نتایج جستجو برای: secure search

تعداد نتایج: 349641  

2015
Wei Zhang Yaping Lin Siwang Zhou

With the advent of cloud computing, it has become increasingly popular for data owners to outsource their data to public cloud servers while allowing data users to retrieve this data. For privacy concerns, secure searches over encrypted cloud data has motivated several research works under the single owner model. However, most cloud servers in practice do not just serve one owner; instead, they...

2009
William Harrower Changyu Dong

Company data are very often outsourced to datacentres in order to lower costs of maintaining hardware. If the outsourced data are to be kept secure from a third party, the connection between the datacentre and the company could be secured by a protocol similar to SSL. This, however, requires that the data is stored at the datacentre in plaintext form, meaning the company has to trust the datace...

2011
Seny Kamara Charalampos Papamanthou Tom Roeder

Cloud storage provides a highly available, easily accessible and inexpensive remote data repository to clients who cannot afford to maintain their own storage infrastructure. While many applications of cloud storage require security guarantees against the cloud provider (e.g., storage of high-impact business data or medical records), most services cannot guarantee that the provider will not see...

2015
Wei Zhang Jie Wu Yaping Lin

Cloud computing has attracted a lot of interests from both the academics and the industries, since it provides efficient resource management, economical cost, and fast deployment. However, concerns on security and privacy become the main obstacle for the large scale application of cloud computing. Encryption would be an alternative way to relief the concern. However, data encryption makes effic...

2013
Wenjun Luo Xiaofang Zhang Jianming Tan

In this paper, we study the problem of keyword searches over asymmetrically encrypted data. Our scheme is based on strong RSA assumption, which provides the high efficient search technique and is proven secure in the standard model. In comparison with previous schemes, our scheme requires only simpler computation without pairing operation, and lower storage overheads on servers and clients. Mor...

2014
Xingming Sun Lu Zhou Zhangjie Fu

With the development of cloud computing, the sensitive information of outsourced data is at risk of unauthorized accesses. To protect data privacy, the sensitive data should be encrypted by the data owner before outsourcing, which makes the traditional and efficient plaintext keyword search technique useless. Hence, it is an especially important thing to explore secure encrypted cloud data sear...

2015
Jack Willoughby Frank Sloan

Anecdotal and circumstantial evidence suggest that the implementation of Secure Communities, a federal program that allows police officers to more easily identify illegal immigrants, has increased racial bias by police. The goal of this analysis is to empirically evaluate the effect of Secure Communities on racial bias by police using motor vehicle stop and search data from the North Carolina S...

1995
Bart Preneel Paul C. van Oorschot

We consider the security of message authentication code (MAC) algorithms, and the construction of MACs from fast hash functions. A new forgery attack applicable to all iterated MAC algorithms is described, the first known such attack requiring fewer operations than exhaustive key search. Existing methods for constructing MACs from hash functions, including the secret prefix, secret suffix, and ...

Journal: :CoRR 2017
Adi Akavia Dan Feldman Hayim Shaul

Secure Search is the problem of retrieving from a database table (or any unsorted array) the records matching specified attributes, as in SQL SELECT queries, but where the database and the query are encrypted. Secure search has been the leading example for practical applications of Fully Homomorphic Encryption (FHE) starting in Gentry’s seminal work; however, to the best of our knowledge all st...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید