2019
DOI: 10.3844/jcssp.2019.1585.1594
|View full text |Cite
|
Sign up to set email alerts
|

A Comparative Study of Encryption Methods for Cloud Query Processing

Abstract: Query cloud process is an interested research study that caught many researchers' attentions. Several studies have presented different types of encryption in order to encrypt the data prior to being migrated over the cloud. However, there is an essential demand to balance between the time consumption and encryption security. This paper presented a comparative study of encryption methods for query execution over the cloud. Three common encryption methods have been used including Advanced Encryption Standard (AE… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2022
2022
2022
2022

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(2 citation statements)
references
References 15 publications
(15 reference statements)
0
2
0
Order By: Relevance
“…Whereas, ๐ผ(๐‘ฅ, ๐‘ฆ)and ๐พ(๐‘ฅ, ๐‘ฆ) denote pixel values of the two images respectively. The low the value of MSE, the better steganography is acquired.On the other hand, PSNR aims at assessing the quality of an image statistically, it can be computed as in (2):…”
Section: Resultsmentioning
confidence: 99%
See 1 more Smart Citation
“…Whereas, ๐ผ(๐‘ฅ, ๐‘ฆ)and ๐พ(๐‘ฅ, ๐‘ฆ) denote pixel values of the two images respectively. The low the value of MSE, the better steganography is acquired.On the other hand, PSNR aims at assessing the quality of an image statistically, it can be computed as in (2):…”
Section: Resultsmentioning
confidence: 99%
“…Such an opportunity for communications comes with various risks and vulnerabilities that might threaten information security. Thus, an imperative demand to secure such communications by providing authentic and confidential data access and exchange [2], [3]. Here comes the role of cryptography in which a secure channel for exchanging information can be provided effectively.…”
Section: Introductionmentioning
confidence: 99%