نتایج جستجو برای: encrypted database

تعداد نتایج: 273905  

2010
Liangliang Xiao I-Ling Yen Dongdai Lin

The development of third-party hosting, IT outsourcing, service clouds, etc. raises important security concerns. It would be safer to encrypt critical data hosted by a third-parity, but meanwhile, the database should be able to process queries on encrypted data. Many research works have been developed to support search query processing on encrypted data, including the order preserving encryptio...

Journal: :IACR Cryptology ePrint Archive 2014
Foteini Baldimtsi Olga Ohrimenko

We study the problem of private outsourced sorting of encrypted data. We start by proposing a novel sorting protocol that allows a user to outsource his data to a cloud server in an encrypted form and then request the server to perform computations on this data and sort the result. To perform the sorting the server is assisted by a secure coprocessor with minimal computational and memory resour...

Journal: :CoRR 2017
Eirini Molla Theodoros Tzouramanis Stefanos Gritzalis

Due to the increasing demand for cloud services and the threat of privacy invasion, the user is suggested to encrypt the data before it is outsourced to the remote server. The safe storage and efficient retrieval of d-dimensional data on an untrusted server has therefore crucial importance. The paper proposes a new encryption model which offers spatial order-preservation for d-dimensional data ...

Journal: :Journal of Systems and Software 2011
Jin Wook Byun Dong Hoon Lee

We study a security model for searching documents containing each of several keywords (conjunctive keyword search) over encrypted documents. A conjunctive keyword search protocol consists of three entities: a data supplier, a storage system such as database, and a user of storage system. A data supplier uploads encrypted documents on a storage system, and then a user of the storage system searc...

Journal: :CoRR 2013
Manish Sharma Atul Chaudhary Santosh Kumar

Data is the central asset of today’s dynamically operating organization and their business. This data is usually stored in database. A major consideration is applied on the security of that data from the unauthorized access and intruders. Data encryption is a strong option for security of data in database and especially in those organizations where security risks are high. But there is a potent...

2015
Kirill Shatilov Sergey Krendelev Diana Anisutina Artem Sumaneev Evgeny Ogurtsov

Security of outsourced data is crucial for businesses. To protect and secure outsourced database, as a part of dynamic web resource while maintaining site’s work, we propose a solution featuring following key ideas. Firstly, we suggest to encrypt database content granularly with order preserving and homomorphic encryptions in order to conduct operation inside unmodified DBMS. Secondly, proposed...

2007
Jonathan Levesque Albert Murtha Mario Nascimento

This thesis details the implementation of a brain tumour imaging database. The database server necessity is two-fold: it must support researchers seeking to determine the growth patterns and other properties exhibited by brain tumours, and must support physicians requiring data to formulate treatment plans as well. This project is undertaken as part of the Brain Tumour Analysis Project, whose m...

Journal: :Communications of the ACM 1987

Journal: :Chaos theory and applications 2021

In this study, the images of wrist vein taken from individuals were subjected to various preprocessings
 and then encrypted with random numbers obtained chaotic system. Before encryption,
 generated using a The produced have successfully
 passed NIST 800-22 tests. Images security analysis
 such as correlation, NPCR, UACI histogram analysis. With study carried out, it has bee...

Journal: :Scholedge International Journal of Management & Development 2021

Cryptocurrencies and their underlying blockchain technology are being out as the next big thing after creation of internet. The Blockchain is an encrypted, distributed database that records data, or in other words, it a digital ledger any transactions, contracts - needs to be independently recorded. has been initially launched approach payment transactions based on cryptography provide alternat...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید