Results 61 to 70 of about 1,001 (165)
A Hardware-Based Correct Execution Environment Supporting Virtual Memory
The rapid increase in data generation has led to outsourcing computation to cloud service providers, allowing clients to handle large tasks without investing resources.
Daehyeon Lee +8 more
doaj +1 more source
Blockchain for achieving accountable outsourcing computations in edge computing
Ruilin Lai, Gansen Zhao
openaire +1 more source
Fair Marketplace for Secure Outsourced Computations
The cloud computing paradigm offers clients ubiquitous and on demand access to a shared pool of computing resources, enabling the clients to provision scalable services with minimal management effort. Such a pool of resources, however, is typically owned and controlled by a single service provider, making it a single-point-of-failure.
Dang, Hung +2 more
openaire +2 more sources
A trusted medical data sharing framework for edge computing leveraging blockchain and outsourced computation. [PDF]
Quan G +6 more
europepmc +1 more source
Verifiable Computation on Outsourced Encrypted Data
On one hand, homomorphic encryption allows a cloud server to perform computation on outsourced encrypted data but provides no verifiability that the computation is correct. On the other hand, homomorphic authenticator, such as homomorphic signature with public verifiability and homomorphic MAC with private verifiability, guarantees authenticity of ...
LAI, Junzuo +3 more
openaire +3 more sources
Outsourcing machine learning models to cloud servers allows data owners to train and utilize models without investing in dedicated hardware. However, this approach raises significant concerns regarding the proprietary nature of the models and the data ...
Nawal Almutairi
doaj +1 more source
PP-DDP: a privacy-preserving outsourcing framework for solving the double digest problem. [PDF]
Suo J +5 more
europepmc +1 more source
Outsourcing computation on encrypted data
Nowadays, encryption and services issued of ``big data" are at odds. Indeed, encryption is about protecting users privacy, while big data is about analyzing users data. Being increasingly concerned about security, users tend to encrypt their sensitive data that are subject to be accessed by other parties, including service providers.
openaire +1 more source
KmerCrypt: private k-mer search with homomorphic encryption. [PDF]
Provatas K +2 more
europepmc +1 more source
Exploring information security compliant behaviors in healthcare Knowledge Process Outsourcing (KPOs). [PDF]
Mahipala C, Perera P.
europepmc +1 more source

