’s cloud system and public auditing scheme which causes serious problems and conflict over data confidentiality during the transaction of data. Though there are number of methods are available to overcome this problem like cryptography, key encryption etc. The general encryption schemes prote...

2017
Benny Fuhry Raad Bahmani Ferdinand Brasser Florian Hahn Florian Kerschbaum Ahmad-Reza Sadeghi

Software-based approaches for search over encrypted data are still either challenged by lack of proper, low-leakage encryption or slow performance. Existing hardware-based approaches do not scale well due to hardware limitations and software designs that are not specifically tailored to the hardware architecture, and are rarely well analyzed for their security (e.g., the impact of side channels...

2015
Namita kakkar

Cloud computing is the sending of computing as a service rather than a product; and shared resources, software, and message are given to computers and other devices as a utility over a network. Traditionally departments store and maintain information in their own data centres, over which they had complete control. With the emergence of cloud computing organizations can store data in the cloud p...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید