2015
DOI: 10.1007/s10586-015-0474-4
|View full text |Cite
|
Sign up to set email alerts
|

Ownership-guaranteed security framework for the private data in the entrusted management environment

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
22
0

Year Published

2019
2019
2019
2019

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(22 citation statements)
references
References 14 publications
0
22
0
Order By: Relevance
“…The effectiveness of DBFH-CDS Technique is compared against with existing methods namely AKFS [17], two-factor data security protection mechanism [8] and FIBFs [25], respectively. The performance of DBFH-CDS Technique is evaluated along with the following metrics.…”
Section: Resultsmentioning
confidence: 99%
See 4 more Smart Citations
“…The effectiveness of DBFH-CDS Technique is compared against with existing methods namely AKFS [17], two-factor data security protection mechanism [8] and FIBFs [25], respectively. The performance of DBFH-CDS Technique is evaluated along with the following metrics.…”
Section: Resultsmentioning
confidence: 99%
“…From the figure, red line indicates the results of data storage time taken for unfragmented table whereas the blue line represents data storage time taken for the fragmented table using four methods. As shown in the figure, the Execution time for the Scalar query using proposed DBFH-CDS Technique is lower in the fragmented table as compared to other existing methods namely AKFS [17], Two-Factor Data Security Protection Mechanism [8], FIBFs [25].…”
Section: Measurement Of Execution Timementioning
confidence: 96%
See 3 more Smart Citations