نتایج جستجو برای: secure search

تعداد نتایج: 349641  

Journal: :International Journal of Future Generation Communication and Networking 2013

While cloud computing is growing at a remarkable speed, privacy issues are far from being solved. One way to diminish privacy concerns is to store data on the cloud in encrypted form. However, encryption often hinders useful computation cloud services. A theoretical approach is to employ the so-called fully homomorphic encryption, yet the overhead is so high that it is not considered a viable s...

Journal: :Softw., Pract. Exper. 2017
Mohsen Amini Salehi Thomas Caldwell Alejandro Fernandez Emmanuel Mickiewicz Eric Rozier Saman A. Zonouz David Redberg

Lack of trust has become one of the main concerns of users who tend to utilize one or multiple Cloud providers. Trustworthy Cloud-based computing and data storage require secure and efficient solutions which allow clients to remotely store and process their data in the Cloud. User-side encryption is an established method to secure the user data on the Cloud. However, using encryption, we lose p...

Journal: :CoRR 2017
Florian Kerschbaum Anselme Tueno

At CCS 2015 Naveed et al. presented first attacks on efficiently searchable encryption, such as deterministic and order-preserving encryption. These plaintext guessing attacks have been further improved in subsequent work, e.g. by Grubbs et al. in 2016. Such cryptanalysis is crucially important to sharpen our understanding of the implications of security models. In this paper we present an effi...

2017
Shangping Wang Duqiao Zhao Yaling Zhang

Attribute based encryption (ABE) is a good way to achieve flexible and secure access control to data, and attribute revocation is the extension of the attribute-based encryption, and the keyword search is an indispensable part for cloud storage. The combination of both has an important application in the cloud storage. In this paper, we construct a searchable attribute-based encryption scheme w...

2017
Hui Yin Zheng Qin Jixin Zhang Lu Ou

Secure search techniques over encrypted cloud data allow an authorized user to query data files of interest by submitting encrypted query keywords to the cloud server in a privacy-preserving manner. However, in practice, the returned query results may be incorrect or incomplete in the dishonest cloud environment. For example, the cloud server may intentionally omit some qualified results to sav...

2000
Arindam Mitra

A computationally secure noised based cipher system is proposed. The advantage of this cipher system is that it operates above noise level. Therefore computationally secure communication can be done when error correction code fails. Another feature of this system is that minimum number of exhaustive key search can be made fixed.

Journal: :IET networks 2022

Abstract Sixth Generation (6G) integrates the next generation communication systems such as maritime, terrestrial, and aerial to offer robust network massive device connectivity with ultra‐low latency requirement. The cutting edge technologies artificial intelligence, quantum machine learning, millimetre enable hyper‐connectivity extend development of mobile communication. potential utilise dif...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید