2015 Third World Conference on Complex Systems (WCCS) 2015
DOI: 10.1109/icocs.2015.7483217
|View full text |Cite
|
Sign up to set email alerts
|

A secure algorithm for executing queries over encrypted data

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2017
2017
2023
2023

Publication Types

Select...
4

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(2 citation statements)
references
References 5 publications
0
2
0
Order By: Relevance
“…In this case, the database owner is the only one capable of decryption data or distributing keys over trusted clients. Client-side encryption illustrates the 0-knowledge policy that prevents any sort of unauthorized access to information in the cloud [10].…”
Section: Encryption Techniquesmentioning
confidence: 99%
See 1 more Smart Citation
“…In this case, the database owner is the only one capable of decryption data or distributing keys over trusted clients. Client-side encryption illustrates the 0-knowledge policy that prevents any sort of unauthorized access to information in the cloud [10].…”
Section: Encryption Techniquesmentioning
confidence: 99%
“…Amazon Aurora, Google Cloud SQL and Microsoft Azure are some examples of cloud database services that are available in the market and offer SQL and NoSql database services. [10] As a result of the evolution on the area of cloud database services, many issues and challenges have been addressed and been under researches. Cloud database services promises include scalability, availability and elasticity.…”
Section: Introductionmentioning
confidence: 99%