Tagged articles
47 articles
Page 1 of 1
Architecture Digest
Architecture Digest
Mar 24, 2026 · Databases

How to Perform Fuzzy Searches on Encrypted Data: Methods, Pros, and Cons

This article examines why encrypted data hampers fuzzy queries, categorizes three implementation approaches—from naïve in‑memory decryption to conventional token‑based indexing and advanced algorithmic schemes—evaluates their performance, storage overhead, and security trade‑offs, and provides practical references.

Securityfuzzy-searchtokenization
0 likes · 10 min read
How to Perform Fuzzy Searches on Encrypted Data: Methods, Pros, and Cons
Java Architect Handbook
Java Architect Handbook
Mar 18, 2026 · Information Security

How to Enable Fuzzy Search on Encrypted Data: Methods, Pros & Cons

This article analyzes three categories of techniques—naïve, conventional, and advanced—for performing fuzzy queries on encrypted fields, compares their memory and performance trade‑offs, provides concrete code examples and storage calculations, and recommends the most practical approach for production systems.

Database Securityencrypted datafuzzy-search
0 likes · 13 min read
How to Enable Fuzzy Search on Encrypted Data: Methods, Pros & Cons
Rare Earth Juejin Tech Community
Rare Earth Juejin Tech Community
Nov 7, 2025 · Backend Development

How to Achieve MySQL‑LIKE Style Fuzzy Search in Elasticsearch 8.x

This article walks through the challenge of implementing MySQL‑LIKE style front‑and‑back wildcard searches in Elasticsearch, comparing match, match_phrase, n‑gram, legacy wildcard queries, and the new wildcard field type introduced in ES 7.9+, with code samples, performance benchmarks, and practical recommendations for choosing the optimal solution.

ElasticsearchN-gramfuzzy-search
0 likes · 10 min read
How to Achieve MySQL‑LIKE Style Fuzzy Search in Elasticsearch 8.x
Architecture Digest
Architecture Digest
Oct 14, 2025 · Information Security

How to Perform Fuzzy Searches on Encrypted Data: Methods, Pros & Cons

This article explores the challenges of fuzzy searching encrypted data, categorizes three implementation approaches—naïve, conventional, and advanced—examines their trade‑offs, provides practical examples and performance calculations, and offers recommendations for secure and efficient query solutions.

Securitydatabaseencryption
0 likes · 10 min read
How to Perform Fuzzy Searches on Encrypted Data: Methods, Pros & Cons
Architect
Architect
Oct 9, 2025 · Databases

How to Implement Pagination and Fuzzy Search in Redis Efficiently

This article explains how to achieve conditional queries and pagination in Redis using Sorted Sets and Hashes, outlines the implementation steps for pagination, fuzzy multi‑condition search, their combination, and discusses performance optimizations such as expiration and real‑time data handling.

HashSorted Setfuzzy-search
0 likes · 11 min read
How to Implement Pagination and Fuzzy Search in Redis Efficiently
Architect
Architect
Sep 28, 2025 · Information Security

How to Perform Fuzzy Searches on Encrypted Data: Practical Approaches

This article examines three categories of techniques—naïve, conventional, and advanced—for enabling fuzzy queries on encrypted data, evaluates their pros and cons, provides implementation details, performance considerations, and references to real‑world solutions, guiding developers toward secure and efficient search strategies.

databaseencrypted datafuzzy-search
0 likes · 12 min read
How to Perform Fuzzy Searches on Encrypted Data: Practical Approaches
Tech Freedom Circle
Tech Freedom Circle
Sep 16, 2025 · Backend Development

Redis Fuzzy Search Techniques and the Most Dangerous Commands to Avoid

The article explains how to perform fuzzy queries in Redis using KEYS, SCAN, and collection‑type scans, enumerates commands that can block the single‑threaded server such as KEYS *, HGETALL, LRANGE, and provides practical mitigation strategies like incremental scans, key sharding, and asynchronous deletion.

BlockingSCANdangerous-commands
0 likes · 24 min read
Redis Fuzzy Search Techniques and the Most Dangerous Commands to Avoid
Top Architect
Top Architect
May 24, 2025 · Databases

Implementing Pagination and Multi‑Condition Fuzzy Search in Redis

This article explains how to use Redis Sorted Sets and Hashes to achieve efficient pagination, fuzzy multi‑condition queries, and their combination, while also discussing performance‑optimisation strategies such as temporary ZSet expiration and data‑freshness handling, before concluding with a brief promotional segment.

HashSorted Setdatabase
0 likes · 12 min read
Implementing Pagination and Multi‑Condition Fuzzy Search in Redis
Java Architect Essentials
Java Architect Essentials
Dec 24, 2024 · Information Security

Techniques for Performing Fuzzy Queries on Encrypted Data

This article examines the challenges of fuzzy searching encrypted data and presents three categories of solutions—naïve in‑memory decryption, conventional database‑level approaches, and advanced algorithmic methods—evaluating their implementation steps, security implications, and performance trade‑offs.

algorithmencryptionfuzzy-search
0 likes · 11 min read
Techniques for Performing Fuzzy Queries on Encrypted Data
Top Architect
Top Architect
Sep 21, 2024 · Databases

Implementing Pagination and Multi‑Condition Fuzzy Query in Redis

This article explains how to implement pagination, multi‑condition fuzzy search, and their combination using Redis Sorted Sets and Hashes, discusses performance optimizations and expiration strategies, and also contains promotional material for ChatGPT services and a community offering.

HashPerformance OptimizationSorted Set
0 likes · 12 min read
Implementing Pagination and Multi‑Condition Fuzzy Query in Redis
Java Tech Enthusiast
Java Tech Enthusiast
Sep 3, 2024 · Databases

Implementing Pagination and Multi‑Condition Fuzzy Search in Redis

By leveraging Redis sorted sets for ordered pagination and hash fields with HSCAN for multi‑condition fuzzy matching, the article shows how to build a cached query pipeline that creates temporary ZSets keyed by pattern, supports efficient page retrieval, and uses expirations and refresh strategies to balance freshness and performance.

HashPerformance OptimizationZSet
0 likes · 9 min read
Implementing Pagination and Multi‑Condition Fuzzy Search in Redis
Architecture Digest
Architecture Digest
Aug 6, 2024 · Information Security

How to Perform Fuzzy Queries on Encrypted Data: Approaches and Trade‑offs

This article examines why encrypted data is unfriendly to fuzzy search, categorises three implementation strategies—naïve, conventional, and advanced—analyses their advantages and disadvantages, and provides practical guidance and reference links for securely enabling fuzzy queries on encrypted fields.

Database Queryalgorithm designencrypted data
0 likes · 11 min read
How to Perform Fuzzy Queries on Encrypted Data: Approaches and Trade‑offs
IT Architects Alliance
IT Architects Alliance
Aug 4, 2024 · Information Security

How to Perform Fuzzy Search on Encrypted Data

This article examines the challenges of fuzzy searching encrypted data and compares three implementation approaches—naïve, conventional, and advanced—detailing their principles, performance implications, storage costs, and security trade‑offs, ultimately recommending the conventional token‑based method for most practical applications.

algorithmdatabaseencryption
0 likes · 13 min read
How to Perform Fuzzy Search on Encrypted Data
Java Captain
Java Captain
Jul 29, 2024 · Information Security

How to Perform Fuzzy Queries on Encrypted Data

This article examines the challenges of fuzzy searching encrypted data and compares three categories of solutions—naïve, conventional, and advanced—detailing their implementation ideas, performance trade‑offs, storage costs, and security implications for real‑world applications.

algorithmencryptionfuzzy-search
0 likes · 10 min read
How to Perform Fuzzy Queries on Encrypted Data
Architect
Architect
Jul 23, 2024 · Databases

How to Perform Fuzzy Searches on Encrypted Data: Methods, Pros & Cons

This article examines three categories of techniques—naïve, conventional, and advanced—for enabling fuzzy queries on encrypted data, comparing their implementation steps, performance impact, storage overhead, and security trade‑offs, and provides practical examples and reference links for further study.

Securitydatabaseencrypted data
0 likes · 11 min read
How to Perform Fuzzy Searches on Encrypted Data: Methods, Pros & Cons
Top Architect
Top Architect
May 24, 2024 · Databases

How to Perform Fuzzy Search on Encrypted Data

This article examines various techniques for enabling fuzzy queries on encrypted fields, comparing naive memory‑based methods, conventional token‑based approaches that leverage database indexes, and advanced cryptographic schemes, and recommends practical solutions for real‑world applications.

database encryptionencrypted datafuzzy-search
0 likes · 12 min read
How to Perform Fuzzy Search on Encrypted Data
Selected Java Interview Questions
Selected Java Interview Questions
Apr 25, 2024 · Information Security

Techniques for Fuzzy Search on Encrypted Data: Approaches, Trade‑offs, and Practical Implementations

The article examines why encrypted sensitive fields such as passwords, phone numbers, and bank details need special handling, categorises three families of fuzzy‑search solutions for encrypted data, evaluates their security, performance and storage costs, and recommends a balanced conventional method for production use.

Data Protectionalgorithmdatabase
0 likes · 10 min read
Techniques for Fuzzy Search on Encrypted Data: Approaches, Trade‑offs, and Practical Implementations
Architecture Digest
Architecture Digest
Mar 12, 2024 · Information Security

Approaches to Fuzzy Search on Encrypted Data: From Naïve to Advanced Methods

This article reviews three categories of techniques for performing fuzzy queries on encrypted data—naïve (memory‑based), conventional (database‑level encryption or tokenization), and advanced algorithmic solutions—detailing their implementation ideas, advantages, drawbacks, and practical recommendations.

fuzzy-search
0 likes · 10 min read
Approaches to Fuzzy Search on Encrypted Data: From Naïve to Advanced Methods
Java High-Performance Architecture
Java High-Performance Architecture
Dec 28, 2023 · Backend Development

How to Perform Fuzzy Search on Encrypted Fields in Java Applications

This article explains why traditional LIKE queries fail on encrypted sensitive fields, analyzes common scenarios, and presents four practical solutions—including tokenized ciphertext mapping—along with environment setup, Maven dependencies, and complete Spring Boot code to enable secure fuzzy searches on encrypted data.

JavaMyBatisSpring Boot
0 likes · 13 min read
How to Perform Fuzzy Search on Encrypted Fields in Java Applications
macrozheng
macrozheng
Oct 19, 2023 · Information Security

How to Perform Fuzzy Search on Encrypted Phone Numbers in MySQL

This article explores multiple strategies for enabling fuzzy search on encrypted phone numbers, including in‑memory caching, database decryption functions, segment‑wise storage, and dedicated fuzzy‑search fields, comparing their trade‑offs in performance, memory usage, and data consistency.

Backendencryptionfuzzy-search
0 likes · 10 min read
How to Perform Fuzzy Search on Encrypted Phone Numbers in MySQL
Su San Talks Tech
Su San Talks Tech
Oct 12, 2023 · Information Security

How to Enable Fuzzy Search on Encrypted Phone Numbers in MySQL

This article explores practical methods for performing fuzzy searches on encrypted phone numbers, covering in‑memory caching, database decryption functions, segment‑based storage, and adding dedicated fuzzy‑search fields to balance security, performance, and scalability.

Database designencryptionfuzzy-search
0 likes · 10 min read
How to Enable Fuzzy Search on Encrypted Phone Numbers in MySQL
Architect's Guide
Architect's Guide
Oct 7, 2023 · Backend Development

Implementing Fuzzy Search on Encrypted Sensitive Fields in a Spring Boot Backend

This article explains how to enable fuzzy searches on encrypted sensitive fields such as names, phone numbers, and ID numbers in a Spring Boot backend by using a tokenized ciphertext mapping table, outlining four possible solutions, recommending the tokenized approach, and providing complete configuration and code examples.

Backend DevelopmentSpring Bootdatabase encryption
0 likes · 11 min read
Implementing Fuzzy Search on Encrypted Sensitive Fields in a Spring Boot Backend
Java Architect Essentials
Java Architect Essentials
Aug 13, 2023 · Information Security

How to Perform Fuzzy Searches on Encrypted Data Without Breaking Security

This article examines three categories of approaches—naïve, conventional, and advanced—for enabling fuzzy queries on encrypted fields, comparing their implementation steps, performance trade‑offs, storage costs, and security implications, and provides practical examples such as in‑memory decryption, tag mapping, database functions, tokenization, and algorithm‑level designs.

Database Securityencrypted dataencryption
0 likes · 11 min read
How to Perform Fuzzy Searches on Encrypted Data Without Breaking Security
Architecture Digest
Architecture Digest
Jul 18, 2023 · Databases

Implementing Conditional Query and Pagination in Redis

This article explains how to use Redis Sorted Sets and Hashes to achieve pagination, fuzzy multi‑condition queries, and their combination, while also discussing performance optimizations such as expiration and update strategies for generated ZSet collections.

HashZSetfuzzy-search
0 likes · 8 min read
Implementing Conditional Query and Pagination in Redis
Architect's Guide
Architect's Guide
Nov 30, 2022 · Information Security

How to Perform Fuzzy Queries on Encrypted Data

This article reviews why reversible encryption is needed for certain sensitive fields, classifies three categories of fuzzy‑search‑on‑encrypted‑data techniques—naïve, conventional, and advanced—and evaluates their implementation steps, performance trade‑offs, and practical recommendations.

AESalgorithmdata security
0 likes · 11 min read
How to Perform Fuzzy Queries on Encrypted Data
dbaplus Community
dbaplus Community
Nov 26, 2022 · Databases

How to Perform Fuzzy Searches on Encrypted Data: Methods, Pros & Cons

This article examines why encrypted data hinders fuzzy queries and compares three categories of solutions—naïve, conventional, and advanced—detailing their implementation steps, performance trade‑offs, storage costs, and practical suitability for real‑world systems.

data securityencryptionfuzzy-search
0 likes · 11 min read
How to Perform Fuzzy Searches on Encrypted Data: Methods, Pros & Cons
Top Architect
Top Architect
Oct 27, 2022 · Databases

Techniques for Fuzzy Query on Encrypted Data

This article examines the challenges of performing fuzzy searches on encrypted data and compares three categories of solutions—naïve, conventional, and advanced—detailing their implementation methods, performance trade‑offs, storage costs, and security implications for real‑world applications.

Securitydatabaseencryption
0 likes · 12 min read
Techniques for Fuzzy Query on Encrypted Data
Architecture Digest
Architecture Digest
Sep 28, 2022 · Information Security

Approaches to Fuzzy Search on Encrypted Data

This article examines why encrypted data hinders fuzzy queries and compares three categories of solutions—naïve in‑memory decryption, conventional database‑level techniques, and advanced algorithmic methods—highlighting their trade‑offs in security, performance, and storage overhead.

encrypted datafuzzy-searchperformance
0 likes · 10 min read
Approaches to Fuzzy Search on Encrypted Data
Top Architect
Top Architect
Sep 24, 2022 · Information Security

How to Perform Fuzzy Queries on Encrypted Data: Methods and Trade‑offs

This article examines the challenges of fuzzy searching encrypted data and compares three categories of solutions—naïve (sand‑wich), conventional, and advanced (super)—detailing their implementation ideas, performance implications, and suitability for real‑world applications.

