Secure searchable encryption and data management / (Record no. 71347)

000 -LEADER
fixed length control field 03259cam a2200601Ii 4500
001 - CONTROL NUMBER
control field 9781003107316
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20220711212452.0
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 210121t20212021flua ob 001 0 eng d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
ISBN 9781000351125
-- electronic book
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
ISBN 1000351122
-- electronic book
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
ISBN 9781003107316
-- electronic book
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
ISBN 1003107311
-- electronic book
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
ISBN 9781000351163
-- (electronic bk. : Mobipocket)
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
ISBN 1000351165
-- (electronic bk. : Mobipocket)
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
ISBN 9781000351200
-- (electronic bk. : EPUB)
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
ISBN 1000351203
-- (electronic bk. : EPUB)
082 04 - CLASSIFICATION NUMBER
Call Number 005.8/24
100 1# - AUTHOR NAME
Author Gupta, Brij,
245 10 - TITLE STATEMENT
Title Secure searchable encryption and data management /
250 ## - EDITION STATEMENT
Edition statement First edition.
300 ## - PHYSICAL DESCRIPTION
Number of Pages 1 online resource (xv, 100 pages)
490 1# - SERIES STATEMENT
Series statement CRC focus
520 ## - SUMMARY, ETC.
Summary, etc With the advent of the IT revolution, the volume of data produced has increased exponentially and is still showing an upward trend. This data may be abundant and enormous, but it's a precious resource and should be managed properly. Cloud technology plays an important role in data management. Storing data in the cloud rather than on local storage has many benefits, but apart from these benefits, there are privacy concerns in storing sensitive data over third-party servers. These concerns can be addressed by storing data in an encrypted form; however, while encryption solves the problem of privacy, it engenders other serious issues, including the infeasibility of the fundamental search operation and a reduction in flexibility when sharing data with other users, amongst others. The concept of searchable encryption addresses these issues. This book provides every necessary detail required to develop a secure, searchable encryption scheme using both symmetric and asymmetric cryptographic primitives along with the appropriate security models to ensure the minimum security requirements for real-world applications.
700 1# - AUTHOR 2
Author 2 Mamta,
856 40 - ELECTRONIC LOCATION AND ACCESS
Uniform Resource Identifier https://www.taylorfrancis.com/books/9781003107316
856 42 - ELECTRONIC LOCATION AND ACCESS
Uniform Resource Identifier http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Koha item type eBooks
264 #1 -
-- Boca Raton, FL :
-- CRC Press,
-- 2021.
264 #4 -
-- ©2021
336 ## -
-- text
-- txt
-- rdacontent
337 ## -
-- computer
-- c
-- rdamedia
338 ## -
-- online resource
-- cr
-- rdacarrier
588 ## -
-- OCLC-licensed vendor bibliographic record.
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Data encryption (Computer science)
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Computer security.
650 #7 - SUBJECT ADDED ENTRY--SUBJECT 1
-- COMPUTERS / Cryptography
650 #7 - SUBJECT ADDED ENTRY--SUBJECT 1
-- COMPUTERS / Computer Architecture
650 #7 - SUBJECT ADDED ENTRY--SUBJECT 1
-- COMPUTERS / Networking / Security

No items available.