Results 11 to 20 of about 79,561 (230)
Widespread applications of 5G technology have prompted the outsourcing of computation dominated by the Internet of Things (IoT) cloud to improve transmission efficiency, which has created a novel paradigm for improving the speed of common connected ...
Linjie Wang, Youliang Tian, Jinbo Xiong
doaj +1 more source
Secret Sharing-Based IoT Text Data Outsourcing: A Secure and Efficient Scheme
Secret Sharing has been recently used as an alternative approach to solve privacy-preserving issues in cloud-based data outsourcing, for overcoming the challenges faced when encryption-based methods are adopted.
Zhaohui Tang
doaj +1 more source
(e efficiency of fully homomorphic encryption has always affected its practicality. With the dawn of Internet of things, the demand for computation and encryption on resource-constrained devices is increasing.
Mingyang Song +3 more
semanticscholar +1 more source
In view of the problem that users’ informations are leaked and tampered possiblely exists at service terminal in existing outsourcing cloud computing protocols,a secure efficient and verifiable outsourcing protocol about determinant computing in the ...
Rui SUN, You-Liang TIAN
doaj +3 more sources
Privacy-preserving trajectory similarity computation method
To tackle privacy concerns on user information leakage in trajectory outsourcing services, a privacy-preserving trajectory similarity computation (pTSC) method was proposed.A trajectory outsourcing service provider was enabled to store encrypted ...
Haining YU +4 more
doaj +2 more sources
Securely Outsource Modular Exponentiations With Single Untrusted Cloud Server
Modular exponentiation is one of the most fundamental operations in lots of encryption and signature systems. Due to the heavy computation cost of modular exponentiation, many schemes have been put forward to securely outsource modular exponentiation to ...
Dezhi An, Yan Li, Shengcai Zhang, Jun Lu
doaj +1 more source
A Comprehensive Survey on Secure Outsourced Computation and Its Applications
With the ever-increasing requirement of storage and computation resources, it is unrealistic for local devices (with limited sources) to implement large-scale data processing.
Yang Yang +6 more
doaj +1 more source
The Melbourne Shuffle: Improving Oblivious Storage in the Cloud [PDF]
We present a simple, efficient, and secure data-oblivious randomized shuffle algorithm. This is the first secure data-oblivious shuffle that is not based on sorting. Our method can be used to improve previous oblivious storage solutions for network-based
B. Pinkas +6 more
core +1 more source
Ultra-Fast Homomorphic Encryption Models enable Secure Outsourcing of Genotype Imputation
Genotype imputation is a fundamental step in genomic data analysis such as GWAS, where missing variant genotypes are predicted using the existing genotypes of nearby ‘tag’ variants.
Miran Kim +20 more
semanticscholar +1 more source
Privacy-preserving string search on encrypted genomic data using a generalized suffix tree
Background and objective: Efficient sequencing technologies generate a plethora of genomic data and make it available to researchers. To compute a massive genomic dataset, outsourcing the data to the cloud is often required.
Md Safiur Rahman Mahdi +3 more
doaj +1 more source

