Research review on the application of homomorphic encryption in database privacy protection
Y Ma, J Zhao, K Li, Y Cao, H Chen… - International Journal of …, 2021 - igi-global.com
With the advent and development of database applications such as big data and data
mining, how to ensure the availability of data without revealing sensitive information has …
mining, how to ensure the availability of data without revealing sensitive information has …
[HTML][HTML] A brief overview and an experimental evaluation of data confidentiality measures on the cloud
Due to the many advantages offered by the cloud computing paradigm, it is fast becoming
an enabling technology for many organizations, and even individual users. Flexibility and …
an enabling technology for many organizations, and even individual users. Flexibility and …
Adaptive indexing over encrypted numeric data
Today, outsourcing query processing tasks to remote cloud servers becomes a viable
option; such outsourcing calls for encrypting data stored at the server so as to render it …
option; such outsourcing calls for encrypting data stored at the server so as to render it …
Outsourced private set intersection cardinality with fully homomorphic encryption
A Tajima, H Sato, H Yamana - 2018 6th International …, 2018 - ieeexplore.ieee.org
Cloud database services have attracted considerable interest with the increase in the
amount of data to be analyzed. Delegating data management to cloud services, however …
amount of data to be analyzed. Delegating data management to cloud services, however …
An adaptive and efficient fully homomorphic encryption technique
The huge amount of generated data offers special advantages mainly in dynamic and
scalable systems. In fact, the data generator entities need to share the generated data with …
scalable systems. In fact, the data generator entities need to share the generated data with …
Security aspects of database-as-a-service (DBaaS) in cloud computing
Abstract Database-as-a-Service (DBaaS) provides a wide range of benefits such as data
outsourcing, multi-tenancy and resource sharing. It has garnered a lot of hype, but while it is …
outsourcing, multi-tenancy and resource sharing. It has garnered a lot of hype, but while it is …
A lightweight privacy and integrity preserving range query scheme for mobile cloud computing
Z Xu, Y Lin, VKA Sandor, Z Huang, X Liu - Computers & Security, 2019 - Elsevier
Mobile cloud computing has received a particular attention in recent years thanks to the
expansion and easy accessibility of smartphones with enhanced capabilities, pushing for …
expansion and easy accessibility of smartphones with enhanced capabilities, pushing for …
Enabling secure query processing in the cloud using fully homomorphic encryption
M Mani - Proceedings of the Second Workshop on Data …, 2013 - dl.acm.org
The database community, at least for the last decade, has been grappling with querying
encrypted data, which would enable secure database as a service solutions. A recent …
encrypted data, which would enable secure database as a service solutions. A recent …
[PDF][PDF] Review of cryptography in cloud computing
S Zaineldeen, A Ate - Int. J. Comput. Sci. Mobile Comput, 2020 - academia.edu
Cloud computing offerings a distinctive way to share distributed resources, cloud computing
is a type of Internet-based sharing of distributed assets through web. It is a model that …
is a type of Internet-based sharing of distributed assets through web. It is a model that …
Computing over encrypted spatial data generated by IoT
Proliferation of IoT devices produces the enormous amount of data that need to be stored on
clouds. A main focus of this paper is to ensure the secrecy of data, while it is in transit …
clouds. A main focus of this paper is to ensure the secrecy of data, while it is in transit …