نتایج جستجو برای: encrypted database
تعداد نتایج: 273905 فیلتر نتایج به سال:
The development of third-party hosting, IT outsourcing, service clouds, etc. raises important security concerns. It would be safer to encrypt critical data hosted by a third-parity, but meanwhile, the database should be able to process queries on encrypted data. Many research works have been developed to support search query processing on encrypted data, including the order preserving encryptio...
We study the problem of private outsourced sorting of encrypted data. We start by proposing a novel sorting protocol that allows a user to outsource his data to a cloud server in an encrypted form and then request the server to perform computations on this data and sort the result. To perform the sorting the server is assisted by a secure coprocessor with minimal computational and memory resour...
Due to the increasing demand for cloud services and the threat of privacy invasion, the user is suggested to encrypt the data before it is outsourced to the remote server. The safe storage and efficient retrieval of d-dimensional data on an untrusted server has therefore crucial importance. The paper proposes a new encryption model which offers spatial order-preservation for d-dimensional data ...
We study a security model for searching documents containing each of several keywords (conjunctive keyword search) over encrypted documents. A conjunctive keyword search protocol consists of three entities: a data supplier, a storage system such as database, and a user of storage system. A data supplier uploads encrypted documents on a storage system, and then a user of the storage system searc...
Data is the central asset of today’s dynamically operating organization and their business. This data is usually stored in database. A major consideration is applied on the security of that data from the unauthorized access and intruders. Data encryption is a strong option for security of data in database and especially in those organizations where security risks are high. But there is a potent...
Security of outsourced data is crucial for businesses. To protect and secure outsourced database, as a part of dynamic web resource while maintaining site’s work, we propose a solution featuring following key ideas. Firstly, we suggest to encrypt database content granularly with order preserving and homomorphic encryptions in order to conduct operation inside unmodified DBMS. Secondly, proposed...
This thesis details the implementation of a brain tumour imaging database. The database server necessity is two-fold: it must support researchers seeking to determine the growth patterns and other properties exhibited by brain tumours, and must support physicians requiring data to formulate treatment plans as well. This project is undertaken as part of the Brain Tumour Analysis Project, whose m...
In this study, the images of wrist vein taken from individuals were subjected to various preprocessings
 and then encrypted with random numbers obtained chaotic system. Before encryption,
 generated using a The produced have successfully
 passed NIST 800-22 tests. Images security analysis
 such as correlation, NPCR, UACI histogram analysis. With study carried out, it has bee...
Cryptocurrencies and their underlying blockchain technology are being out as the next big thing after creation of internet. The Blockchain is an encrypted, distributed database that records data, or in other words, it a digital ledger any transactions, contracts - needs to be independently recorded. has been initially launched approach payment transactions based on cryptography provide alternat...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید