نتایج جستجو برای: query on encrypted data

تعداد نتایج: 9286813  

Journal: :Tsinghua Science & Technology 2023

While users enjoy the convenience of data outsourcing in cloud, they also face risks modification and private information leakage. Searchable encryption technology can perform keyword searches over encrypted while protecting their privacy guaranteeing integrity by verifying search results. However, some associated problems are still encountered, such as low efficiency verification uncontrollabl...

Journal: :International Journal of Advances in Applied Sciences 2020

Journal: :IEEE Transactions on Cloud Computing 2021

Catalano and Fiore propose a scheme to transform linearly-homomorphic encryption into homomorphic capable of evaluating quadratic computations on ciphertexts. Their is based the (such as Goldwasser-Micali, Paillier ElGamal) need perform large integer operation servers. Then, their have numerous At same time, cannot verify evaluate more than degree-4 computations. To solve these problems, we no ...

Journal: :International Journal for Research in Applied Science and Engineering Technology 2019

2017
K. Sowjanya A. V. Sriharsha

By the rapid improvement in web help and their popularity, web customers are developing day by day. Hence, there is large and various data. Data Mining has a wide use for the fields of business, medicine, experimental research and among government offices. One of the generally used tasks in data mining applications is Classification. Various professional and possible solutions to the classifica...

2014
Gagandeep Singh

In this thesis we present the work done in the construction of new Database model eDB under the Database as a service (DaaS) framework. The main challenge in the DaaS model is to provide data security from service provider along with efficient computation of queries on the cloud database. To handle both the challenges (data security and efficient computation), we use multiple partial homomorphi...

2005
Mihir Bellare Krzysztof Pietrzak Phillip Rogaway

We present an improved bound on the advantage of any q-query adversary at distinguishing between the CBC MAC over a random n-bit permutation and a random function outputting n bits. The result assumes that no message queried is a prefix of any other, as is the case when all messages to be MACed have the same length. We go on to give an improved analysis of the encrypted CBC MAC, where there is ...

Journal: :Concurrency and Computation: Practice and Experience 2019

Journal: :CoRR 2013
Manish Sharma Atul Chaudhary Santosh Kumar

Data is the central asset of today’s dynamically operating organization and their business. This data is usually stored in database. A major consideration is applied on the security of that data from the unauthorized access and intruders. Data encryption is a strong option for security of data in database and especially in those organizations where security risks are high. But there is a potent...

Journal: :CoRR 2017
Somayeh Sobati Moghadam Jérôme Darmont Gérald Gavin

Outsourcing data into the cloud becomes popular thanks to the pay-as-you-go paradigm. However, such practice raises privacy concerns. The conventional way to achieve data privacy is to encrypt sensitive data before outsourcing. When data are encrypted, a tradeoff must be achieved between security and efficient query processing. Existing solutions that adopt multiple encryption schemes induce a ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید