Results 11 to 20 of about 1,180 (196)

User privacy prevention model using supervised federated learning‐based block chain approach for internet of Medical Things

open access: yesCAAI Transactions on Intelligence Technology, EarlyView., 2023
Abstract This research focuses on addressing the privacy issues in healthcare advancement monitoring with the rapid establishment of the decentralised communication system in the Internet of Medical Things (IoMT). An integrated blockchain homomorphic encryption standard with an in‐build supervised learning‐based smart contract is designed to improvise ...
Chandramohan Dhasarathan   +7 more
wiley   +1 more source

Synonym‐based multi‐keyword ranked search with secure k‐NN in 6G network

open access: yesIET Networks, EarlyView., 2022
Abstract Sixth Generation (6G) integrates the next generation communication systems such as maritime, terrestrial, and aerial to offer robust network and massive device connectivity with ultra‐low latency requirement. The cutting edge technologies such as artificial intelligence, quantum machine learning, and millimetre enable hyper‐connectivity to ...
Deebak Bakkiam David, Fadi Al‐Turjman
wiley   +1 more source

Attribute-Based Encryption Scheme Supporting Outsourcing and Revocation in Fog Computing [PDF]

open access: yesJisuanji gongcheng, 2020
Fog computing extends the computing power and data analysis applications of cloud computing to the edge of the network,meeting the requirements of low latency and mobility of the Internet of Things(IoT) devices,but at the same time generating new data ...
HUANG Fengming, TU Shanshan, MENG Yuan
doaj   +1 more source

Efficient and Secure Outsourcing of DFT, IDFT, and Circular Convolution

open access: yesIEEE Access, 2019
Discrete Fourier transform (DFT), inverse DFT (IDFT), and circular convolution are important tools for analyzing and designing discrete signals and systems, and are widely used in various industries.
Xiangli Xiao   +3 more
doaj   +1 more source

Secure data outsourcing in presence of the inference problem: issues and directions

open access: yesJournal of Information and Telecommunication, 2021
With the emergence of cloud computing paradigms, secure data outsourcing has become one of the crucial challenges which strongly imposes itself. Data owners place their data among cloud service providers in order to increase flexibility, optimize storage,
Adel Jebali   +2 more
doaj   +1 more source

Outsourcing Large-Scale Quadratic Programming to a Public Cloud

open access: yesIEEE Access, 2015
Cloud computing provides service for resource-constrained customers to perform large-scale scientific computation. However, it also brings some new challenges, which have to be considered in designing outsourcing protocols.
Lifeng Zhou, Chunguang Li
doaj   +1 more source

SLA-aware resource scheduling algorithm for cloud storage

open access: yesEURASIP Journal on Wireless Communications and Networking, 2020
Cloud computing is a novel computing paradigm, which connects plenty of computing resources and storage resources via Internet. Cloud computing provides a number of high-quality services, such as cloud storage, outsourcing computing, and on-demand self ...
Yong Wang   +4 more
doaj   +1 more source

Privacy-Preserving Ciphertext-Policy Attribute-Based Search over Encrypted Data in Cloud Storage

open access: yesJournal of Computer Science and Technology, 2023
Cloud storage is one of the cloud computing services which allows data users to store their data remotely to the cloud. Thus, most individuals, institutions, and organizations are outsourcing their data to the cloud.
Uma Sankararao Varri
doaj   +1 more source

Survey for Sensor-Cloud System from Business Process Outsourcing Perspective

open access: yesInternational Journal of Distributed Sensor Networks, 2015
Cloud computing is a new IT trend to meet the new business requirements such as business agility and operational efficiency with business process outsourcing (BPO). Sensor-Cloud infrastructure is the extended form of cloud computing to manage the sensors
JeongYeon Kim
doaj   +1 more source

Multilayer Architecture Model for Mobile Cloud Computing Paradigm

open access: yesComplexity, 2019
Mobile Cloud Computing is one of today's more disruptive paradigms of computation due to its effects on the performance of mobile computing and the development of Internet of Things.
Higinio Mora   +3 more
doaj   +1 more source

Home - About - Disclaimer - Privacy