نتایج جستجو برای: searchable encryption
تعداد نتایج: 29064 فیلتر نتایج به سال:
BSSE algorithms Each keyword is considered as a vector in order to perform inner product during the search phase. Boolean symmetric searchable encryption BSSE is mainly based on the orthogonalization of the keyword field according to the GramSchmidt process. Searchable encryption: Searching encrypted keywords using encrypted queries (trapdoor) in order to retrieve encrypted documents with...
Searchable encryption technique enables the users to securely store and search their documents over the remote semitrusted server, which is especially suitable for protecting sensitive data in the cloud. However, various settings (based on symmetric or asymmetric encryption) and functionalities (ranked keyword query, range query, phrase query, etc.) are often realized by different methods with ...
Remote storage delivers a cost effective solution for data storage. If data is of a sensitive nature, it should be encrypted prior to outsourcing to ensure confidentiality; however, searching then becomes challenging. Searchable encryption is a well-studied solution to this problem. Many schemes only consider the scenario where users can search over the entirety of the encrypted data. In practi...
Remote storage delivers a cost effective solution for data storage. If data is of a sensitive nature, it should be encrypted prior to outsourcing to ensure confidentiality; however, searching then becomes challenging. Searchable encryption is a well-studied solution to this problem. Many schemes only consider the scenario where users can search over the entirety of the encrypted data. In practi...
In this paper we address the problem of fuzzy search over encrypted data that supports misspelled search terms. We advance prior work by using a bit vector for bigrams directly instead of hashing bigrams into a Bloom filter. We show that we improve both index building performance as well as retrieval ratio of matching documents while providing the same security guarantees. We also compare fuzzy...
Cloud Computing, the long term goal of utility computing has transformed the IT industry a lot. Data constantly contain sensitive information should be secured by policies and regulation defined by various organizations. However, information on cloud always causes privacy problems. Data encryption protects privacy and confidentiality but efficiency is not ensured. Symmetric Searchable Encryptio...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید