نتایج جستجو برای: query on encrypted data

تعداد نتایج: 9286813  

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه پیام نور - دانشگاه پیام نور استان تهران - دانشکده علوم تربیتی و روانشناسی 1388

on- the-job training on of the most effective tools for managers to cope with the changing organizational environment. it grantess suitable services to customers, particularly in public service enterprises. if such training os goal oriented, planned systematically, and tailored to the employees, job content, then not only it could increase employees and organizational performance, but also it c...

Journal: :IACR Cryptology ePrint Archive 2014
Foteini Baldimtsi Olga Ohrimenko

We study the problem of private outsourced sorting of encrypted data. We start by proposing a novel sorting protocol that allows a user to outsource his data to a cloud server in an encrypted form and then request the server to perform computations on this data and sort the result. To perform the sorting the server is assisted by a secure coprocessor with minimal computational and memory resour...

Nearest Neighbor (NN) searching is a challenging problem in data management and has been widely studied in data mining, pattern recognition and computational geometry. The goal of NN searching is efficiently reporting the nearest data to a given object as a query. In most of the studies both the data and query are assumed to be precise, however, due to the real applications of NN searching, suc...

Journal: :Future Generation Comp. Syst. 2014
Ruixuan Li Zhiyong Xu Wanshang Kang Kinchoong Yow Cheng-Zhong Xu

Cloud computing infrastructure is a promising new technology and greatly accelerates the development of large scale data storage, processing and distribution. However, security and privacy become major concerns when data owners outsource their private data onto public cloud servers that are not within their trusted management domains. To avoid information leakage, sensitive data have to be encr...

2014
K. Sriprasadh M. Prakash Kumar

Data retrieval is the largest task in any large database, in the world’s largest data bases like cloud data retrieval is the one of the major issue. Retrieving the data and processing the query over cloud server is very difficult. Many searching technique are used for retrieving the data from cloud servers. It can be retrieved through an optimization technique. There are many data retrieval tec...

Journal: :IACR Cryptology ePrint Archive 2015
Payal Chaudhari Manik Lal Das

Attribute Based Encryption (ABE) is a promising public-key cryptographic primitive that can be used for cryptographically enforced access control in untrusted storage. Storing data on untrusted storage not only requires data security for data owners but also poses data protection from untrusted storage server. To address this important requirement, Anonymous Attribute Based Encryption (AABE) is...

2011
Shiyuan Wang Divyakant Agrawal Amr El Abbadi

Data security in the cloud is a big concern that blocks the widespread use of the cloud for relational data management. First, to ensure data security, data confidentiality needs to be provided when data resides in storage as well as when data is dynamically accessed by queries. Prior works on query processing on encrypted data did not provide data confidentiality guarantees in both aspects. Tr...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه پیام نور - دانشگاه پیام نور استان تهران - دانشکده علوم انسانی 1390

this study attempted to explore if teaching english collocations through two different modes of awareness-raising and input flooding has any possible differential effect on immediate retention as well as retention in a delayed assessment. it also compared the possible differential effect of teaching english collocations implicitly and explicitly on actively using the items in writing. m...

Journal: :IEEE Access 2021

With the emergence of cloud computing, large amounts private data are stored and processed in cloud. On other hand, owners (users) may not want to reveal information providers protect their privacy. Therefore, users upload encrypted or third-party platforms, such as Google Cloud, Amazon Web Service, Microsoft Azure. Conventionally, must be decrypted before being analyzed cloud, which raises pri...

Journal: :PVLDB 2015
Zhian He Wai Kit Wong Ben Kao David Wai-Lok Cheung Rongbin Li Siu-Ming Yiu Eric Lo

We address security issues in a cloud database system which employs the DBaaS model — a data owner (DO) exports data to a cloud database service provider (SP). To provide data security, sensitive data is encrypted by the DO before it is uploaded to the SP. Compared to existing secure query processing systems like CryptDB [7] and MONOMI [8], in which data operations (e.g., comparison or addition...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید