Loading [a11y]/accessibility-menu.js
Security analysis for order preserving encryption schemes | IEEE Conference Publication | IEEE Xplore

Security analysis for order preserving encryption schemes


Abstract:

The development of third-party hosting, IT out-sourcing, service clouds, etc. raises important security concerns. It is safer to encrypt critical data that is hosted by a...Show More

Abstract:

The development of third-party hosting, IT out-sourcing, service clouds, etc. raises important security concerns. It is safer to encrypt critical data that is hosted by a third party. However, a database must be able to process queries on the encrypted data. Many algorithms have been developed to support search query processing on encrypted data, including order preserving encryption (OPE) schemes.
Date of Conference: 21-23 March 2012
Date Added to IEEE Xplore: 24 September 2012
ISBN Information:
Conference Location: Princeton, NJ, USA

Contact IEEE to Subscribe

References

References is not available for this document.