نتایج جستجو برای: query on encrypted data

تعداد نتایج: 9286813  

Journal: :Physical Review Letters 2012

2015
Gaby G. Dagher Benjamin C. M. Fung Jeremy Clark

Data-as-a-service (DaaS) is a cloud computing service that emerged as a viable option to businesses and individuals for outsourcing and sharing their collected data with other parties. Although the cloud computing paradigm provides great flexibility to consumers with respect to computation and storage capabilities, it imposes serious concerns about the confidentiality of the outsourced data as ...

Abstract— Bot networks are a serious threat to cyber security, whose destructive behavior affects network performance directly. Detecting of infected HTTP communications is a big challenge because infected HTTP connections are clearly merged with other types of HTTP traffic. Cybercriminals prefer to use the web as a communication environment to launch application layer attacks and secretly enga...

2015
V. SUGANYA J. VISWANATH

There is no subsisting result can quietly support the ownership of both exactitude and integrity for the query corollary (result), notably in the case when the fraudulent cloud service provider (CSP) deliberately recompense (returns) an empty set for the query asked by the user.The new verifiable auditing scheme for outsourced database, which can concurrently achieve the exactitude and integrit...

Journal: :CoRR 2009
Maisa Halloush Mai Sharif

Important document are being kept encrypted in remote servers. In order to retrieve these encrypted data, efficient search methods needed to enable the retrieval of the document without knowing the content of the documents In this paper a technique called a global heuristic search on encrypted data (GHSED) technique will be described for search in an encrypted files using public key encryption ...

Journal: :CoRR 2011
Vaibhav Khadilkar Murat Kantarcioglu Bhavani M. Thuraisingham Sharad Mehrotra

Cloud computing has made it possible for a user to be able to select a computing service precisely when needed. However, certain factors such as security of data and regulatory issues will impact a user’s choice of using such a service. A solution to these problems is the use of a hybrid cloud that combines a user’s local computing capabilities (for missionor organization-critical tasks) with a...

2017
Boyang Wang Ming Li

Spatial data have wide applications, e.g., location-based services, and geometric range queries (i.e., finding points inside geometric areas, e.g., circles or polygons) are one of the fundamental search functions over spatial data. The rising demand of outsourcing data is moving large-scale datasets, including large-scale spatial datasets, to public clouds. Meanwhile, due to the concern of insi...

2017
Myungsun Kim Hyung Tae Lee San Ling Benjamin Hong Meng Tan Huaxiong Wang

Fully homomorphic encryption (FHE) brings a paradigm shift in cryptographic engineering by enabling us to resolve various unsolved problems. Among them, this work solves the problem to design a private database query (PDQ) protocol that supports compound queries with wildcard conditions on encrypted databases using FHE. More precisely, we consider a setting where clients outsource an encrypted ...

Journal: :Journal of Systems and Software 2015

Journal: :IEEE Trans. Knowl. Data Eng. 2013
HweeHwa Pang Jilian Zhang Kyriakos Mouratidis

Users of databases that are hosted on shared servers cannot take for granted that their queries will not be disclosed to unauthorized parties. Even if the database is encrypted, an adversary who is monitoring the I/O activity on the server may still be able to infer some information about a user query. For the particular case of a B-tree that has its nodes encrypted, we identify properties that...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید