Note on Data privacy protection.
3 years ago
Cloud Computing
Existing methods enable direct execution of encrypted queries on encrypted datasets and allow users to ask identity queries over data of different encryptions. The ultimate goal of this research direction is to make queries in encrypted databases as efficient as possible while preventing adversaries from learning any useful knowledge about the data.

Raju Singhaniya
Oct 14, 2021