A Comparative Study of Homomorphic and Searchable Encryption Schemes for Cloud Computing.
B. T. PrasannaC. B. AkkiPublished in: CoRR (2015)
Keyphrases
- encryption scheme
- cloud computing
- standard model
- security analysis
- data center
- computing resources
- secret key
- service providers
- cloud computing environment
- public key
- data management
- data sharing
- digital libraries
- hash functions
- ciphertext
- lossless compression
- data privacy
- cloud computing platform
- security issues
- data sets
- query processing