Results 1 to 10 of about 1,129 (145)

Secure Outsourcing of Matrix Determinant Computation under the Malicious Cloud [PDF]

open access: yesSensors, 2021
Computing the determinant of large matrix is a time-consuming task, which is appearing more and more widely in science and engineering problems in the era of big data.
Mingyang Song, Yingpeng Sang
doaj   +3 more sources

Identity-based controlled delegated outsourcing data integrity auditing scheme [PDF]

open access: yesScientific Reports
With the continuous development of cloud computing, the application of cloud storage has become more and more popular. To ensure the integrity and availability of cloud data, scholars have proposed several cloud data auditing schemes.
Jianming Du   +4 more
doaj   +2 more sources

Protecting Function Privacy and Input Privacy in the Publicly Verifiable Outsourcing Computation of Polynomial Functions

open access: yesFuture Internet, 2023
With the prevalence of cloud computing, the outsourcing of computation has gained significant attention. Clients with limited computing power often outsource complex computing tasks to the cloud to save on computing resources and costs.
Beibei Song   +5 more
doaj   +1 more source

Lattice-Based Cryptanalysis on Outsourcing Scheme of Modular Exponentiations ExpSOS [PDF]

open access: yesJisuanji kexue yu tansuo, 2022
With the popularity of cloud computing, outsourcing computing, as an important form of cloud service, has attracted more and more attention from academia and industry.
ZHENG Yunhai, TIAN Chengliang
doaj   +1 more source

Secure and verifiable outsourcing of determinant computing in the cloud and its electronic trading scheme

open access: yes网络与信息安全学报, 2016
In view of the problem that users’ informations are leaked and tampered possiblely exists at service terminal in existing outsourcing cloud computing protocols,a secure efficient and verifiable outsourcing protocol about determinant computing in the ...
Rui SUN, You-Liang TIAN
doaj   +3 more sources

Survey on the Priority Factors Influencing IT Outsourcing in the Platform of Cloud Computing in Semnan Province Universities by Fuzzy DEMATEL Technique [PDF]

open access: yesJournal of Information Technology Management, 2015
Today, Information Technology Outsourcing (ITO) has developed and caused organizations to become more flexible and dynamic than they were before. The ever-increasing development of ICT is one of the main reasons for the promotion of outsourcing.
Mir Saeed Shafaee Tonekaboni   +2 more
doaj   +1 more source

Secure and Efficient Protocol for Outsourcing Large-Scale Matrix Multiplication to the Cloud

open access: yesIEEE Access, 2020
Outsourcing computing is an application of cloud computing. It is an important method to solve the problem of client resource limitation. However, outsourcing computing brings security and efficiency challenges.
Yu Wu   +3 more
doaj   +1 more source

Two-Cloud-Servers-Assisted Secure Outsourcing Multiparty Computation [PDF]

open access: yesThe Scientific World Journal, 2014
We focus on how to securely outsource computation task to the cloud and propose a secure outsourcing multiparty computation protocol on lattice-based encrypted data in two-cloud-servers scenario. Our main idea is to transform the outsourced data respectively encrypted by different users’ public keys to the ones that are encrypted by the same two ...
Yi Sun   +5 more
openaire   +3 more sources

A Systematic Literature Review on Cloud Computing Security: Threats and Mitigation Strategies

open access: yesIEEE Access, 2021
Cloud computing has become a widely exploited research area in academia and industry. Cloud computing benefits both cloud services providers (CSPs) and consumers.
Bader Alouffi   +5 more
doaj   +1 more source

Enhanced Blockchain-based Key Generation using Butterfly Optimization Algorithm for Efficient Data Sharing in Cloud Computing [PDF]

open access: yesJournal of Information Technology Management, 2023
Cloud Computing, employed in various applications and services, refers to using computational resources as a service depending on customer needs via the Internet. The computing paradigm is built on data outsourcing to third-party-controlled data centers.
P. Anbumani, R. Dhanapal
doaj   +1 more source

Home - About - Disclaimer - Privacy