The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Due to its fast deployment and scalability, cloud computing has become a significant technology trend. Organizations with limited budgets can achieve great flexibility at a low price by outsourcing their data and query services to the cloud. Since the cloud is outside the organization's trusted domain, existing
Cloud computing is emerging as a revolutionary computing paradigm which provides a flexible and economic strategy for data management and resource sharing. Security and privacy become major concerns in the cloud scenario, for which Searchable Encryption (SE) technology is proposed to support efficient keyword based
increased computation has enhanced the usage of the digital technologies. The digital data interconnects with different network devices which lead to the study of reliability, scalability and security. Security is the major part of the outsourced databases. Prior works like searchable encryption and proxy re-encryption have
treatment. Aiming at the encryption scheme of fuzzy keyword search and the verifiable problem of the data returned by medical cloud in the security of medical cloud data, this paper analyzes the encryption of medical data outsourcing system on medical cloud and the security search method. A verifiable fuzzy keyword symmetric
Searchable encryption (SE) technique enables the users to search for the encrypted documents by keywords. As an implicit assumption, the documents are always treated as unstructured texts. However, in the real world, there are many structured documents such as metadata, XML etc. To further utilize the internal
expensive cryptographic operations, an agent-based searchable encryption (ABSE) scheme with its security model is proposed in order that the searchable encryption can be used in mobile computing environment. A concrete implement of ABSE with its security proof is presented to help user search the related data with some
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.