نتایج جستجو برای: encrypted database

تعداد نتایج: 273905  

2015
Navneet Kaur Kang Sanyam Anand

Image compression is the important task for the medical images. Economic and effective image compression techniques are hardly required to minimize the storage volume of medical database in hospitals as well as maintaining the image quality. But the transmission and storage of such a large data could be a tedious job. There are various methods to encrypt the images while transmission. In this r...

2018
Wai Kit Wong Kwok-Wai Wong Ho-Yin Yue

Data confidentiality is concerned in database-as-a-service (DBaaS) model. The cloud server should not have access to user’s plain data. Data is encrypted before they are stored in cloud database. Query computation over encrypted data by the server is not straight-forward. Many research works have been done on this problem. A common goal is to let the server obtain the selection result without l...

2007
Tao-Ku Chang Gwan-Hwan Hwang

XQuery is a powerful and convenient language that is designed for querying the data in XML documents. In this paper, we address how to optimally query encrypted XML documents using XQuery, with the key point being how to eliminate redundant decryption so as to accelerate the querying. We propose a processing model that can automatically and appropriately translate the XQuery statements for encr...

Journal: :IEICE Transactions 2014
Youwen Zhu Tsuyoshi Takagi Rong Hu

Recently, Yuan et al. (IEEE Infocom ’13, pp.2652–2660) proposed an efficient secure nearest neighbor (SNN) search scheme on encrypted cloud database. Their scheme is claimed to be secure against the collusion attack of query clients and cloud server, because the colluding attackers cannot infer the encryption/decryption key. In this letter, we observe that the encrypted dataset in Yuan’s scheme...

2014
Kristin E. Lauter Adriana López-Alt Michael Naehrig

A number of databases around the world currently host a wealth of genomic data that is invaluable to researchers conducting a variety of genomic studies. However, patients who volunteer their genomic data run the risk of privacy invasion. In this work, we give a cryptographic solution to this problem: to maintain patient privacy, we propose encrypting all genomic data in the database. To allow ...

2013
Florian Kerschbaum Martin Härterich Mathias Kohler Isabelle Hang Andreas Schaad Axel Schröpfer Walter Tighzert

Processing encrypted queries in the cloud has been extended by CryptDB’s approach of adjustable onion encryption. This adjustment of the encryption entails a translation of an SQL query to an equivalent query on encrypted data. We investigate in more detail this translation and in particular the problem of selecting the right onion layer. Our algorithm extends CryptDB’s approach by three new fu...

Journal: :IJESDF 2013
Youwen Zhu Rui Xu Tsuyoshi Takagi

In cloud computing, secure analysis on outsourced encrypted data is a significant topic. As a frequently used query for online applications, secure k-nearest neighbours (k-NN) computation on encrypted cloud data has received much attention, and several solutions for it have been put forward. However, most existing schemes assume the query users are fully trusted and all query users know the ent...

2014
Mupnesh Kumari Priyanka Sharma

In the recent time, privacy preserving has been studied extensively, because of the extensive explosion of sensitive information. Privacy preserving is one of the important areas that aim to provide security for secret information from unsolicited or unsanctioned disclosure. This has triggered the development of much privacy preserving technique using encryption algorithm. This work will presen...

Journal: :Security and Communication Networks 2011
Julien Bringer Hervé Chabanne Bruno Kindarji

Biometrics make human identification possible with a sample of a bio-metric trait and an associated database. Classical identification tech-niques lead to privacy concerns. This paper introduces a new method toidentify someone using his biometrics in an encrypted way.Our construction combines Bloom Filters with Storage and Locality-Sensitive Hashing. We apply this error-...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید