Figure 3 - uploaded by Francesco Pagano
Content may be subject to copyright.
A B +-tree sample To adapt to encrypted databases, the B +-tree is built as plaintext structure, and then each node is encrypted (to protect the sensitive data) as in Figure 4: 

A B +-tree sample To adapt to encrypted databases, the B +-tree is built as plaintext structure, and then each node is encrypted (to protect the sensitive data) as in Figure 4: 

Source publication
Article
Full-text available
The increasing adoption of Cloud-based data processing and storage poses a number of privacy issues. Users wish to preserve full control over their sensitive data and cannot accept it to be fully accessible to an external storage provider. Previous research in this area was mostly addressed at techniques to protect data stored on untrusted database...

Similar publications

Article
Full-text available
In recent times, several three-party authenticated key exchange (3PAKE) and two-party authenticated key exchange (2PAKE) protocols have been proposed to establish secret session key for confidentiality of transactions among clients in mobile commerce (m-commerce) environments. However, the involvement of a trusted server (TS) in every communication...
Article
Full-text available
Objectives: Homomorphic Encryption is a way of performing computations on encrypted data. In this paper, we explore two famous Homomorphic Encryption schemes (RSA and ElGamal) with illustrations and related security issues. Methods/Analysis: Both RSA and ElGamal encryption techniques possess multiplicative homomorphic property. These algorithms sup...
Article
Full-text available
Kerberos is an authentication protocol in which client and server can mutually authenticate to each other across an insecure network connection, to ensure data integrity of the message and privacy of channel communications. In this paper, a new novel is proposed to improve Kerberos authentication protocol by using Secret Image. This proposed modifi...
Article
Full-text available
Current solutions for privacy-preserving data sharing among multiple parties either depend on a centralized authority that must be trusted and provides only weakest-link security (e.g., the entity that manages private/secret cryptographic keys), or leverage on decentralized but impractical approaches (e.g., secure multi-party computation). When the...
Article
Full-text available
The Purpose of homomorphic encryption is to ensure privacy of data in communication, storage or in use by processes with mechanisms similar to conventional cryptography, but with added capabilities of computing over encrypted data, searching an encrypted data, etc. Homomorphism is a property by which a problem in one algebraic system can be convert...

Citations

... Previous research [7] in this area was mostly addressed at techniques to protect data stored on untrusted database servers, however we argue that the Cloud architecture presents a number of specific problems and issues. The following research papers claim that there are a large number of researches [8, 9, 10, 11, and 12], however the indication is that there is lack of reliability in cloud computing by users. ...
Conference Paper
Full-text available
In spite of the fact that there is an increase in the usage of cloud storage services, there is still a significant number of client organizations that lack sufficient trust in third party cloud providers. To improve the privacy of users and to ensure more secured data we have proposed a model for security in cloud computing, in the previous work [1]. Part of our proposed model is IT Security Specialist (ITSS) of the company i.e. that will control security in cloud computing. This solution is based on some ways of file encryption, partitioning, and distribution among multiple storage providers, resulting in increased confidentiality since a supposed attacker will need to first obtain parts of a file from different storage providers, know how to combine them, before any decryption attempt. In this paper we propose two new methods as part of our proposed model [1,2]. Based on the results of this work, we provide the comments in relations to the methods as a part of the proposed model of security in the cloud computing.