نتایج جستجو برای: query on encrypted data
تعداد نتایج: 9286813 فیلتر نتایج به سال:
While users enjoy the convenience of data outsourcing in cloud, they also face risks modification and private information leakage. Searchable encryption technology can perform keyword searches over encrypted while protecting their privacy guaranteeing integrity by verifying search results. However, some associated problems are still encountered, such as low efficiency verification uncontrollabl...
Catalano and Fiore propose a scheme to transform linearly-homomorphic encryption into homomorphic capable of evaluating quadratic computations on ciphertexts. Their is based the (such as Goldwasser-Micali, Paillier ElGamal) need perform large integer operation servers. Then, their have numerous At same time, cannot verify evaluate more than degree-4 computations. To solve these problems, we no ...
By the rapid improvement in web help and their popularity, web customers are developing day by day. Hence, there is large and various data. Data Mining has a wide use for the fields of business, medicine, experimental research and among government offices. One of the generally used tasks in data mining applications is Classification. Various professional and possible solutions to the classifica...
In this thesis we present the work done in the construction of new Database model eDB under the Database as a service (DaaS) framework. The main challenge in the DaaS model is to provide data security from service provider along with efficient computation of queries on the cloud database. To handle both the challenges (data security and efficient computation), we use multiple partial homomorphi...
We present an improved bound on the advantage of any q-query adversary at distinguishing between the CBC MAC over a random n-bit permutation and a random function outputting n bits. The result assumes that no message queried is a prefix of any other, as is the case when all messages to be MACed have the same length. We go on to give an improved analysis of the encrypted CBC MAC, where there is ...
Data is the central asset of today’s dynamically operating organization and their business. This data is usually stored in database. A major consideration is applied on the security of that data from the unauthorized access and intruders. Data encryption is a strong option for security of data in database and especially in those organizations where security risks are high. But there is a potent...
Outsourcing data into the cloud becomes popular thanks to the pay-as-you-go paradigm. However, such practice raises privacy concerns. The conventional way to achieve data privacy is to encrypt sensitive data before outsourcing. When data are encrypted, a tradeoff must be achieved between security and efficient query processing. Existing solutions that adopt multiple encryption schemes induce a ...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید