Download Now Free registration required
The trend towards delegating data processing and management to a remote party raises major concerns related to privacy violations for both end-users and service providers. These concerns have attracted the attention of the research community, and several techniques have been proposed to protect against malicious parties by providing secure communication protocols. Most of the proposed techniques, however, require the involvement of a third party, and this by itself can be viewed as another security concern. These security breaches can be avoided by following an innovative approach that depends on data sorted, managed, and stored in encrypted form at the remote servers.
- Format: PDF
- Size: 394.9 KB