000 03259cam a2200601Ii 4500
001 9781003107316
003 FlBoTFG
005 20220711212452.0
006 m o d
007 cr cnu---unuuu
008 210121t20212021flua ob 001 0 eng d
040 _aOCoLC-P
_beng
_erda
_cOCoLC-P
020 _a9781000351125
_qelectronic book
020 _a1000351122
_qelectronic book
020 _a9781003107316
_qelectronic book
020 _a1003107311
_qelectronic book
020 _a9781000351163
_q(electronic bk. : Mobipocket)
020 _a1000351165
_q(electronic bk. : Mobipocket)
020 _a9781000351200
_q(electronic bk. : EPUB)
020 _a1000351203
_q(electronic bk. : EPUB)
020 _z0367619679
020 _z9780367619671
024 8 _a10.1201/9781003107316
_2doi
035 _a(OCoLC)1232206275
035 _a(OCoLC-P)1232206275
050 4 _aQA76.9.A25
_bG87 2021
072 7 _aCOM
_x083000
_2bisacsh
072 7 _aCOM
_x011000
_2bisacsh
072 7 _aCOM
_x043050
_2bisacsh
072 7 _aUN
_2bicssc
082 0 4 _a005.8/24
_223
100 1 _aGupta, Brij,
_d1982-
_eauthor.
_916808
245 1 0 _aSecure searchable encryption and data management /
_cBrij B. Gupta, Mamta.
250 _aFirst edition.
264 1 _aBoca Raton, FL :
_bCRC Press,
_c2021.
264 4 _c©2021
300 _a1 online resource (xv, 100 pages)
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
490 1 _aCRC focus
520 _aWith the advent of the IT revolution, the volume of data produced has increased exponentially and is still showing an upward trend. This data may be abundant and enormous, but it's a precious resource and should be managed properly. Cloud technology plays an important role in data management. Storing data in the cloud rather than on local storage has many benefits, but apart from these benefits, there are privacy concerns in storing sensitive data over third-party servers. These concerns can be addressed by storing data in an encrypted form; however, while encryption solves the problem of privacy, it engenders other serious issues, including the infeasibility of the fundamental search operation and a reduction in flexibility when sharing data with other users, amongst others. The concept of searchable encryption addresses these issues. This book provides every necessary detail required to develop a secure, searchable encryption scheme using both symmetric and asymmetric cryptographic primitives along with the appropriate security models to ensure the minimum security requirements for real-world applications.
588 _aOCLC-licensed vendor bibliographic record.
650 0 _aData encryption (Computer science)
_99168
650 0 _aComputer security.
_93970
650 7 _aCOMPUTERS / Cryptography
_2bisacsh
_910825
650 7 _aCOMPUTERS / Computer Architecture
_2bisacsh
_912494
650 7 _aCOMPUTERS / Networking / Security
_2bisacsh
_916809
700 1 _aMamta,
_eauthor.
_916810
856 4 0 _3Taylor & Francis
_uhttps://www.taylorfrancis.com/books/9781003107316
856 4 2 _3OCLC metadata license agreement
_uhttp://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf
942 _cEBK
999 _c71347
_d71347