نتایج جستجو برای: query on encrypted data

تعداد نتایج: 9286813  

2017
MASHAEL M. ALSULAMI AMIN Y. NOAMAN

With the rapid growth of technology, cloud computing become more and more popular. Many organizations have been attracted by the variety of services that have been offered by the clouds in form of resources and applications. Database system is one of the most widely used systems in industry. Cloud providers offer database-as-a-service to attract more clients to use their services. However, exec...

2002
Krista Bennett Christian Grothoff Tzvetan Horozov Ioana Patrascu

This paper describes the design of a censorship-resistant distributed file sharing protocol which has been implemented on top of gnunet, an anonymous, reputation-based network. We focus on the encoding layer of the gnunet file-sharing protocol which supports efficient dissemination of encrypted data as well as queries over encrypted data. The main idea advocated in this paper is that simple cry...

2017
Arati Deshmukh

The major aim of this paper is to solve the problem of multi-keyword ranked search over encrypted cloud data (MRSE) at the time of protecting exact method wise privacy in the cloud computing concept. Data holders are encouraged to outsource their difficult data management systems from local sites to the business public cloud for large flexibility and financial savings. However for protecting da...

Journal: :Proceedings on Privacy Enhancing Technologies 2019

Deductive Database systems are designed based on a logical data model. Data (as opposed to Relational Databases Management System (RDBMS) in which data stored in tables) are saved as facts in a Deductive Database system. Datalog Educational System (DES) is a Deductive Database system that Datalog mode is the default mode in this system. It can extract data to use outer joins with three query la...

2017
Zeeshan Pervez Mahmood Ahmad Asad Masood Khattak Naeem Ramzan Wajahat Ali Khan

Public cloud storage services are becoming prevalent and myriad data sharing, archiving and collaborative services have emerged which harness the pay-as-you-go business model of public cloud. To ensure privacy and confidentiality often encrypted data is outsourced to such services, which further complicates the process of accessing relevant data by using search queries. Search over encrypted da...

Journal: :IEICE Transactions 2014
Youwen Zhu Tsuyoshi Takagi Rong Hu

Recently, Yuan et al. (IEEE Infocom ’13, pp.2652–2660) proposed an efficient secure nearest neighbor (SNN) search scheme on encrypted cloud database. Their scheme is claimed to be secure against the collusion attack of query clients and cloud server, because the colluding attackers cannot infer the encryption/decryption key. In this letter, we observe that the encrypted dataset in Yuan’s scheme...

Journal: :CoRR 2014
Pengtao Xie Eric P. Xing

Many graph mining and analysis services have been deployed on the cloud, which can alleviate users from the burden of implementing and maintaining graph algorithms. However, putting graph analytics on the cloud can invade users’ privacy. To solve this problem, we propose CryptGraph, which runs graph analytics on encrypted graph to preserve the privacy of both users’ graph data and the analytic ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید