نتایج جستجو برای: query on encrypted data

تعداد نتایج: 9286813  

2014
Patrick Grofig Martin Härterich Isabelle Hang Florian Kerschbaum Mathias Kohler Andreas Schaad Axel Schröpfer Walter Tighzert

This paper presents an industrial report on the implementation of a system that supports execution of queries over encrypted data. While this idea is not new, e.g. [HILM02, AKRX04, PRZB11], the implementation in a real world large scale in-memory database is still challenging. We will provide an overview of our architecture and detail two use cases to give the reader an insight into how we tech...

2017
Qian Wang Kui Ren Minxin Du Qi Li Aziz Mohaisen

In the era of big data, graph databases have become increasingly important for NoSQL technologies, and many systems (e.g., online social networks, world-wide web and electrical grids, etc.) can be modeled as graphs for semantic queries. Meanwhile, with the advent of cloud computing, data owners are highly motivated to outsource and store their massive potentially-sensitive graph data on remote ...

Journal: :CoRR 2018
Gagandeep Singh Akshar Kaul Sameep Mehta

To securely leverage the advantages of Cloud Computing, recently a lot of research has happened in the area of “Secure Query Processing over Encrypted Data”. As a concrete use case, many encryption schemes have been proposed for securely processing k Nearest Neighbors (SkNN) over encrypted data in the outsourced setting. Recently Zhu et al.[25] proposed a SkNN solution which claimed to satisfy ...

2013
Miyoung Jang Min Yoon

Traditional spatial databases owners outsource their resources to a cloud computing environment so that they can reduce cost for storage and management. However, the issue of privacy preservation is crucial in spatial database outsourcing since user location data is sensitive against unauthorized accesses. Existing privacy-preserving algorithms may reveal the original database from encrypted da...

Journal: :IACR Cryptology ePrint Archive 2017
David Pouliot Scott Griffy Charles V. Wright

Efficiently searchable and easily deployable encryption schemes enable an untrusted, legacy service such as a relational database engine to perform searches over encrypted data. The ease with which such schemes can be deployed on top of existing services makes them especially appealing in operational environments where encryption is needed but it is not feasible to replace large infrastructure ...

Journal: :International Journal of Computer Applications 2016

Journal: :J. Internet Serv. Inf. Secur. 2012
Jianfeng Wang Xiaofeng Chen Hua Ma Qiang Tang Jin Li Hui Zhu

As the Cloud Computing technology becomes mature, the need increases rapidly to store sensitive data securely on the cloud server. Since the cloud is not trusted, the data should be stored in an encrypted form at the server. An inherent problem is how to query the encrypted data efficiently. Recently, some searchable encryption schemes have been proposed in the literatures. Although the existin...

2013
Florian Kerschbaum Martin Härterich Mathias Kohler Isabelle Hang Andreas Schaad Axel Schröpfer Walter Tighzert

Processing encrypted queries in the cloud has been extended by CryptDB’s approach of adjustable onion encryption. This adjustment of the encryption entails a translation of an SQL query to an equivalent query on encrypted data. We investigate in more detail this translation and in particular the problem of selecting the right onion layer. Our algorithm extends CryptDB’s approach by three new fu...

2009
Craig Gentry

We propose the first fully homomorphic encryption scheme, solving a central open problem in cryptography. Such a scheme allows one to compute arbitrary functions over encrypted data without the decryption key – i.e., given encryptions E(m1), . . . , E(mt) of m1, . . . , mt, one can efficiently compute a compact ciphertext that encrypts f(m1, . . . ,mt) for any efficiently computable function f ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید