Cloud query processing analysis: encryption and decryption
نویسندگان
چکیده
منابع مشابه
Anonymous Multi-Attribute Encryption with Range Query and Conditional Decryption∗
We introduce the concept of Anonymous Multi-Attribute Encryption with Range Query and Conditional Decryption (AMERQCD). In AMERQCD, a plaintext is encrypted under a point in multidimensional space. To a computationally bounded adversary, the ciphertext hides both the plaintext and the point under which it is encrypted. In a range query, a master key owner releases the decryption key for an arbi...
متن کاملOn-the fly AES Decryption/Encryption for Cloud SQL Databases
We propose the client‐side AES256 encryption for a cloud SQL DB. A column ciphertext is deterministic or probabil‐ istic. We trust the cloud DBMS for security of its run‐time values, e.g., through a moving target defense. The client may send AES key(s) with the query. These serve the on‐the‐fly decryption of selected ciphertext into plaintext for query evaluation. The DBMS clears the key(s) and...
متن کاملImprovement and Analysis of Encryption and Decryption Performance in Cloud Document
Cloud computing is the hot topic in recent years, and the cloud-based collaborative service is the emerging service. No matter where the users are or which computers the users use, it enables the cloud users to place their data into the cloud. As long as it connects to the Internet, it can store and get the data placed in the cloud. In the collaborative service situation, it can allow other clo...
متن کاملLeakage resistant encryption and decryption
Introduction Data encryption and decryption operations are basic building blocks for most security applications. For this purpose, most systems use block ciphers, such as the public AES standard. It is well known, however, that implementations of block ciphers such as AES, as well as other cryptographic algorithms, are subject to side-channel attacks [1]. These attacks allow adversaries to extr...
متن کاملDistributed Encryption and Decryption Algorithms
In this paper, we describe distributed encryption and decryption algorithms. These algorithms are required in order to make a dependable distributed data storage system in which data is stored in an encrypted form resilient to a number of arbitrarily faulty nodes in the system. By execution of these algorithms, a group of n nodes is able to encrypt or decrypt data with any secret cryptographic ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: 3C Tecnología_Glosas de innovación aplicadas a la pyme
سال: 2019
ISSN: 2254-4143
DOI: 10.17993/3ctecno.2019.specialissue3.65-75