Academic literature on the topic 'Data security keyword'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Data security keyword.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Data security keyword"

1

Babu, K. Ramesh, D. Ram Mohan Reddy, K. Srinivasa Rao, and Mamatha N. "Advanced Model for Keyword Search of Cloud Computing with Data Security." International Journal of Research Publication and Reviews 4, no. 12 (2023): 4985–89. http://dx.doi.org/10.55248/gengpi.4.1223.0134.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Zhu, Binrui, Jiameng Sun, Jing Qin, and Jixin Ma. "A Secure Data Sharing Scheme with Designated Server." Security and Communication Networks 2019 (June 27, 2019): 1–16. http://dx.doi.org/10.1155/2019/4268731.

Full text
Abstract:
The cloud-assisted Internet of Things (CIoT) is booming, which utilizes powerful data processing capabilities of the cloud platform to solve massive Internet of Things (IoT) data. However, the CIoT faces new security challenges, such as the confidentiality of the outsourced data. Data encryption is a fundamental technique that can guarantee the confidentiality of outsourced data, but it limits target encrypted data retrieval from cloud platform. Public key encryption with keyword search (PEKS) provides a promising solution to address this problem. In PEKS, a cloud server can be authorized to s
APA, Harvard, Vancouver, ISO, and other styles
3

Anupama, T. A., and M. A. Megha. "Keyword Search mechanism Using Multiple Authorities on Encrypted Cloud Data." Journal of Network Security and Data Mining 6, no. 3 (2023): 17–23. https://doi.org/10.5281/zenodo.8195033.

Full text
Abstract:
<em>Storage pools, which are hosted by third parties, can be used to store data on the cloud. Cloud data needs an internet connection. But everybody in the globe has access to the cloud data. Security is therefore a major problem for cloud data. Usually, cloud data is encrypted using asymmetric encryption. However, this is insufficient. Because it&#39;s possible to steal the private key. It calls for improved security measures. So, for access control, we choose for two-factor data security. IBE (Identity Based Encryption) is how we operate. To encrypt the data in this case, the sender just nee
APA, Harvard, Vancouver, ISO, and other styles
4

E., Anitha, V. Jothikantham P., and T. Senthilprakash Dr. "AN EFFICIENT SECURE DIFFERENT KEYWORD SEARCH IN ENCRYPTED CLOUD DATA." International Journal of Advanced Trends in Engineering and Technology 1, no. 2 (2017): 42–44. https://doi.org/10.5281/zenodo.345729.

Full text
Abstract:
The Sensitive privacy information, they are typically encrypted before uploaded to the cloud developing the FSM schemes over encrypted cloud data. First, we introduce the relevance scores upon keywords Second, support complicated logic search the mixed “AND”, “OR” and “NOT” operations of keywords. Third, the classified sub-dictionaries technique to achieve better efficiency. Analyze the security of the proposed schemes in terms of confidentiality of documents, privacy protection of index and trapdoor, and un-link ability of trapdoor. Both the security analysis and experimental results demonstr
APA, Harvard, Vancouver, ISO, and other styles
5

Thigale, Satyam R. "Multiple Keyword Search in Cloud Data." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, no. 04 (2024): 1–5. http://dx.doi.org/10.55041/ijsrem30422.

Full text
Abstract:
Cloud computing is often regarded as a great innovation due to the increasing demand for endless storage space and reliable retrieval services. Several works have been developed on ranked multi-keyword search over cloud data with numerous data owners concerned about privacy. However, most of these methods can be broken by a clever attacker using a combination of a keyword guess and an equivalency test. Also, when searching across data from many data owners, they can't reliably return the top k results to the users. The unreliability of search results and the potential for the exposure of criti
APA, Harvard, Vancouver, ISO, and other styles
6

Mohammed, Hussein, and Ayad Abdulsada. "Secure Multi-keyword Similarity Search Over Encrypted Data With Security Improvement." Iraqi Journal for Electrical and Electronic Engineering 17, no. 2 (2021): 1–10. http://dx.doi.org/10.37917/ijeee.17.2.1.

Full text
Abstract:
Searchable encryption (SE) is an interesting tool that enables clients to outsource their encrypted data into external cloud servers with unlimited storage and computing power and gives them the ability to search their data without decryption. The current solutions of SE support single-keyword search making them impractical in real-world scenarios. In this paper, we design and implement a multi-keyword similarity search scheme over encrypted data by using locality-sensitive hashing functions and Bloom filter. The proposed scheme can recover common spelling mistakes and enjoys enhanced security
APA, Harvard, Vancouver, ISO, and other styles
7

Verma, Priyanka. "A STUDY OF SECURITY AND STORAGE OF DATA IN CLOUD COMPUTING ENVIRONMENT." international journal of advanced research in computer science 15, no. 6 (2024): 41–43. https://doi.org/10.26483/ijarcs.v15i6.7162.

Full text
Abstract:
: In cloud environment, the cloud data security plays an essential role in order to properly handle and access the data on cloud storage server. The protection of cloud data from the unauthorized user is a challenging task due to the lack of user authentication and authorization in cloud. The keyword extraction is the easiest way to extract the required documents/files relevant to the searched keywords. Many researchers have been focused on the providing secured keyword search to access data stored on cloud storage by introducing security protocol, cryptography techniques include encryption an
APA, Harvard, Vancouver, ISO, and other styles
8

Gupta, Teena, and Rohit K.V.S.S. "Fuzzy Keyword Search Over Encrypted Data using Cloud Computing." International Journal of Engineering and Advanced Technology 12, no. 1 (2022): 63–67. http://dx.doi.org/10.35940/ijeat.a3842.1012122.

Full text
Abstract:
“Cloud” is a collective term for a large number of developments and possibilities. It is not an invention, but more of a “practical innovation”, combining several earlier inventions into something new and compelling. A cloud computing platform dynamically provisions, configures, reconfigures, and de provisions servers as needed [8]. Servers in the cloud can be physical machines or virtual machines. Security is a critical issue in cloud computing due to the variety of IT services that can be provided through a cloud environment. This paper focuses on the aspect of searching keywords over encryp
APA, Harvard, Vancouver, ISO, and other styles
9

Teena, Gupta, and K.V.S.S Rohit. "Fuzzy Keyword Search Over Encrypted Data using Cloud Computing." International Journal of Engineering and Advanced Technology (IJEAT) 12, no. 1 (2022): 63–67. https://doi.org/10.35940/ijeat.A3842.1012122.

Full text
Abstract:
<strong>Abstract: </strong>&ldquo;Cloud&rdquo; is a collective term for a large number of developments and possibilities. It is not an invention, but more of a &ldquo;practical innovation&rdquo;, combining several earlier inventions into something new and compelling. A cloud computing platform dynamically provisions, configures, reconfigures, and de provisions servers as needed [8]. Servers in the cloud can be physical machines or virtual machines. Security is a critical issue in cloud computing due to the variety of IT services that can be provided through a cloud environment. This paper focu
APA, Harvard, Vancouver, ISO, and other styles
10

Kim, Kun Hee, and Seong Yong Hwang. "Analysis of social perception of security-related departments after COVID-19 using big data analysis." Korean Association For Learner-Centered Curriculum And Instruction 23, no. 16 (2023): 211–23. http://dx.doi.org/10.22251/jlcci.2023.23.16.211.

Full text
Abstract:
Objectives The purpose of this study is to analyze society's overall perception of universities' security-related departments through big data, provide basic data for the development of security-related departme.&#x0D; Methods Under the keyword “University + Security,” data from major domestic portal sites were collected and refined from January 20, 2020 to March 31, 2023, when the first COVID-19 confirmed case in Korea was found, and word cloud analysis, network analysis and centrality analysis, and CONCOR analysis were conducted.&#x0D; Results First, through word cloud analysis of the top 30
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Data security keyword"

1

Cao, Ning. "Secure and Reliable Data Outsourcing in Cloud Computing." Digital WPI, 2012. https://digitalcommons.wpi.edu/etd-dissertations/333.

Full text
Abstract:
"The many advantages of cloud computing are increasingly attracting individuals and organizations to outsource their data from local to remote cloud servers. In addition to cloud infrastructure and platform providers, such as Amazon, Google, and Microsoft, more and more cloud application providers are emerging which are dedicated to offering more accessible and user friendly data storage services to cloud customers. It is a clear trend that cloud data outsourcing is becoming a pervasive service. Along with the widespread enthusiasm on cloud computing, however, concerns on data security with cl
APA, Harvard, Vancouver, ISO, and other styles
2

Arapantonis, Elpidoforos. "Data tampering in Vehicle CAN Bus networks." Thesis, Luleå tekniska universitet, Institutionen för system- och rymdteknik, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:ltu:diva-76776.

Full text
Abstract:
The paradigm of the automotive industry has changed, over the course of the last10-15 years. Electronics and software, have introduced in many dierents parts ofa vehicle and the drive-by-wire it is taking over the vehicle functions. Connectivityfunctionalities are increasing in the context of the automotive industry as well. Allthe aforementioned parts have more than one common link. This thesis project willfocus on one of these links, which is the security. The focus will be the CAN busprotocol and specically, on investigating the implications of an adversary havingphysical access in a vehicl
APA, Harvard, Vancouver, ISO, and other styles

Books on the topic "Data security keyword"

1

Hilgurt, S. Ya, and O. A. Chemerys. Reconfigurable signature-based information security tools of computer systems. PH “Akademperiodyka”, 2022. http://dx.doi.org/10.15407/akademperiodyka.458.297.

Full text
Abstract:
The book is devoted to the research and development of methods for combining computational structures for reconfigurable signature-based information protection tools for computer systems and networks in order to increase their efficiency. Network security tools based, among others, on such AI-based approaches as deep neural networking, despite the great progress shown in recent years, still suffer from nonzero recognition error probability. Even a low probability of such an error in a critical infrastructure can be disastrous. Therefore, signature-based recognition methods with their theoretic
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "Data security keyword"

1

Zhang, Yuan, Chunxiang Xu, and Xuemin Sherman Shen. "Secure Keyword Search." In Data Security in Cloud Storage. Springer Singapore, 2020. http://dx.doi.org/10.1007/978-981-15-4374-6_5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Shi, Jie, Junzuo Lai, Yingjiu Li, Robert H. Deng, and Jian Weng. "Authorized Keyword Search on Encrypted Data." In Computer Security - ESORICS 2014. Springer International Publishing, 2014. http://dx.doi.org/10.1007/978-3-319-11203-9_24.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Zheng, Qingji, Xiangxue Li, and Aytac Azgin. "CLKS: Certificateless Keyword Search on Encrypted Data." In Network and System Security. Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-25645-0_16.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Golle, Philippe, Jessica Staddon, and Brent Waters. "Secure Conjunctive Keyword Search over Encrypted Data." In Applied Cryptography and Network Security. Springer Berlin Heidelberg, 2004. http://dx.doi.org/10.1007/978-3-540-24852-1_3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Chung-Nguyen, Huy-Hoang, Viet-An Pham, Dinh-Hieu Hoang, and Minh-Triet Tran. "Keyword-Search Interval-Query Dynamic Symmetric Searchable Encryption." In Future Data and Security Engineering. Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-35653-8_46.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Wang, Peishun, Huaxiong Wang, and Josef Pieprzyk. "Keyword Field-Free Conjunctive Keyword Searches on Encrypted Data and Extension for Dynamic Groups." In Cryptology and Network Security. Springer Berlin Heidelberg, 2008. http://dx.doi.org/10.1007/978-3-540-89641-8_13.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Kawai, Yutaka, Takato Hirano, Yoshihiro Koseki, and Tatsuji Munaka. "SEPM: Efficient Partial Keyword Search on Encrypted Data." In Cryptology and Network Security. Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-26823-1_6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Ballard, Lucas, Seny Kamara, and Fabian Monrose. "Achieving Efficient Conjunctive Keyword Searches over Encrypted Data." In Information and Communications Security. Springer Berlin Heidelberg, 2005. http://dx.doi.org/10.1007/11602897_35.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Chang, Yan-Cheng, and Michael Mitzenmacher. "Privacy Preserving Keyword Searches on Remote Encrypted Data." In Applied Cryptography and Network Security. Springer Berlin Heidelberg, 2005. http://dx.doi.org/10.1007/11496137_30.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Di Crescenzo, Giovanni, and Abhrajit Ghosh. "Privacy-Preserving Range Queries from Keyword Queries." In Data and Applications Security and Privacy XXIX. Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-20810-7_3.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Data security keyword"

1

Ramachandran, T. P., K. Shalini, S. Ranjith, L. Lakshmi Tejaswi, Ajay Bonde, and Nidal Abbas. "A Robust Fuzzy Based Multi-Keyword Similarity Search Model on Cloud Computing Platform Using Cipher Data Security Principles." In 2024 International Conference on Innovative Computing, Intelligent Communication and Smart Electrical Systems (ICSES). IEEE, 2024. https://doi.org/10.1109/icses63760.2024.10910578.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Sukeerthi, Kooragayala, R. Kesavan, and S. A. Kalaiselvan. "Multi-Keywords Based Fully Homomorphic Encryption and Data Classification for Cloud Security and Privacy." In 2024 2nd International Conference on Emerging Trends in Engineering and Medical Sciences (ICETEMS). IEEE, 2024. https://doi.org/10.1109/icetems64039.2024.10965006.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Qiu, Chunjing, Jiqiang Liu, Yingxiao Xiang, Wenjia Niu, and Tong Chen. "Intention-Aware Multi-channel Keyword Extension for Content Security." In 2018 IEEE Third International Conference on Data Science in Cyberspace (DSC). IEEE, 2018. http://dx.doi.org/10.1109/dsc.2018.00127.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Bhuvaneswari, E., V. Anjana Devi, and R. Gowri. "Fuzzy Search with Multi-Keyword Security and Improved Service Quality." In 2023 International Conference on Data Science, Agents & Artificial Intelligence (ICDSAAI). IEEE, 2023. http://dx.doi.org/10.1109/icdsaai59313.2023.10452573.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Li, Yunfa, MingYi Li, and Nannan Xu. "Multi-attribute Fuzzy Keyword Retrieval Method for Secure Data Service in Cloud Computing." In Security Technology 2016. Science & Engineering Research Support soCiety, 2016. http://dx.doi.org/10.14257/astl.2016.139.65.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Cui, Ningning, Jianxin Li, Xiaochun Yang, Bin Wang, Mark Reynolds, and Yong Xiang. "When Geo-Text Meets Security: Privacy-Preserving Boolean Spatial Keyword Queries." In 2019 IEEE 35th International Conference on Data Engineering (ICDE). IEEE, 2019. http://dx.doi.org/10.1109/icde.2019.00097.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Jabeen, Afsha, and C. V. P. R. Prasad. "An Advanced Keyword Searching Model with Data Security in Cloud Computing." In 2023 4th International Conference on Electronics and Sustainable Communication Systems (ICESC). IEEE, 2023. http://dx.doi.org/10.1109/icesc57686.2023.10193266.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Zhi-Peng, Jia, Zhang Ya-Ling, Wang Shang-Ping, and Sun Qin-Dong. "Evaluable Secure Ranked Keyword Search Scheme over Encrypted Cloud Data." In 2013 Ninth International Conference on Computational Intelligence and Security (CIS). IEEE, 2013. http://dx.doi.org/10.1109/cis.2013.152.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Li, Jiazhi, and Lei Zhang. "Attribute-Based Keyword Search and Data Access Control in Cloud." In 2014 Tenth International Conference on Computational Intelligence and Security (CIS). IEEE, 2014. http://dx.doi.org/10.1109/cis.2014.113.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Kumar, V. Naresh, and Kranthi Kiran G. "Confidentiality Preserving Multi-Keyword Ranked Search over Encrypted Cloud Data." In National Conference on Computer Security, Image Processing, Graphics, Mobility and Analytics. AI Publications, 2016. http://dx.doi.org/10.22161/ijaers/si.12.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Data security keyword"

1

Pasupuleti, Murali Krishna. Securing AI-driven Infrastructure: Advanced Cybersecurity Frameworks for Cloud and Edge Computing Environments. National Education Services, 2025. https://doi.org/10.62311/nesx/rrv225.

Full text
Abstract:
Abstract: The rapid adoption of artificial intelligence (AI) in cloud and edge computing environments has transformed industries by enabling large-scale automation, real-time analytics, and intelligent decision-making. However, the increasing reliance on AI-powered infrastructures introduces significant cybersecurity challenges, including adversarial attacks, data privacy risks, and vulnerabilities in AI model supply chains. This research explores advanced cybersecurity frameworks tailored to protect AI-driven cloud and edge computing environments. It investigates AI-specific security threats,
APA, Harvard, Vancouver, ISO, and other styles
2

Shekeriak-Kushka, Yana. ETHICAL AND SECURITY ASPECTS OF DATA ANALYTICS IN JOURNALISM: THE CONTEXT OF THE RUSSIAN-UKRAINIAN WAR. Ivan Franko National University of Lviv, 2025. https://doi.org/10.30970/vjo.2025.56.13279.

Full text
Abstract:
The purpose of this article is to examine the ethical and security aspects of data usage in data journalism, particularly in the context of wartime. It explores key risks associated with working with data, such as privacy violations, manipulation, and the reinforcement of stereotypes. The article analyzes the legislative framework for personal data protection in Ukraine and the EU, as well as specific challenges faced by journalists during the war, including the protection of information sources, anonymization of sensitive data, and ensuring civilian safety. Recommendations are proposed for et
APA, Harvard, Vancouver, ISO, and other styles
3

Ulinskaitė, Jogilė. Lithuanian Populist Far-right (In)security Discourse During the European Parliament Elections in the face of Russia’s War Against Ukraine. European Center for Populism Studies (ECPS), 2024. http://dx.doi.org/10.55271/rp0077.

Full text
Abstract:
The full-scale invasion of Ukraine by Russia has disrupted the previously perceived stability in Central and Eastern Europe (CCE) and exacerbated the prevailing sense of insecurity. The evolving circumstances are reshaping the political terrain and presenting avenues to mobilize support for the populist far right. However, to date, the far-right populist parties in Lithuania have not been successful in either national or European Parliament (EP) elections, as they have failed to surpass the required thresholds. However, the most recent European Parliament elections were an exception, with the
APA, Harvard, Vancouver, ISO, and other styles
4

Pasupuleti, Murali Krishna. Scalable Quantum Networks: Entanglement-Driven Secure Communication. National Education Services, 2025. https://doi.org/10.62311/nesx/rrvi525.

Full text
Abstract:
Abstract: Scalable quantum networks, powered by entanglement-driven secure communication, are poised to revolutionize global information exchange, cybersecurity, and quantum computing infrastructures. Unlike classical communication systems, quantum networks leverage quantum entanglement and superposition to enable ultra-secure data transmission, quantum key distribution (QKD), and instantaneous information sharing across large-scale networks. This research explores the fundamental principles of entanglement-based communication, the role of quantum repeaters, quantum memory, and multi-nodal ent
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!