000 | 03259cam a2200601Ii 4500 | ||
---|---|---|---|
001 | 9781003107316 | ||
003 | FlBoTFG | ||
005 | 20220711212452.0 | ||
006 | m o d | ||
007 | cr cnu---unuuu | ||
008 | 210121t20212021flua ob 001 0 eng d | ||
040 |
_aOCoLC-P _beng _erda _cOCoLC-P |
||
020 |
_a9781000351125 _qelectronic book |
||
020 |
_a1000351122 _qelectronic book |
||
020 |
_a9781003107316 _qelectronic book |
||
020 |
_a1003107311 _qelectronic book |
||
020 |
_a9781000351163 _q(electronic bk. : Mobipocket) |
||
020 |
_a1000351165 _q(electronic bk. : Mobipocket) |
||
020 |
_a9781000351200 _q(electronic bk. : EPUB) |
||
020 |
_a1000351203 _q(electronic bk. : EPUB) |
||
020 | _z0367619679 | ||
020 | _z9780367619671 | ||
024 | 8 |
_a10.1201/9781003107316 _2doi |
|
035 | _a(OCoLC)1232206275 | ||
035 | _a(OCoLC-P)1232206275 | ||
050 | 4 |
_aQA76.9.A25 _bG87 2021 |
|
072 | 7 |
_aCOM _x083000 _2bisacsh |
|
072 | 7 |
_aCOM _x011000 _2bisacsh |
|
072 | 7 |
_aCOM _x043050 _2bisacsh |
|
072 | 7 |
_aUN _2bicssc |
|
082 | 0 | 4 |
_a005.8/24 _223 |
100 | 1 |
_aGupta, Brij, _d1982- _eauthor. _916808 |
|
245 | 1 | 0 |
_aSecure searchable encryption and data management / _cBrij B. Gupta, Mamta. |
250 | _aFirst edition. | ||
264 | 1 |
_aBoca Raton, FL : _bCRC Press, _c2021. |
|
264 | 4 | _c©2021 | |
300 | _a1 online resource (xv, 100 pages) | ||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
490 | 1 | _aCRC focus | |
520 | _aWith the advent of the IT revolution, the volume of data produced has increased exponentially and is still showing an upward trend. This data may be abundant and enormous, but it's a precious resource and should be managed properly. Cloud technology plays an important role in data management. Storing data in the cloud rather than on local storage has many benefits, but apart from these benefits, there are privacy concerns in storing sensitive data over third-party servers. These concerns can be addressed by storing data in an encrypted form; however, while encryption solves the problem of privacy, it engenders other serious issues, including the infeasibility of the fundamental search operation and a reduction in flexibility when sharing data with other users, amongst others. The concept of searchable encryption addresses these issues. This book provides every necessary detail required to develop a secure, searchable encryption scheme using both symmetric and asymmetric cryptographic primitives along with the appropriate security models to ensure the minimum security requirements for real-world applications. | ||
588 | _aOCLC-licensed vendor bibliographic record. | ||
650 | 0 |
_aData encryption (Computer science) _99168 |
|
650 | 0 |
_aComputer security. _93970 |
|
650 | 7 |
_aCOMPUTERS / Cryptography _2bisacsh _910825 |
|
650 | 7 |
_aCOMPUTERS / Computer Architecture _2bisacsh _912494 |
|
650 | 7 |
_aCOMPUTERS / Networking / Security _2bisacsh _916809 |
|
700 | 1 |
_aMamta, _eauthor. _916810 |
|
856 | 4 | 0 |
_3Taylor & Francis _uhttps://www.taylorfrancis.com/books/9781003107316 |
856 | 4 | 2 |
_3OCLC metadata license agreement _uhttp://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf |
942 | _cEBK | ||
999 |
_c71347 _d71347 |