algorithmdata securitydatabase
0 likes · 11 min read
How to Perform Fuzzy Queries on Encrypted Data: Methods and Trade‑offs
Architect
Architect
Sep 22, 2022 · Information Security

How to Perform Fuzzy Queries on Encrypted Data

This article examines various techniques for enabling fuzzy search on encrypted data, comparing naïve, conventional, and advanced algorithmic approaches, evaluating their security, performance, and storage trade‑offs, and provides practical implementation guidance and reference resources.

data privacydatabaseencryption
0 likes · 11 min read
How to Perform Fuzzy Queries on Encrypted Data
Java High-Performance Architecture
Java High-Performance Architecture
Sep 13, 2022 · Information Security

How to Perform Fuzzy Searches on Encrypted Data: Strategies and Trade‑offs

This article examines why encrypted data hinders fuzzy queries, categorizes three implementation approaches—from naive in‑memory decryption to conventional database tricks and advanced algorithmic solutions—evaluates their security, performance, and storage impacts, and provides practical references for real‑world systems.

algorithmdata securitydatabase
0 likes · 11 min read
How to Perform Fuzzy Searches on Encrypted Data: Strategies and Trade‑offs
Java Backend Technology
Java Backend Technology
Aug 25, 2022 · Information Security

How to Perform Fuzzy Searches on Encrypted Data: Methods, Pros & Cons

This article examines why encrypted data hinders fuzzy queries, categorizes three implementation strategies—from naïve to conventional to advanced—explains their mechanisms, evaluates performance and security trade‑offs, and provides practical references for building searchable encrypted fields.

Securityalgorithmdata privacy
0 likes · 12 min read
How to Perform Fuzzy Searches on Encrypted Data: Methods, Pros & Cons
Sohu Tech Products
Sohu Tech Products
Aug 24, 2022 · Information Security

Approaches to Fuzzy Query on Encrypted Data

This article examines why encrypted data is unfriendly to fuzzy search, categorizes three implementation strategies—naïve, conventional, and advanced—analyzes their advantages and drawbacks, and recommends practical solutions for secure yet searchable encrypted fields.

data privacyfuzzy-searchinformation security
0 likes · 10 min read
Approaches to Fuzzy Query on Encrypted Data
Architect's Tech Stack
Architect's Tech Stack
Aug 24, 2022 · Information Security

Techniques for Performing Fuzzy Search on Encrypted Data

This article examines the challenges of fuzzy searching encrypted data and presents three categories of solutions—naïve, conventional, and advanced—detailing their implementation ideas, performance trade‑offs, and practical recommendations for secure and efficient query processing.

data privacyfuzzy-searchinformation security
0 likes · 11 min read
Techniques for Performing Fuzzy Search on Encrypted Data
Java Architect Essentials
Java Architect Essentials
Aug 20, 2022 · Information Security

Techniques for Performing Fuzzy Search on Encrypted Data

This article examines why encrypted data is unfriendly to fuzzy queries, categorizes three implementation approaches—naïve, conventional, and advanced—and evaluates their security, performance, and storage trade‑offs while providing practical code examples and reference resources.

algorithmdata privacyfuzzy-search
0 likes · 10 min read
Techniques for Performing Fuzzy Search on Encrypted Data
Top Architect
Top Architect
Aug 16, 2022 · Databases

How to Perform Fuzzy Queries on Encrypted Data: Methods, Trade‑offs, and Recommendations

This article examines the difficulty of fuzzy searching encrypted fields and compares three solution families—naïve memory‑loading or tag‑table tricks, conventional token‑based encryption with indexable columns, and advanced algorithmic designs—highlighting their security, performance, and storage implications while recommending the most practical approach.

Securityalgorithmdatabase
0 likes · 10 min read
How to Perform Fuzzy Queries on Encrypted Data: Methods, Trade‑offs, and Recommendations