刊名:International Journal of Information Management
出版年:2017
出版时间:April 2017
年:2017
卷:37
期:2
页码:63-74
全文大小:3028 K
卷排序:37
文摘
Proposing a descriptive language for security parameters and configuration of crypto-modules. Secure query processing over encrypted NoSQL databases hosted in the public cloud. Data integrity should be considered in the case of cloud malicious insider. The overhead of processing encrypted data set should be proportional to desired the security level.