نتایج جستجو برای: encrypted database
تعداد نتایج: 273905 فیلتر نتایج به سال:
There is no subsisting result can quietly support the ownership of both exactitude and integrity for the query corollary (result), notably in the case when the fraudulent cloud service provider (CSP) deliberately recompense (returns) an empty set for the query asked by the user.The new verifiable auditing scheme for outsourced database, which can concurrently achieve the exactitude and integrit...
We describe experimental work on cryptographic protection of databases and software. The database in our experiment is a natural language dictionary of over 4000 Spanish verbs. Our tentative conclusion is that the overhead cost of computing with encrypted data is fairly small.
DEMO ABSTRACT The demo presents the tiny persistent encrypted data storage (tinyPEDS). It is a distributed database for asynchronous wireless sensor networks that provides long term storage for measured data and ensures the confidentiality of the stored information. TinyPEDS is a complex middleware that integrates evolved network functionalities, advanced cryptographic transformations such as p...
1077-3142/$ see front matter 2010 Elsevier Inc. A doi:10.1016/j.cviu.2009.06.009 q A demo video of the system can be downloaded ~ekenel/door_monitoring.mpg. * Corresponding author. E-mail addresses: [email protected] (H.K. Ekenel Stallkamp), [email protected] (R. Stiefelhage URLs: http://cvhci.ira.uka.de/~ekenel/ (H.K. Eke ~stiefel/ (R. Stiefelhagen). 1 Present address: Ruhr-Universität-...
Current security mechanisms are not suitable for organisations that outsource their data management to untrusted servers. Encrypting and decrypting sensitive data at the client side is the normal approach in this situation but has high communication and computation overheads if only a subset of the data is required, for example, selecting records in a database table based on a keyword search. N...
140 Abstract-Security issue represents the main barrier facing the wide adoption of cloud computing. Encryption is the best method to mitigate users' concerns. However, this method makes searching the encrypted data a challenging task. Accordingly, several approaches have been proposed to enable searching the encrypted, remotely stored data without decryption. Till now, almost all these approac...
This paper highlights the importance of the interoperability of the encrypted DB in terms of the characteristics of DB and efficient schemes. Although most prior researches have developed efficient algorithms under the provable security, they do not focus on the interoperability of the encrypted DB. In order to address this lack of practical aspects, we conduct two practical approaches–efficien...
With the growing popularity of cloud computing, more and more users outsource their private data to the cloud. To ensure the security of private data, data owners usually encrypt their private data before outsourcing the data to the cloud server, which brings incommodity of data operating. This paper proposes a scheme for similar search on encrypted images. In the setup phase, image owner extra...
The advancement of information technology is rapidly integrating the physical world where we live and the online world where we retrieve and share information. One immediate example of such integration is the increasing popularity of storing and managing personal data using third-party web services, as part of the emerging trend of cloud computing. Secure management of sensitive data stored onl...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید