Back to Search Start Over

Different Search Strategies on Encrypted Data Compared.

Authors :
Carey, M. J.
Ceri, S.
Bernstein, P.
Dayal, U.
Faloutsos, C.
Freytag, J. C.
Gardarin, G.
Jonker, W.
Krishnamurthy, V.
Neimat, M. -A.
Valduriez, P.
Weikum, G.
Whang, K. -Y.
Widom, J.
Petković, Milan
Jonker, Willem
Brinkman, Richard
Source :
Security, Privacy & Trust in Modern Data Management; 2007, p183-196, 14p
Publication Year :
2007

Abstract

When private information is stored in databases that are under the control of others, the only possible way to protect it is to encrypt it before storing it. In order to efficiently retrieve the data, a search mechanism that still works over the encrypted data is needed. In this chapter an overview of several search strategies is given. Some add meta-data to the database and do the searching only in the metadata, others search in the data itself or use secret sharing to solve the problem. Each strategy has its own advantages and disadvantages. [ABSTRACT FROM AUTHOR]

Details

Language :
English
ISBNs :
9783540698609
Database :
Supplemental Index
Journal :
Security, Privacy & Trust in Modern Data Management
Publication Type :
Book
Accession number :
33096724
Full Text :
https://doi.org/10.1007/978-3-540-69861-6_13