Results 21 to 30 of about 25,319 (281)

Secure and Efficient Protocol for Outsourcing Large-Scale Matrix Multiplication to the Cloud

open access: yesIEEE Access, 2020
Outsourcing computing is an application of cloud computing. It is an important method to solve the problem of client resource limitation. However, outsourcing computing brings security and efficiency challenges.
Yu Wu   +3 more
doaj   +1 more source

A Verifiable Access Control Scheme for Mobile Cloud Storage [PDF]

open access: yesJisuanji gongcheng, 2016
In order to meet the secure requirements of data sharing in mobile cloud storage environment,a verifiable access control scheme based on Ciphertext-policy Attribute-based Encryption(CP-ABE) is proposed from the aspects of data security access control and
WANG Qian,XIONG Shuming
doaj   +1 more source

Outsourcing Private RAM Computation [PDF]

open access: yes2014 IEEE 55th Annual Symposium on Foundations of Computer Science, 2014
We construct the first schemes that allow a client to privately outsource arbitrary program executions to a remote server while ensuring that: (I) the client's work is small and essentially independent of the complexity of the computation being outsourced, and (II) the server's work is only proportional to the run-time of the computation on a random ...
Craig Gentry   +3 more
openaire   +1 more source

A Framework for Outsourcing of Secure Computation [PDF]

open access: yesProceedings of the 6th edition of the ACM Workshop on Cloud Computing Security, 2014
We study the problem of how to efficiently outsource a sensitive computation on secret inputs to a number of untrusted workers, under the assumption that at least one worker is honest.In our setting there is a number of clients C_1,…,Cn with inputs x1,…,xn. The clients want to delegate a secure computation of f(x1,…,xn) to a set of untrusted workers W1,
Thomas P. Jakobsen   +2 more
openaire   +1 more source

Correctness Verifiable Outsourcing Computation Scheme of Shortest Path Querying over Encrypted Graph Data [PDF]

open access: yesJisuanji kexue
Mass graph data such as geolocation and social networks are widely used and contain massive privacy,usually,it requires varied query services through secure outsourcing computation schemes.However,it is still an open challenge to design correctness ...
DING Hongfa, YU Yingying, JIANG Heling
doaj   +1 more source

Using secret sharing for searching in encrypted data [PDF]

open access: yes, 2004
When outsourcing data to an untrusted database server, the data should be encrypted. When using thin clients or low-bandwidth networks it is best to perform most of the work at the server.
A. Shamir   +3 more
core   +10 more sources

A Comprehensive Survey on Secure Outsourced Computation and Its Applications

open access: yesIEEE Access, 2019
With the ever-increasing requirement of storage and computation resources, it is unrealistic for local devices (with limited sources) to implement large-scale data processing.
Yang Yang   +6 more
doaj   +1 more source

Mechanisms for Outsourcing Computation via a Decentralized Market

open access: yes, 2020
As the number of personal computing and IoT devices grows rapidly, so does the amount of computational power that is available at the edge. Since many of these devices are often idle, there is a vast amount of computational power that is currently ...
Anderson D. P.   +5 more
core   +1 more source

Privacy-preserving trajectory similarity computation method

open access: yesTongxin xuebao, 2022
To tackle privacy concerns on user information leakage in trajectory outsourcing services, a privacy-preserving trajectory similarity computation (pTSC) method was proposed.A trajectory outsourcing service provider was enabled to store encrypted ...
Haining YU   +4 more
doaj   +2 more sources

Outsourcing Large-Scale Quadratic Programming to a Public Cloud

open access: yesIEEE Access, 2015
Cloud computing provides service for resource-constrained customers to perform large-scale scientific computation. However, it also brings some new challenges, which have to be considered in designing outsourcing protocols.
Lifeng Zhou, Chunguang Li
doaj   +1 more source

Home - About - Disclaimer - Privacy