Provided by:
IJCTT-International Journal of Computer Trends and Technology
Topic:
Security
Format:
PDF
Usually once secrecy becomes an apprehension, encrypted data before outsourcing to a service provider. Now and then deployed on constructs of any software-based cryptographic, the encrypted data in for server-side query processing on, essentially limit query expressiveness. Now, the authors introduce trusted database, an outsourced database model that allows users to implement SQL queries among confidentiality and leveraging server-hosted via in authoritarian obedience constraints, tamper - evidence trusted hardware in important query processing stages. Trusted database does not limitations the expressiveness of supported queries.