Back to Search
Start Over
Different Search Strategies on Encrypted Data Compared.
- Source :
- Security, Privacy & Trust in Modern Data Management; 2007, p183-196, 14p
- Publication Year :
- 2007
-
Abstract
- When private information is stored in databases that are under the control of others, the only possible way to protect it is to encrypt it before storing it. In order to efficiently retrieve the data, a search mechanism that still works over the encrypted data is needed. In this chapter an overview of several search strategies is given. Some add meta-data to the database and do the searching only in the metadata, others search in the data itself or use secret sharing to solve the problem. Each strategy has its own advantages and disadvantages. [ABSTRACT FROM AUTHOR]
Details
- Language :
- English
- ISBNs :
- 9783540698609
- Database :
- Supplemental Index
- Journal :
- Security, Privacy & Trust in Modern Data Management
- Publication Type :
- Book
- Accession number :
- 33096724
- Full Text :
- https://doi.org/10.1007/978-3-540-69861-6_13