نتایج جستجو برای: encrypted database

تعداد نتایج: 273905  

2017
Rishabh Poddar Tobias Boelter Raluca Ada Popa

In recent years, encrypted databases have emerged as a promising direction that provides data confidentiality without sacrificing functionality: queries are executed on encrypted data. However, existing practical proposals rely on a set of weak encryption schemes that have been shown to leak sensitive data. In this paper, we propose Arx, a practical and functionally rich database system that en...

2013
Yongmin Yan Judy Yeh Chao Han Peng Wang Bo Hu Zhihui Guo Chengyi Zhang Weipeng Lin Hongwei Liang Yue Wang

In cloud computing, to protect privacy when outsourcing database management systems, confidential data (e.g., bank account balance) has to be encrypted which however renders traditional query processing methods (e.g., the B-tree index) inapplicable. In this thesis, we consider processing range query search (e.g., retrieving all records with a bank account balance being less than some threshold)...

Journal: :CoRR 2014
Segun Aina Yogachandran Rahulamathavan Raphael C.-W. Phan Jonathon A. Chambers

To date, most facial expression analysis have been based on posed image databases and is carried out without being able to protect the identity of the subjects whose expressions are being recognised. In this paper, we propose and implement a system for classifying facial expressions of images in the encrypted domain based on a Paillier cryptosystem implementation of Fisher Linear Discriminant A...

2014
Gagandeep Singh

In this thesis we present the work done in the construction of new Database model eDB under the Database as a service (DaaS) framework. The main challenge in the DaaS model is to provide data security from service provider along with efficient computation of queries on the cloud database. To handle both the challenges (data security and efficient computation), we use multiple partial homomorphi...

2006
Zhiqiang Yang Sheng Zhong Rebecca N. Wright

Data confidentiality is a major concern in database systems. Encryption is a useful tool for protecting the confidentiality of sensitive data. However, when data is encrypted, performing queries becomes more challenging. In this paper, we study efficient and provably secure methods for queries on encrypted data stored in an outsourced database that may be susceptible to compromise. Specifically...

2009
Jonathan Dautrich

It has become advantageous in certain scenarios for a database owner to outsource hosting and management of his database to a third party. This approach is known as database as a service or DAS. However, in the case of highly sensitive data, it may be necessary to protect it even from the third party database administrator. As a result, several methods have been proposed that allow for encrypti...

Journal: :I. J. Network Security 2012
Ayman Mousa Elsayed Nigm S. El-Rabaie Osama S. Faragallah

Encryption in database systems is an important topic for research, as secure and efficient algorithms are needed that provide the ability to query over encrypted database and allow optimized encryption and decryption of data. Clearly, there is a compromise between the degree of security provided by encryption and the efficient querying of the database, because the operations of encryption and d...

2013
Florian Kerschbaum Martin Härterich Axel Schröpfer Patrick Grofig Mathias Kohler Walter Tighzert Isabelle Hang Andreas Schaad

Recent databases are implemented as in-memory columnstores. Adjustable encryption offers a solution to encrypted database processing in the cloud. We show that the two technologies play well together by providing an analysis and prototype results that demonstrate the impact of mechanisms at the database side (dictionaries and their compression) and cryptographic mechanisms at the adjustable enc...

Journal: :IEEE Data Eng. Bull. 2012
Arvind Arasu Spyros Blanas Ken Eguro Manas Joglekar Raghav Kaushik Donald Kossmann Ravishankar Ramamurthy Prasang Upadhyaya Ramarathnam Venkatesan

Cipherbase is a full-fledged relational database system that leverages novel customized hardware to store and process encrypted data. This paper outlines the space of physical design options for Cipherbase and shows how application developers can implement their data confidentiality requirements by specifying the encryption method for static data storage and the acceptable information leakage f...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید