[Home ] [Archive]   [ فارسی ]  
:: Main :: About :: Current Issue :: Archive :: Search :: Submit :: Contact ::
Main Menu
Home::
Journal Information::
Articles archive::
For Authors::
For Reviewers::
Registration::
Site Facilities::
Indexing::
Contact us::
::
Search in website

Advanced Search
..
Receive site information
Enter your Email in the following box to receive the site news and information.
..
Print ISSN
Print ISSN: 2476-3047
..
:: Volume 7, Issue 1 (9-2018) ::
منادی 2018, 7(1): 21-44 Back to browse issues page
Search over Encrypted Data: Functionalities and Challenges
Aniseh Najafi * , Majid Bayat , Hamid Haj Seyyed Javadi
Shahed university
Abstract:   (2989 Views)
The growth of data production in the world brings with it capacities and requirements. On the one hand, the storage of generated data provides the possibility of reuse and analysis on the data that leads to the production of data science. On the other hand, large amounts of data require storage space and the ability to search over them. Cloud computing is a technological and operational model that addresses the storage and computing limitations of data storage and utilization. As well as searchable encryption as a cloud-based, highly used, technique, in addition to maintaining data security, it can search over them. In this paper, the searchable encryption methods and the limitations and capabilities of each one are examined. At the end, there are some explanations on how to use searchable encryption in medical data.
Keywords: Symetric searchable encryption, Public key encryption with keyword searsh, Cloud computing, Cloud storage, Electronic Health Records
Full-Text [PDF 8870 kb]   (655 Downloads)    
Type of Study: Review Article | Subject: Special
Received: 2018/10/20 | Accepted: 2019/01/27 | Published: 2019/03/6
Send email to the article author

Add your comments about this article
Your username or Email:

CAPTCHA


XML   Persian Abstract   Print


Download citation:
BibTeX | RIS | EndNote | Medlars | ProCite | Reference Manager | RefWorks
Send citation to:

Najafi A, Bayat M, Haj Seyyed Javadi H. Search over Encrypted Data: Functionalities and Challenges. منادی 2018; 7 (1) :21-44
URL: http://monadi.isc.org.ir/article-1-127-en.html


Rights and permissions
Creative Commons License This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.
Volume 7, Issue 1 (9-2018) Back to browse issues page
دوفصل نامه علمی  منادی امنیت فضای تولید و تبادل اطلاعات( افتا) Biannual Journal Monadi for Cyberspace Security (AFTA)
Persian site map - English site map - Created in 0.08 seconds with 38 queries by YEKTAWEB 4645