Research review on the application of homomorphic encryption in database privacy protection

Y Ma, J Zhao, K Li, Y Cao, H Chen… - International Journal of …, 2021 - igi-global.com
With the advent and development of database applications such as big data and data
mining, how to ensure the availability of data without revealing sensitive information has …

[HTML][HTML] A brief overview and an experimental evaluation of data confidentiality measures on the cloud

H Aljafer, Z Malik, M Alodib, A Rezgui - journal of innovation in digital …, 2014 - Elsevier
Due to the many advantages offered by the cloud computing paradigm, it is fast becoming
an enabling technology for many organizations, and even individual users. Flexibility and …

Adaptive indexing over encrypted numeric data

P Karras, A Nikitin, M Saad, R Bhatt… - Proceedings of the …, 2016 - dl.acm.org
Today, outsourcing query processing tasks to remote cloud servers becomes a viable
option; such outsourcing calls for encrypting data stored at the server so as to render it …

Outsourced private set intersection cardinality with fully homomorphic encryption

A Tajima, H Sato, H Yamana - 2018 6th International …, 2018 - ieeexplore.ieee.org
Cloud database services have attracted considerable interest with the increase in the
amount of data to be analyzed. Delegating data management to cloud services, however …

An adaptive and efficient fully homomorphic encryption technique

MA Yagoub, A Laouid, O Kazar, A Bounceur… - Proceedings of the 2nd …, 2018 - dl.acm.org
The huge amount of generated data offers special advantages mainly in dynamic and
scalable systems. In fact, the data generator entities need to share the generated data with …

Security aspects of database-as-a-service (DBaaS) in cloud computing

F Mehak, R Masood, Y Ghazi, MA Shibli… - … , Limitations and R&D …, 2014 - Springer
Abstract Database-as-a-Service (DBaaS) provides a wide range of benefits such as data
outsourcing, multi-tenancy and resource sharing. It has garnered a lot of hype, but while it is …

A lightweight privacy and integrity preserving range query scheme for mobile cloud computing

Z Xu, Y Lin, VKA Sandor, Z Huang, X Liu - Computers & Security, 2019 - Elsevier
Mobile cloud computing has received a particular attention in recent years thanks to the
expansion and easy accessibility of smartphones with enhanced capabilities, pushing for …

Enabling secure query processing in the cloud using fully homomorphic encryption

M Mani - Proceedings of the Second Workshop on Data …, 2013 - dl.acm.org
The database community, at least for the last decade, has been grappling with querying
encrypted data, which would enable secure database as a service solutions. A recent …

[PDF][PDF] Review of cryptography in cloud computing

S Zaineldeen, A Ate - Int. J. Comput. Sci. Mobile Comput, 2020 - academia.edu
Cloud computing offerings a distinctive way to share distributed resources, cloud computing
is a type of Internet-based sharing of distributed assets through web. It is a model that …

Computing over encrypted spatial data generated by IoT

SV Limkar, RK Jha - Telecommunication Systems, 2019 - Springer
Proliferation of IoT devices produces the enormous amount of data that need to be stored on
clouds. A main focus of this paper is to ensure the secrecy of data, while it is in transit …