A Secure Protocol for Maintaining Privacy & Confidentiality in Untrusted Database

Provided by: IJCTT-International Journal of Computer Trends and Technology
Topic: Security
Format: PDF
Usually once secrecy becomes an apprehension, encrypted data before outsourcing to a service provider. Now and then deployed on constructs of any software-based cryptographic, the encrypted data in for server-side query processing on, essentially limit query expressiveness. Now, the authors introduce trusted database, an outsourced database model that allows users to implement SQL queries among confidentiality and leveraging server-hosted via in authoritarian obedience constraints, tamper - evidence trusted hardware in important query processing stages. Trusted database does not limitations the expressiveness of supported queries.

Find By Topic