نتایج جستجو برای: searchable encryption

تعداد نتایج: 29064  

Journal: :Journal of Physics: Conference Series 2018

Journal: :Lecture Notes in Computer Science 2021

Searchable Symmetric Encryption (SSE) enables a client to outsource database an untrusted server, while retaining the ability securely search data. The performance bottleneck of classic SSE schemes typically does not come from their fast, symmetric cryptographic operations, but rather cost memory accesses. To address this issue, many works in literature have considered notion locality, simple d...

2015
Emily Shen

In this paper, we consider a setting where a client wants to outsource storage of a large amount of private data and then perform substring search queries on the data – given a data string s and a search string p, find all occurrences of p as a substring of s. First, we formalize an encryption paradigm that we call queryable encryption, which generalizes searchable symmetric encryption (SSE) an...

2015
Tim Waage Ramaninder Singh Jhajj Lena Wiese

In today’s cloud computing applications it is common practice for clients to outsource their data to cloud storage providers. That data may contain sensitive information, which the client wishes to protect against this untrustworthy environment. Confidentiality can be preserved by the use of encryption. Unfortunately that makes it difficult to perform efficient searches. There are a couple of d...

2012
Michael Wang

To provide some background to the paper, in the database literature, the naive solution of providing public key encryption on untrusted database servers (for example, data stored in a rented cloud server) includes encrypting every record non-deterministically in order to provide notions of privacy in the database. In other words, in order to find particular records in an encrypted database, the...

2006
Mihir Bellare Alexandra Boldyreva Adam O'Neill

We present as-strong-as-possible definitions of privacy, and constructions achieving them,for public-key encryption schemes where the encryption algorithm is deterministic. We obtainas a consequence database encryption methods that permit fast (i.e. sub-linear, and in factlogarithmic, time) search while provably providing privacy that is as strong as possible subjectto this ...

Journal: :International Journal of Natural Sciences Research 2016

2014
Ren - Junn Hwang Chung - Chien Lu Jain - Shing Wu

Cloud outsource storage is one of important services in cloud computing. Cloud users upload data to cloud servers to reduce the cost of managing data and maintaining hardware and software. To ensure data confidentiality, users can encrypt their files before uploading them to a cloud system. However, retrieving the target file from the encrypted files exactly is difficult for cloud server. This ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید