Achieving Lightweight Verifiable Privacy Preserving Search Over Encrypted Data
When cloud clients outsource their database to the cloud, they entrust management operations to a cloud service provider who is expected to answer the client’s queries on the cloud where database is located. Efficient techniques can ensure critical requirements for outsourced data’s integrity and au...
Main Authors: | Selasi Kwame Ocansey, Charles Fynn Oduro |
---|---|
Format: | Article |
Language: | English |
Published: |
Politeknik Negeri Padang
2019-08-01
|
Series: | JOIV: International Journal on Informatics Visualization |
Subjects: | |
Online Access: | http://joiv.org/index.php/joiv/article/view/267 |
Similar Items
-
Privacy-preserving verifiable delegation of polynomial and matrix functions
by: Zhang Liang Feng, et al.
Published: (2020-07-01) -
Privacy preserving, verifiable and efficient outsourcing algorithm for matrix multiplication to a malicious cloud server
by: Malay Kumar, et al.
Published: (2017-01-01) -
Enabling Efficient Verifiable Fuzzy Keyword Search Over Encrypted Data in Cloud Computing
by: Xinrui Ge, et al.
Published: (2018-01-01) -
Function-specific schemes for verifiable computation
by: Papadopoulos, Dimitrios
Published: (2016) -
An Efficient Outsourced Privacy Preserving Machine Learning Scheme With Public Verifiability
by: Alzubair Hassan, et al.
Published: (2019-01-01)