نتایج جستجو برای: encrypted database

تعداد نتایج: 273905  

2017
Myungsun Kim Hyung Tae Lee San Ling Benjamin Hong Meng Tan Huaxiong Wang

Fully homomorphic encryption (FHE) brings a paradigm shift in cryptographic engineering by enabling us to resolve various unsolved problems. Among them, this work solves the problem to design a private database query (PDQ) protocol that supports compound queries with wildcard conditions on encrypted databases using FHE. More precisely, we consider a setting where clients outsource an encrypted ...

2007
Sergei Evdokimov Oliver Günther

While the idea of database outsourcing is becoming increasingly popular, the associated security risks still prevent many potential users from deploying it. In particular, the need to give full access to one’s data to a third party, the database service provider, remains a major obstacle. A seemingly obvious solution is to encrypt the data in such a way that the service provider retains the abi...

2005
Murat Kantarcioglu Chris Clifton

There has been considerable interest in querying encrypted data, allowing a “secure database server” model where the server does not know data values. This paper shows how results from cryptography prove the impossibility of developing a server that meets cryptographicstyle definitions of security and is still efficient enough to be practical. The weaker definitions of security supported by pre...

2015
Radha Rani

Placing critical data in the hands of a cloud provider should come with the guarantee of security and availability for data at rest, in motion, and in use. Several alternatives exist for storage services, while data confidentiality solutions for the database as a service paradigm are still immature. We propose a novel architecture that integrates cloud database services with data confidentialit...

Journal: :The Philippine statistician (Quezon City) 2021

To detect and locate unapproved alterations or modifications made to digital pictures, tampering detection in images is a crucial study topic the field of image forensics. As sophisticated picture altering tools become more widely available, it has difficult guarantee integrity authenticity visual output. This overview literature explores methodology, findings, contributions key research studie...

Journal: :CoRR 2016
Michael Egorov MacLane Wilkison

ZeroDB is an end-to-end encrypted database that enables clients to operate on (search, sort, query, and share) encrypted data without exposing encryption keys or cleartext data to the database server. The familiar client-server architecture is unchanged, but query logic and encryption keys are pushed client-side. Since the server has no insight into the nature of the data, the risk of data bein...

2015
Marie-Sarah Lacharité Kenneth G. Paterson

Naveed, Kamara, and Wright’s recent paper “Inference Attacks on Property-Preserving Encrypted Databases” (ACM-CCS 2015) evaluated four attacks on encrypted databases, such as those based on the design of CryptDB (Popa et al., SOSP 2011). Two of these attacks—frequency analysis and lp-optimization—apply to deterministically encrypted columns when there is a publicly-available auxiliary data set ...

2017
Zhongmin DAI

Recent years have seen a pervasive usage of mobile-based instant messaging apps, which are popularly known as chat apps. On users’ mobile devices, chat logs are usually stored encrypted. This paper is concerned with discovering the decryption key of chat-log database files as they are used by popular chat apps like WhatsApp andWeChat. We propose a systematic and generalized information-flow bas...

Journal: :IJDWM 2014
Zheli Liu Jingwei Li Jin Li Chunfu Jia Jun Yang Ke Yuan

With the development of cloud computing and big data, data privacy protection has become an urgent problem to solve. Data encryption is the most effective way to protect privacy; however, it will change the data format and result in: 1. database structure and application software will be changed; 2. structured query language (SQL) operations cannot work properly, especially in SQL-based fuzzy q...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید