Different search strategies on encrypted data compared


Brinkman, R. (2007) Different search strategies on encrypted data compared. In: M. Petkovic & W. Jonker (Eds.), Security, Privacy and Trust in Modern Data Management. Data-Centric Systems and Applications, XVIII . Springer Verlag, Berlin, pp. 183-196. ISBN 9783540698609

[img] PDF
Restricted to UT campus only

Abstract:When private information is stored in databases that are under the control of others, the only possible way to protect it, is to encrypt it before storing it. In order to efficiently retrieve the data, a search mechanism is needed that still works over the encrypted data. In this chapter an overview of several search strategies is given. Some add meta-data to the database and do the searching only in the meta-data, others search in the data itself or use secret sharing to solve the problem. Each strategy has its own advantages and disadvantages.
Item Type:Book Section
Electrical Engineering, Mathematics and Computer Science (EEMCS)
Research Group:
Link to this item:http://purl.utwente.nl/publications/64048
Official URL:https://doi.org/10.1007/978-3-540-69861-6_13
Export this item as:BibTeX
HTML Citation
Reference Manager


Repository Staff Only: item control page

Metis ID: 241643