全部文献期刊学位论文会议报纸专利标准年鉴图书|学者科研项目
中外文文献  中文文献  外文文献
作者:Seungtae Hong , Hyeong-Il Kim , Jae-Woo Chang
来源:[J].World Wide Web(IF 1.196), 2017, Vol.20 (3), pp.467-490Springer
摘要:Recently, researches on key management scheme for user access control in outsourced databases have been actively done. Because outsourced databases require dealing with a lot of users and data resources, an efficient key management scheme for reducing the number of authentication...
作者:Zhen Guo , Hui Li , Chunjie Cao ...
来源:[J].Cluster Computing(IF 0.776), 2019, Vol.22 (3), pp.5185-5193Springer
摘要:Abstract(#br)In cloud computing, by using the outsourcing technique, the clients can perform the complex tasks easily with the help of cloud computing. However, cloud service providers are usually untrusted, thus, the clients may lose the controllability of outsourced data. There...
作者:Zheli Liu , Xiaofeng Chen , Jun Yang ...
来源:[J].Journal of Network and Computer Applications(IF 1.467), 2016, Vol.59, pp.198-207Elsevier
摘要:..., 2013) requires the database server to maintain extra information and realize comparison or range query by user defined functions (UDFs). However, order operations will no longer be performed directly on the ciphertext. It will affect the efficiency and make this scheme to be...
作者:Wei Song , Bing Wang , Qian Wang ...
来源:[J].Information Sciences(IF 3.643), 2016Elsevier
摘要:Abstract(#br)With the advent of cloud computing, outsourcing databases to remote cloud servers provide the elastic, flexible and affordable data management services for the Internet users. The cloud users can create, store, access and update the remote outsourced databases just...
作者:Hyeong-Il Kim , Hyeong-Jin Kim , Jae-Woo Chang
来源:[J].Data & Knowledge Engineering(IF 1.519), 2017Elsevier
摘要:Abstract(#br)With the adoption of cloud computing, database outsourcing has emerged as a new platform. Due to the serious privacy concerns associated with cloud computing, databases must be encrypted before being outsourced to the cloud. Therefore, various k-nearest neighbor (k...
作者:Jianfeng Wang , Meixia Miao , Yaqian Gao ...
来源:[J].Soft Computing(IF 1.124), 2016, Vol.20 (11), pp.4487-4495Springer
摘要:Abstract(#br)Approximate nearest neighbor (ANN) search in high-dimensional space has been studied extensively in recent years. However, it supports only ANN search over plaintext in traditional locality-sensitive hashing (LSH). How to perform ANN search over encrypted data become...
作者:Jianfeng Wang , Xiaofeng Chen , Jin Li ...
来源:[J].Future Generation Computer Systems(IF 1.864), 2017, Vol.67, pp.266-275Elsevier
摘要:Abstract(#br)The notion of outsourced database allows the data owner to outsource a database to the cloud service provider (CSP), and then anyone can enjoy database services provided by the CSP. Some new security and privacy concerns, e.g., query integrity, are inevitably raised ...
作者:Xiaoming Wang , Guoxiang Yao
来源:[J].Frontiers of Computer Science(IF 0.298), 2012, Vol.6 (6), pp.677-685Springer
摘要:Abstract(#br)To manage dynamic access control and deter pirate attacks on outsourced databases, a dynamic access control scheme with tracing is proposed. In our scheme, we introduce the traitor tracing idea into outsource databases, and employ a polynomial function and filter fun...
作者:Xiaoming Wang , Yanchun Lin , Guoxiang Yao
来源:[J].Security and Communication Networks(IF 0.311), 2014, Vol.7 (12), pp.2293-2301Wiley
摘要:ABSTRACT(#br)In order to verify the integrity of the query results in outsourced database model, we first present a new authenticated data structure by combining skip lists with polynomial functions and accumulators and then construct a data integrity verification scheme for ran...
作者:Kyriakos Mouratidis , Dimitris Sacharidis , HweeHwa Pang
来源:[J].The VLDB Journal(IF 1.395), 2009, Vol.18 (1), pp.363-381Springer
摘要:Abstract(#br)In the outsourced database model, a data owner publishes her database through a third-party server; i.e., the server hosts the data and answers user queries on behalf of the owner. Since the server may not be trusted, or may be compromised, users need a means to veri...

我们正在为您处理中,这可能需要一些时间,请稍等。

资源合作:cnki.scholar@cnki.net, +86-10-82896619   意见反馈:scholar@cnki.net

×