× Current Issue Archive Submit Article
Conflicts of Interest Copyright and Access Open access policy Editorial Policies Peer Review Policy Privacy Statement Publishing Ethics
Editor in chief Associate Editors Advisory Board International Editors
Contact Us About Us Aim & Scope Abstracting And Indexing Author Guidelines Join As Editor

Researchable encryption in cloud databases: a survey


Alireza Froozani Fard, Mohammadreza Mollahoseini Ardakani

Abstract

Cloud computing is among the most critical technologies supporting the reliability, scalability, ease of establishment, and cost-effectiveness features for business development. Although the cloud offers a diversity of services, despite its advantages, cloud computing still faces open and enduring challenges in ensuring the confidentiality, integrity, and availability of its sensitive data. Data stored in the cloud is readily prone to disclosure to hackers. The data is encrypted before outsourcing to avoid this. Encrypted data becomes hard to search in this event. This article aims to gather and analyze most of the encryption methods in the cloud database and finally summarize them in a table to utilize their high-level techniques, methods, benefits, and drawbacks‎.




Contact Meral


Meral Publications
www.meralpublisher.com

Davutpasa / Zeytinburnu 34087
Istanbul
Turkey

Email: [email protected]
Tell: +905344998991