New provable data transfer from provable data possession and deletion for secure cloud storage
With the continuous and rapid development of cloud computing, it becomes more popular for users to outsource large-scale data files to cloud servers for storage and computation.
Yudong Liu +3 more
doaj +1 more source
Research on ciphertext search for the cloud environment
In order to ensure the data privacy, users have to encrypt the data before outsourcing them to the cloud, How-ever, the encrypted data cannot take full advantage of the rich service function and powerful computation ability of the cloud platform ...
Fei XIANG +4 more
doaj +2 more sources
Secure outsourced decryption for FHE-based privacy-preserving cloud computing
The demand for processing vast volumes of data has surged dramatically due to the advancement of machine learning technology. Large-scale data processing necessitates substantial computational resources, prompting individuals and enterprises to turn to cloud services.
Ma, Xirong +7 more
openaire +2 more sources
Cloud computing: slutten for tradisjonell IT outsourcing?
I de siste årene har en ny trend innen IT verden, Cloud Computing inntatt IT markedet verden over. Cloud Computings tjenesteorienterte løsning har det ført til hete debatter blant eksperter om at skytjenester vil komme til å revolusjonere IT outsourcings industrien.
openaire +1 more source
INNOVATIVE MODELS OF EDUCATION AND TRAINING OF SKILLED PERSONNEL FOR HIGH TECH INDUSTRIES IN UKRAINE
The problems of development of innovative learning environment of continuous education and training of skilled personnel for high-tech industry are described. Aspects of organization of ICT based learning environment of vocational and technical school on
M.Shyshkina, V. Bykov
doaj
A trusted medical data sharing framework for edge computing leveraging blockchain and outsourced computation. [PDF]
Quan G +6 more
europepmc +1 more source
HyAR-PPO: Hybrid Action Representation Learning for Incentive-Driven Task Offloading in Vehicular Edge Computing. [PDF]
Wang W, Li M, Wu H.
europepmc +1 more source
KmerCrypt: private k-mer search with homomorphic encryption. [PDF]
Provatas K +2 more
europepmc +1 more source
Resilient and verifiable outsourced attribute-based non-interactive oblivious transfer protocol for tactical edge networks. [PDF]
Liu W, Fu B, Wang L.
europepmc +1 more source
A smart grid data sharing scheme supporting policy update and traceability. [PDF]
Yang X, Yao K, Li S, Du X, Wang C.
europepmc +1 more source

