Various techniques occur to possess appearing compliment of encrypted investigation (Song ainsi que al 2000, Wang mais aussi al. 2016), that gives a form of privacy safeguards (the info try encrypted) and selective entry to sensitive investigation. One to seemingly the new strategy which can…