نتایج جستجو برای: encrypted database

تعداد نتایج: 273905  

2014
Patrick Grofig Isabelle Hang Martin Härterich Florian Kerschbaum Mathias Kohler Andreas Schaad Axel Schröpfer Walter Tighzert

There are a few reliable privacy mechanisms for cloud applications. Data usually needs to be decrypted in order to be processed by the cloud service provider. In this paper we explore how an encrypted database can (technically) ensure privacy. We study the use case of a mobile personalized healthcare app. We show that an encrypted database can ensure data protection against a cloud service prov...

Journal: :CoRR 2017
Alexey Gribov Dhinakaran Vinayagamurthy Sergey Gorbunov

Encrypted database systems provide a great method for protecting sensitive data in untrusted infrastructures. These systems are built using either specialpurpose cryptographic algorithms that support operations over encrypted data, or by leveraging trusted computing co-processors. Strong cryptographic algorithms usually result in high performance overheads (e.g., public-key encryptions, garbled...

2016
J. Hyma

In this paper, we propose a new idea of searchable medical image encryption method to provide secrecy or authentication when a database is stashed away on a host maintained by a third-party server. This project addresses the trouble of enabling content based image retrieval throughout encrypted medical image dataset. Medical image database is encrypted by the owner of the content before transmi...

Journal: :IACR Cryptology ePrint Archive 2017
David Pouliot Scott Griffy Charles V. Wright

Efficiently searchable and easily deployable encryption schemes enable an untrusted, legacy service such as a relational database engine to perform searches over encrypted data. The ease with which such schemes can be deployed on top of existing services makes them especially appealing in operational environments where encryption is needed but it is not feasible to replace large infrastructure ...

2005
Richard Brinkman Berry Schoenmakers Jeroen Doumen Willem Jonker

To avoid insider attacks one cannot rely on access control to protect a database scheme. Encrypting the database is a better option. This paper describes a working prototype of an encrypted database system that allows remote querying over the encrypted data. Experiments with the system show the practical impact of our encoding scheme on storage space and CPU time. Two algorithms, each with two ...

Journal: :IEEE Transactions on Dependable and Secure Computing 2020

2006
Einar Mykletun Gene Tsudik

In the Database-As-a-Service (DAS) model, clients store their database contents at servers belonging to potentially untrusted service providers. To maintain data confidentiality, clients need to outsource their data to servers in encrypted form. At the same time, clients must still be able to execute queries over encrypted data. One prominent and fairly effective technique for executing SQL-sty...

Journal: :Proceedings on Privacy Enhancing Technologies 2019

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید