Buch, Englisch, 116 Seiten, Format (B × H): 156 mm x 234 mm, Gewicht: 345 g
Buch, Englisch, 116 Seiten, Format (B × H): 156 mm x 234 mm, Gewicht: 345 g
ISBN: 978-0-367-61967-1
Verlag: Taylor & Francis Ltd (Sales)
Storing data in the cloud rather than on local storage has many benefits, but apart from these benefits, there are privacy concerns in storing sensitive data over third-party servers. These concerns can be addressed by storing data in an encrypted form; however, while encryption solves the problem of privacy, it engenders other serious issues, including the infeasibility of the fundamental search operation and a reduction in flexibility when sharing data with other users, amongst others.
The concept of searchable encryption addresses these issues. This book provides every necessary detail required to develop a secure, searchable encryption scheme using both symmetric and asymmetric cryptographic primitives along with the appropriate security models to ensure the minimum security requirements for real-world applications.
Autoren/Hrsg.
Fachgebiete
- Mathematik | Informatik EDV | Informatik Informatik Rechnerarchitektur
- Mathematik | Informatik EDV | Informatik Technische Informatik Computersicherheit Schadprogramme (Viren, Trojaner etc.)
- Mathematik | Informatik EDV | Informatik EDV & Informatik Allgemein
- Mathematik | Informatik EDV | Informatik Technische Informatik Computersicherheit Kryptographie, Datenverschlüsselung
- Mathematik | Informatik EDV | Informatik Daten / Datenbanken
- Mathematik | Informatik EDV | Informatik Computerkommunikation & -vernetzung Cloud-Computing, Grid-Computing
- Mathematik | Informatik EDV | Informatik Technische Informatik Computersicherheit Datensicherheit, Datenschutz
- Mathematik | Informatik EDV | Informatik Digital Lifestyle Internet, E-Mail, Social Media
- Mathematik | Informatik EDV | Informatik Computerkommunikation & -vernetzung Netzwerksicherheit
Weitere Infos & Material
Preface. Acknowledgements. Author bio. 1 Introduction to number theory and abstract algebra. 2 Introduction to cryptography. 3 Searchable encryption and data management. 4 Introduction to provable security and its application in searchable encryption. 5 Searchable encryption in a public-key setting. 6 Design and development tools and inter-domain application. 7 Searchable encryption applications, challenges and future research directions. Index.