نتایج جستجو برای: query on encrypted data
تعداد نتایج: 9286813 فیلتر نتایج به سال:
As an increasing number of data is to be processed, outsourcing data to the cloud environment becomes an appealing proposal to heighten the computation/storage efficiency, while avoiding costly and complicated system construction. However, it is necessary to encrypt the outsourced data to prevent the breaches of both data confidentiality and privacy. Most of the statistical procedures deal with...
abstract the current study set out to address the issue as to whether the implementation of portfolio assessment would give rise to iranian pre-intermediate efl learner autonomy. participants comprised 60 female in pre-intermediate level within the age range of 16-28.they were selected from among 90 language learners based on their scores on language proficiency test -key english test. then, t...
We propose the concept of selective document retrieval (SDR) from an encrypted database which allows a client to store encrypted data on a third-party server and perform efficient search remotely. We propose a new SDR scheme based on the recent advances in fully homomorphic encryption schemes. The proposed scheme is secure in our security model and can be adapted to support many useful search f...
Current security mechanisms are not suitable for organisations that outsource their data management to untrusted servers. Encrypting and decrypting sensitive data at the client side is the normal approach in this situation but has high communication and computation overheads if only a subset of the data is required, for example, selecting records in a database table based on a keyword search. N...
Encryption is an optimistic way to preserve the secrecy of the outsource data. On other hand, performing search operation on encrypted data is a complicated job. A lot of encryption techniques have been suggested by researchers to avoid improper usage of unstructured data on the cloud. But still by using the existing searchable encryption techniques, searching data on cloud server becomes diffi...
So far, we have studied the problem of outsourcing computation when we want our data to be private from the server. Today, we will forget about privacy and focus on the problem of verifying that the server computes correctly for us. Specifically, we will look at decision problems. We consider the problem where we send the cloud x, and the cloud (efficiently) computes both f(x) as well as a proo...
We introduce the concept of Anonymous Multi-Attribute Encryption with Range Query and Conditional Decryption (AMERQCD). In AMERQCD, a plaintext is encrypted under a point in multidimensional space. To a computationally bounded adversary, the ciphertext hides both the plaintext and the point under which it is encrypted. In a range query, a master key owner releases the decryption key for an arbi...
Computing environments change: everyone has portable computing devices (in form of mobile phones) and access to large servers (in the cloud). This change presents fundamental challenge of outsourcing computation, which is motivated by the asymmetry of the available computing power. In recent computing scenarios clients are trusted (but weak), while computationally strong servers are untrusted a...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید