Efficient and secure outsourcing of genomic data storage [PDF]
Background Cloud computing is becoming the preferred solution for efficiently dealing with the increasing amount of genomic data. Yet, outsourcing storage and processing sensitive information, such as genomic data, comes with important concerns related ...
João Sá Sousa +6 more
doaj +3 more sources
SVAT: Secure outsourcing of variant annotation and genotype aggregation [PDF]
Background Sequencing of thousands of samples provides genetic variants with allele frequencies spanning a very large spectrum and gives invaluable insight into genetic determinants of diseases.
Miran Kim +3 more
doaj +2 more sources
Secure Outsourcing of Matrix Determinant Computation under the Malicious Cloud [PDF]
Computing the determinant of large matrix is a time-consuming task, which is appearing more and more widely in science and engineering problems in the era of big data.
Mingyang Song, Yingpeng Sang
doaj +2 more sources
Two-Cloud-Servers-Assisted Secure Outsourcing Multiparty Computation [PDF]
We focus on how to securely outsource computation task to the cloud and propose a secure outsourcing multiparty computation protocol on lattice-based encrypted data in two-cloud-servers scenario.
Yi Sun +5 more
doaj +2 more sources
Energy-efficient secure outsourcing decryption of attribute based encryption for mobile device in cloud computation [PDF]
This is a copy of the author 's final draft version of an article published in the "Journal of ambient intelligence and humanized computing". The final publication is available at Springer via http://dx.doi.org/10.1007/s12652-017-0658-2In this paper two ...
An Wang, Xu +4 more
core +3 more sources
Efficient and Secure Outsourcing of DFT, IDFT, and Circular Convolution
Discrete Fourier transform (DFT), inverse DFT (IDFT), and circular convolution are important tools for analyzing and designing discrete signals and systems, and are widely used in various industries.
Xiangli Xiao +3 more
doaj +2 more sources
A tutorial on secure outsourcing of large-scale computations for big data
Today's society is collecting a massive and exponentially growing amount of data that can potentially revolutionize scientific and engineering fields, and promote business innovations.
Sergio Salinas +3 more
doaj +2 more sources
Secure Outsourcing of Cryptographic Circuits Manufacturing
The fabrication process of integrated circuits (ICs) is complex and requires the use of off-shore foundries to lower the costs and to have access to leading-edge manufacturing facilities. Such an outsourcing trend leaves the possibility of inserting malicious circuitry (a.k.a.
Ateniese, Giuseppe +4 more
openaire +4 more sources
Data Outsourcing and Sharing Scheme Based on Vector Commitment and Proxy Re-encryption [PDF]
In order to guarantee the integrity,confidentiality and accessibility of outsourcing data,a secure data outsourcing and sharing scheme is proposed based on the vector commitment primitive and the proxy re-encryption technology.By introducing a digital ...
WU Xinghua,ZHANG Aixin,LI Jianhua
doaj +1 more source
Using secret sharing for searching in encrypted data [PDF]
When outsourcing data to an untrusted database server, the data should be encrypted. When using thin clients or low-bandwidth networks it is best to perform most of the work at the server.
A. Shamir +3 more
core +18 more sources

