نتایج جستجو برای: encrypted database

تعداد نتایج: 273905  

2017
MASHAEL M. ALSULAMI AMIN Y. NOAMAN

With the rapid growth of technology, cloud computing become more and more popular. Many organizations have been attracted by the variety of services that have been offered by the clouds in form of resources and applications. Database system is one of the most widely used systems in industry. Cloud providers offer database-as-a-service to attract more clients to use their services. However, exec...

2016
Young-Dal Jang Ji-Hong Kim

Received Jul 28, 2015 Revised Nov 21, 2015 Accepted Dec 2, 2015 In accordance with the database management, DAS (database as service) model is one solution for outsourcing. However, we need some data protection mechanisms in order to maintain the database security Themost effective algorithm to secure databases from the security threat of third party attackers is to encrypt the sensitive data w...

Journal: :Concurrency and Computation: Practice and Experience 2013
Dongxi Liu Shenlu Wang

The database services on cloud are appearing as an attractive way of outsourcing databases. When a database is deployed on a cloud database service, the data security and privacy becomes a big concern for users. A straightforward way to address this concern is to encrypt the database. However, after encryption, the database cannot be easily queried. In this paper, we propose a nonlinear order p...

Journal: :Journal of the Korea Institute of Information Security and Cryptology 2014

2009
Wenjun Lu Ashwin Swaminathan Avinash L. Varna Min Wu

Performing information retrieval tasks while preserving data confidentiality is a desirable capability when a database is stored on a server maintained by a third-party service provider. This paper addresses the problem of enabling content-based retrieval over encrypted multimedia databases. Search indexes, along with multimedia documents, are first encrypted by the content owner and then store...

Journal: :CoRR 2015
Youssef Gahi Mouhcine Guennoun Khalil El-Khatib

Cloud computing emerges as an attractive solution that can be delegated to store and process confidential data. However, several security risks are encountered with such a system as the securely encrypted data should be decrypted before processing them. Therefore, the decrypted data is susceptible to reading and alterations. As a result, processing encrypted data has been a research subject sin...

2012
Arvind Arasu Raghav Kaushik Ravi Ramamurthy

Data security is a serious concern when we migrate data to a cloud DBMS. Database encryption, where sensitive columns are encrypted before they are stored in the cloud, has been proposed as a mechanism to address such data security concerns.The intuitive expectation is that an adversary cannot “learn” anything about the encrypted columns, since she does not have access to the encryption key. Ho...

2005
Erez Shmueli Ronen Vaisenberg Yuval Elovici Ehud Gudes

The conventional way to speedup queries execution is by using indexes. Designing secure indexes for an encrypted database environment raises the question of how to construct the index so that no information about the database content is exposed. In this paper, the challenges raised when designing a secure index for an encrypted database are outlined; the attacker model is described; possible at...

2013
Miyoung Jang Min Yoon Jae-Woo Chang

With the advancement of cloud computing technologies and the propagation of locationbased services, research on outsourced spatial databases has been spotlighted. Therefore, the traditional spatial databases owners want to outsource their resources to a service provider so that they can reduce cost for storage and management. However, the issue of privacy preservation is crucial in spatial data...

2013
Miyoung Jang Min Yoon

Traditional spatial databases owners outsource their resources to a cloud computing environment so that they can reduce cost for storage and management. However, the issue of privacy preservation is crucial in spatial database outsourcing since user location data is sensitive against unauthorized accesses. Existing privacy-preserving algorithms may reveal the original database from encrypted da...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید