نتایج جستجو برای: query on encrypted data
تعداد نتایج: 9286813 فیلتر نتایج به سال:
In cloud computing, to protect privacy when outsourcing database management systems, confidential data (e.g., bank account balance) has to be encrypted which however renders traditional query processing methods (e.g., the B-tree index) inapplicable. In this thesis, we consider processing range query search (e.g., retrieving all records with a bank account balance being less than some threshold)...
MONOMI is a system for securely executing analytical workloads over sensitive data on an untrusted database server. MONOMI works by encrypting the entire database and running queries over the encrypted data. MONOMI introduces split client/server query execution, which can execute arbitrarily complex queries over encrypted data, as well as several techniques that improve performance for such wor...
Motivated by cloud security concerns, there is an increasing interest in database systems that can store and support queries over encrypted data. A common architecture for such systems is to use a trusted component such as a cryptographic co-processor for query processing that is used to securely decrypt data and perform computations in plaintext. The trusted component has limited memory, so mo...
With the many benefits of cloud computing, an entity may want to outsource its data and their related analytics tasks to a cloud. When data are sensitive, it is in the interest of the entity to outsource encrypted data to the cloud; however, this limits the types of operations that can be performed on the cloud side. Especially, evaluating queries over the encrypted data stored on the cloud wit...
Mining has wide applications in Many areas such as banking, medicine, and scientific research .Fixing is one of the nominal tasks in data drawing out applications. For the precedent decade, due to ascend a range of privacy issues, many speculative and sensible solutions to the arrangement quandary have been projected different protection models. However, users now have the occasion to subcontra...
In recent years, we have seen many applications of secure query in two-tiered wireless sensor networks. Storage nodes are responsible for storing data from nearby sensor nodes and answering queries from Sink. It is critical to protect data security from a compromised storage node. In this paper, the Communication-efficient Secure Range Query (CSRQ)-a privacy and integrity preserving range query...
Due to the high popularity of cloud computing, more data owners are motivated to outsource the data to the cloud server. In that sensitive data will be encrypted before outsourcing to the cloud server for security purpose. In this paper, we introduce a secure multi-keyword ranked search over encrypted cloud data, which performs dynamic update operations like deletion and insertion of documents....
In the era of big data, graph databases have become increasingly important for NoSQL technologies, and many systems (e.g., online social networks, world-wide web and electrical grids, etc.) can be modeled as graphs for semantic queries. Meanwhile, with the advent of cloud computing, data owners are highly motivated to outsource and store their massive potentially-sensitive graph data on remote ...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید