نتایج جستجو برای: secure search

تعداد نتایج: 349641  

2016
R. Geetha

Due to the high popularity of cloud computing, more data owners are motivated to outsource the data to the cloud server. In that sensitive data will be encrypted before outsourcing to the cloud server for security purpose. In this paper, we introduce a secure multi-keyword ranked search over encrypted cloud data, which performs dynamic update operations like deletion and insertion of documents....

Journal: :EURASIP J. Wireless Comm. and Networking 2011
Hyun-A Park Jae Hyun Park Dong Hoon Lee

This paper highlights the importance of the interoperability of the encrypted DB in terms of the characteristics of DB and efficient schemes. Although most prior researches have developed efficient algorithms under the provable security, they do not focus on the interoperability of the encrypted DB. In order to address this lack of practical aspects, we conduct two practical approaches–efficien...

2014
Majid Nateghizad Majid Bakhtiari Mohd Aizaini Maarof

Cloud computing offers a wide range of services such as user demand network, operating systems, hardware, software and resources. These encouraging facilities and hassle free management of computing resources have attracted many users to outsource their data to untrusted servers. Cloud server may leak documents to unauthorized parties. Therefore, all documents need to be transmitted in cipherte...

2007
Rui Zhang Hideki Imai

In this paper, we study the problem of secure integrating public key encryption with keyword search (PEKS) with public key data encryption (PKE). We argue the previous security model is not complete regarding keyword privacy and the previous constructions are secure only in the random oracle model. We solve these problems by first defining a new security model, then give a generic construction ...

2014
Bin Mu

With the rapid growth of the volume and diversity of digital data produced by all kinds of commercial, scientific and leisure-time applications, the extraction of useful information from these large data sets has become one of the key IT tasks. On the other hand, the constant monitoring of people’s activities, while using these applications, has raised people’s concern about the invasiveness of...

Journal: :Data Knowl. Eng. 2009
Thomas Brochmann Pedersen Erkay Savas

The ability to perform scalar products of two vectors, each known to a different party, is a central problem in privacy preserving data mining and other multi party computation problems. Ongoing search for both efficient and secure scalar product protocols has revealed that this task is not easy. In this paper we show that, indeed, scalar products can never be made secure in the information the...

Journal: :Applied sciences 2022

The Internet of Drones (IoD) is greatly developed and promotes many civil applications. However, it can still be prone to several security problems which threaten public safety. issue poses further upon linking the IoD Internet, as its data stream exposed attack. For secure communication between drones, an effective route planning scheme with a major intention accomplishing needed. With this ai...

Journal: :Mathematics 2023

Precise route planning needs huge amounts of trajectory data recorded in multimedia devices. The data, including each user’s location privacy, are stored as cipher text. ability to plan routes on an encrypted database is urgent necessity. In this paper, order a public while protecting we design hybrid random bloom filter (RBF) tree databases, named the (eRBF) tree, which supports pruning and se...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید