Results 51 to 60 of about 1,001 (165)

Privacy-preserving and efficient outsourcing computation scheme for principal component analysis

open access: yesCybersecurity
Currently, the rapid development of Internet of Things (IoT) technology and the deepening digital transformation of traditional industries have driven substantial growth in the Machine Learning as a Service (MLaaS) market to meet massive data processing ...
Yan Ding, Ye Du
doaj   +1 more source

Secure Image LBP Feature Extraction in Cloud-Based Smart Campus

open access: yesIEEE Access, 2018
The smart campus can monitor students in real time by analyzing students' images, but a large number of images bring an unbearable burden to the smart campus. The convenience of cloud computing has attracted smart campus to outsource their huge amount of
Zhihua Xia   +5 more
doaj   +1 more source

Outsourcing Eigen-Decomposition and Singular Value Decomposition of Large Matrix to a Public Cloud

open access: yesIEEE Access, 2016
Cloud computing enables customers with limited computational resources to outsource their huge computation workloads to the cloud with massive computational power.
Lifeng Zhou, Chunguang Li
doaj   +1 more source

Revocation in Publicly Verifiable Outsourced Computation [PDF]

open access: yes, 2015
The combination of software-as-a-service and the increasing use of mobile devices gives rise to a considerable difference in computational power between servers and clients. Thus, there is a desire for clients to outsource the evaluation of complex functions to an external server. Servers providing such a service may be rewarded per computation, and as
James Alderman   +3 more
openaire   +1 more source

A Content-Based Image Retrieval Scheme Using an Encrypted Difference Histogram in Cloud Computing

open access: yesInformation, 2017
Content-based image retrieval (CBIR) has been widely used in many applications. Large storage and computation overheads have made the outsourcing of CBIR services attractive.
Dandan Liu   +3 more
doaj   +1 more source

PRESAGE: PRivacy-preserving gEnetic testing via SoftwAre Guard Extension

open access: yesBMC Medical Genomics, 2017
Background Advances in DNA sequencing technologies have prompted a wide range of genomic applications to improve healthcare and facilitate biomedical research.
Feng Chen   +9 more
doaj   +1 more source

E-SC: Collusion-Resistant Secure Outsourcing of Sequence Comparison Algorithm

open access: yesIEEE Access, 2018
The sequence comparison of large-scale string-typed data is fundamental in computer science and other computational disciplines. Its development has been promoted into an emerging outsourcing service by the almost unlimited powerful computing and storage
Xiaofei Wang, Yuqing Zhang
doaj   +1 more source

Multilayer Architecture Model for Mobile Cloud Computing Paradigm

open access: yesComplexity, 2019
Mobile Cloud Computing is one of today's more disruptive paradigms of computation due to its effects on the performance of mobile computing and the development of Internet of Things.
Higinio Mora   +3 more
doaj   +1 more source

SPOC: Secure Payments for Outsourced Computations

open access: yesProceedings 2018 Workshop on Decentralized IoT Security and Standards, 2018
Constrained devices in IoT networks often require to outsource resource-heavy computations or data processing tasks. Currently, most of those jobs are done in the centralised cloud. However, with rapidly increasing number of devices and amount of produced data, edge computing represents a much more efficient solution decreasing the cost, the delay and ...
Krol, Michal, Psaras, Ioannis
openaire   +2 more sources

Revocable Attribute-Based Encryption Scheme With Efficient Deduplication for Ehealth Systems

open access: yesIEEE Access, 2019
The deduplication based on attribute-based encryption can be well used in eHealth systems to save storage space and share medical records. However, the excessive computation costs of existing schemes lead to inefficient deduplication.
Hua Ma   +4 more
doaj   +1 more source

Home - About - Disclaimer - Privacy