2012 International Conference on Information Security and Intelligent Control 2012
DOI: 10.1109/isic.2012.6449709
|View full text |Cite
|
Sign up to set email alerts
|

An Efficient Fine-grained Access Control mechanism for database outsourcing service

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2013
2013
2013
2013

Publication Types

Select...
1

Relationship

1
0

Authors

Journals

citations
Cited by 1 publication
(1 citation statement)
references
References 11 publications
0
1
0
Order By: Relevance
“…We can use any block cipher technique such as AES, RSA, Blowfish, etc., with the key size 128 bits. If there is unique user (also the data owner) in the system, we use one key for encrypting the whole database; otherwise, we use multiple keys which are managed by a key management mechanism [8,9,10]. The index is created based on the mapping function Map R.Ai (v), which will be defined as the following: We use the operator D that maps the encrypted representation to its corresponding unencrypted representation.…”
Section: Storage Modelmentioning
confidence: 99%
“…We can use any block cipher technique such as AES, RSA, Blowfish, etc., with the key size 128 bits. If there is unique user (also the data owner) in the system, we use one key for encrypting the whole database; otherwise, we use multiple keys which are managed by a key management mechanism [8,9,10]. The index is created based on the mapping function Map R.Ai (v), which will be defined as the following: We use the operator D that maps the encrypted representation to its corresponding unencrypted representation.…”
Section: Storage Modelmentioning
confidence: 99%