نتایج جستجو برای: query on encrypted data

تعداد نتایج: 9286813  

Journal: :Inf. Sci. 2006
Jae-Gil Lee Kyu-Young Whang

Dissemination of XML data on the internet could breach the privacy of data providers unless access to the disseminated XML data is carefully controlled. Recently, the methods using encryption have been proposed for such access control. However, in these methods, the performance of processing queries has not been addressed. A query processor cannot identify the contents of encrypted XML data unl...

2017
Hui Yin Zheng Qin Jixin Zhang Lu Ou

Secure search techniques over encrypted cloud data allow an authorized user to query data files of interest by submitting encrypted query keywords to the cloud server in a privacy-preserving manner. However, in practice, the returned query results may be incorrect or incomplete in the dishonest cloud environment. For example, the cloud server may intentionally omit some qualified results to sav...

2012
Arvind Arasu Raghav Kaushik Ravi Ramamurthy

Data security is a serious concern when we migrate data to a cloud DBMS. Database encryption, where sensitive columns are encrypted before they are stored in the cloud, has been proposed as a mechanism to address such data security concerns.The intuitive expectation is that an adversary cannot “learn” anything about the encrypted columns, since she does not have access to the encryption key. Ho...

Journal: :Knowl.-Based Syst. 2012
Zongda Wu Guandong Xu Yu Zong Xun Yi Enhong Chen Yanchun Zhang

Rapid advances in the networking technologies have prompted the emergence of the ‘‘software as service’’ model for enterprise computing, moreover, which is becoming one of the key industries quickly. ‘‘Database as service’’ model provides users power to store, modify and retrieve data from anywhere in the world, as long as they have access to the Internet, thus, being increasingly popular in cu...

2004
Zheng-Fei Wang Jing Dai Wei Wang Baile Shi

There are a lot of very important data in database, which need to be protected from attacking. Cryptographic support is an important mechanism of securing them. People, however, must tradeoff performance to ensure the security because the operation of encryption and decryption greatly degrades query performance. To solve such a problem, an approach is proposed that can implement SQL query on th...

Journal: :IACR Cryptology ePrint Archive 2017
Marie-Sarah Lacharité Brice Minaud Kenneth G. Paterson

We analyse the security of database encryption schemes supporting range queries against persistent adversaries. Security against such an adversary captures, among other things, the privacy of the client’s data with respect to the server hosting the encrypted database. The bulk of our work applies to a generic setting, where the view of the adversary is limited to the set of records or documents...

Journal: :JCP 2014
Shanyue Bu Yue Zhang Kun Yu

Cloud servers could provide secure services to data management for encrypted sensitive data, however, the difficulties of querying these data by data owners increase.To solve the problem,this paper proposes a new scheme for range queries over encrypted data. In particular, the indices and interval trapdoors of sensitive data are first created by using circle mapping. Then, these indices and int...

2008
Feng Bao Robert H. Deng Xuhua Ding Yanjiang Yang

Searchable encryption schemes allow users to perform keyword based searches on an encrypted database. Almost all existing such schemes only consider the scenario where a single user acts as both the data owner and the querier. However, most databases in practice do not just serve one user; instead, they support search and write operations by multiple users. In this paper, we systematically stud...

2014
Bharath K. Samanthula Wei Jiang Elisa Bertino

In the last decade, several techniques have been proposed to evaluate different types of queries (e.g., range and aggregate queries) over encrypted data in a privacy-preserving manner. However, solutions supporting the privacypreserving evaluation of complex queries over encrypted data have been developed only recently. Such recent techniques, however, are either insecure or not feasible for pr...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید