Results 1 to 10 of about 981 (145)

Blockchain-enabled infrastructural security solution for serverless consortium fog and edge computing [PDF]

open access: yesPeerJ Computer Science
The robust development of the blockchain distributed ledger, the Internet of Things (IoT), and fog computing-enabled connected devices and nodes has changed our lifestyle nowadays. Due to this, the increased rate of device sales and utilization increases
Abdullah Ayub Khan   +6 more
doaj   +3 more sources

Privacy-Preserving Outsourcing Algorithms for Multidimensional Data Encryption in Smart Grids [PDF]

open access: yesSensors, 2022
With the development of the Internet of Things, smart grids have become indispensable in our daily life and can provide people with reliable electricity generation, transmission, distribution and control.
Feng Zhai   +3 more
doaj   +2 more sources

Protecting Function Privacy and Input Privacy in the Publicly Verifiable Outsourcing Computation of Polynomial Functions

open access: yesFuture Internet, 2023
With the prevalence of cloud computing, the outsourcing of computation has gained significant attention. Clients with limited computing power often outsource complex computing tasks to the cloud to save on computing resources and costs.
Beibei Song   +5 more
doaj   +1 more source

Achieving reliable and anti-collusive outsourcing computation and verification based on blockchain in 5G-enabled IoT

open access: yesDigital Communications and Networks, 2022
Widespread applications of 5G technology have prompted the outsourcing of computation dominated by the Internet of Things (IoT) cloud to improve transmission efficiency, which has created a novel paradigm for improving the speed of common connected ...
Linjie Wang, Youliang Tian, Jinbo Xiong
doaj   +1 more source

A potential game-based outsourcing computation framework for multiple calculators

open access: yesDigital Communications and Networks, 2022
Outsourcing computation enables a computationally weak client to outsource the computation of a function f to a more powerful but untrusted server. The traditional outsourcing computation model forbids communication between players, but it has little ...
Duo Zhang, Youliang Tian, Linjie Wang
doaj   +1 more source

A Fair, Verifiable and Privacy-Protecting Data Outsourcing Transaction Scheme Based on Smart Contracts

open access: yesIEEE Access, 2022
The continuous production of large-scale data makes data outsourcing computation a trend. In order to ensure that data outsourcing transaction is trusted and fair, it needs the supervision and judgment of a third party.
Lina Li   +4 more
doaj   +1 more source

Privacy-Preserving Outsourced Computation Scheme for Accurate Shortest Distance of Graph Data [PDF]

open access: yesJisuanji gongcheng, 2023
The widely used massive graph data, such as the ones used for social networks, communication networks, and bioproteins, contain large amount of private and sensitive personal and commercial information; therefore, it is essential to encrypt such graph ...
Yingying YU, Hongfa DING, Heling JIANG
doaj   +1 more source

Practical Secure Computation Outsourcing [PDF]

open access: yesACM Computing Surveys, 2018
The rapid development of cloud computing promotes a wide deployment of data and computation outsourcing to cloud service providers by resource-limited entities. Based on a pay-per-use model, a client without enough computational power can easily outsource large-scale computational tasks to a cloud. Nonetheless, the issue of security and privacy becomes
Zihao Shan   +3 more
openaire   +1 more source

Secure and Efficient Protocol for Outsourcing Large-Scale Matrix Multiplication to the Cloud

open access: yesIEEE Access, 2020
Outsourcing computing is an application of cloud computing. It is an important method to solve the problem of client resource limitation. However, outsourcing computing brings security and efficiency challenges.
Yu Wu   +3 more
doaj   +1 more source

A Verifiable Access Control Scheme for Mobile Cloud Storage [PDF]

open access: yesJisuanji gongcheng, 2016
In order to meet the secure requirements of data sharing in mobile cloud storage environment,a verifiable access control scheme based on Ciphertext-policy Attribute-based Encryption(CP-ABE) is proposed from the aspects of data security access control and
WANG Qian,XIONG Shuming
doaj   +1 more source

Home - About - Disclaimer - Privacy