Results 1 to 10 of about 981 (145)
Blockchain-enabled infrastructural security solution for serverless consortium fog and edge computing [PDF]
The robust development of the blockchain distributed ledger, the Internet of Things (IoT), and fog computing-enabled connected devices and nodes has changed our lifestyle nowadays. Due to this, the increased rate of device sales and utilization increases
Abdullah Ayub Khan +6 more
doaj +3 more sources
Privacy-Preserving Outsourcing Algorithms for Multidimensional Data Encryption in Smart Grids [PDF]
With the development of the Internet of Things, smart grids have become indispensable in our daily life and can provide people with reliable electricity generation, transmission, distribution and control.
Feng Zhai +3 more
doaj +2 more sources
With the prevalence of cloud computing, the outsourcing of computation has gained significant attention. Clients with limited computing power often outsource complex computing tasks to the cloud to save on computing resources and costs.
Beibei Song +5 more
doaj +1 more source
Widespread applications of 5G technology have prompted the outsourcing of computation dominated by the Internet of Things (IoT) cloud to improve transmission efficiency, which has created a novel paradigm for improving the speed of common connected ...
Linjie Wang, Youliang Tian, Jinbo Xiong
doaj +1 more source
A potential game-based outsourcing computation framework for multiple calculators
Outsourcing computation enables a computationally weak client to outsource the computation of a function f to a more powerful but untrusted server. The traditional outsourcing computation model forbids communication between players, but it has little ...
Duo Zhang, Youliang Tian, Linjie Wang
doaj +1 more source
The continuous production of large-scale data makes data outsourcing computation a trend. In order to ensure that data outsourcing transaction is trusted and fair, it needs the supervision and judgment of a third party.
Lina Li +4 more
doaj +1 more source
Privacy-Preserving Outsourced Computation Scheme for Accurate Shortest Distance of Graph Data [PDF]
The widely used massive graph data, such as the ones used for social networks, communication networks, and bioproteins, contain large amount of private and sensitive personal and commercial information; therefore, it is essential to encrypt such graph ...
Yingying YU, Hongfa DING, Heling JIANG
doaj +1 more source
Practical Secure Computation Outsourcing [PDF]
The rapid development of cloud computing promotes a wide deployment of data and computation outsourcing to cloud service providers by resource-limited entities. Based on a pay-per-use model, a client without enough computational power can easily outsource large-scale computational tasks to a cloud. Nonetheless, the issue of security and privacy becomes
Zihao Shan +3 more
openaire +1 more source
Secure and Efficient Protocol for Outsourcing Large-Scale Matrix Multiplication to the Cloud
Outsourcing computing is an application of cloud computing. It is an important method to solve the problem of client resource limitation. However, outsourcing computing brings security and efficiency challenges.
Yu Wu +3 more
doaj +1 more source
A Verifiable Access Control Scheme for Mobile Cloud Storage [PDF]
In order to meet the secure requirements of data sharing in mobile cloud storage environment,a verifiable access control scheme based on Ciphertext-policy Attribute-based Encryption(CP-ABE) is proposed from the aspects of data security access control and
WANG Qian,XIONG Shuming
doaj +1 more source

