Practical techniques building on encryption for protecting and managing data in the cloud
From MaRDI portal
Publication:2803632
DOI10.1007/978-3-662-49301-4_15zbMATH Open1405.94058OpenAlexW2467340036WikidataQ60487179 ScholiaQ60487179MaRDI QIDQ2803632FDOQ2803632
Authors: S. De Capitani di Vimercati, Sara Foresti, Giovanni Livraga, P. Samarati
Publication date: 2 May 2016
Published in: The New Codebreakers (Search for Journal in Brave)
Full work available at URL: http://hdl.handle.net/2434/393557
Recommendations
- Encryption and Fragmentation for Data Confidentiality in the Cloud
- A hybrid cryptography technique for data storage on cloud computing
- A survey on design and implementation of protected searchable data in the cloud
- Intelligent cryptography approach for secure distributed big data storage in cloud computing
- A survey of searchable encryption based on cloud computing
Cites Work
- Fully homomorphic encryption using ideal lattices
- Fully Homomorphic Encryption over the Integers with Shorter Public Keys
- Ciphertext-policy attribute-based encryption: an expressive, efficient, and provably secure realization
- Public Key Compression and Modulus Switching for Fully Homomorphic Encryption over the Integers
- Title not available (Why is that?)
- Title not available (Why is that?)
- Compact Proofs of Retrievability
- Software protection and simulation on oblivious RAMs
- Authentic third-party data publication
- Efficient Fully Homomorphic Encryption from (Standard) $\mathsf{LWE}$
- A Survey of Single-Database Private Information Retrieval: Techniques and Applications
- Title not available (Why is that?)
- Privacy-Preserving Public Auditing for Secure Cloud Storage
- Trapdoor Privacy in Asymmetric Searchable Encryption Schemes
- Preserving privacy in data outsourcing. Foreword by Pierangela Samarati
- Encryption and Fragmentation for Data Confidentiality in the Cloud
- Practical Techniques Building on Encryption for Protecting and Managing Data in the Cloud
- Realizing fine-grained and flexible access control to outsourced data with attribute-based cryptosystems
Cited In (5)
- Financial Cryptography and Data Security
- A novel vertical fragmentation method for privacy protection based on entropy minimization in a relational database
- Encryption and Fragmentation for Data Confidentiality in the Cloud
- Editorial: Cryptography and data security in cloud computing
- Practical Techniques Building on Encryption for Protecting and Managing Data in the Cloud
Uses Software
This page was built for publication: Practical techniques building on encryption for protecting and managing data in the cloud
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2803632)