Gupta, Brij, 1982-
Secure searchable encryption and data management / Brij B. Gupta, Mamta. - First edition. - 1 online resource (xv, 100 pages) - CRC focus .
With the advent of the IT revolution, the volume of data produced has increased exponentially and is still showing an upward trend. This data may be abundant and enormous, but it's a precious resource and should be managed properly. Cloud technology plays an important role in data management. Storing data in the cloud rather than on local storage has many benefits, but apart from these benefits, there are privacy concerns in storing sensitive data over third-party servers. These concerns can be addressed by storing data in an encrypted form; however, while encryption solves the problem of privacy, it engenders other serious issues, including the infeasibility of the fundamental search operation and a reduction in flexibility when sharing data with other users, amongst others. The concept of searchable encryption addresses these issues. This book provides every necessary detail required to develop a secure, searchable encryption scheme using both symmetric and asymmetric cryptographic primitives along with the appropriate security models to ensure the minimum security requirements for real-world applications.
9781000351125 1000351122 9781003107316 1003107311 9781000351163 1000351165 9781000351200 1000351203
10.1201/9781003107316 doi
Data encryption (Computer science)
Computer security.
COMPUTERS / Cryptography
COMPUTERS / Computer Architecture
COMPUTERS / Networking / Security
QA76.9.A25 / G87 2021
005.8/24
Secure searchable encryption and data management / Brij B. Gupta, Mamta. - First edition. - 1 online resource (xv, 100 pages) - CRC focus .
With the advent of the IT revolution, the volume of data produced has increased exponentially and is still showing an upward trend. This data may be abundant and enormous, but it's a precious resource and should be managed properly. Cloud technology plays an important role in data management. Storing data in the cloud rather than on local storage has many benefits, but apart from these benefits, there are privacy concerns in storing sensitive data over third-party servers. These concerns can be addressed by storing data in an encrypted form; however, while encryption solves the problem of privacy, it engenders other serious issues, including the infeasibility of the fundamental search operation and a reduction in flexibility when sharing data with other users, amongst others. The concept of searchable encryption addresses these issues. This book provides every necessary detail required to develop a secure, searchable encryption scheme using both symmetric and asymmetric cryptographic primitives along with the appropriate security models to ensure the minimum security requirements for real-world applications.
9781000351125 1000351122 9781003107316 1003107311 9781000351163 1000351165 9781000351200 1000351203
10.1201/9781003107316 doi
Data encryption (Computer science)
Computer security.
COMPUTERS / Cryptography
COMPUTERS / Computer Architecture
COMPUTERS / Networking / Security
QA76.9.A25 / G87 2021
005.8/24