Energy-efficient secure outsourcing decryption of attribute based encryption for mobile device in cloud computation [PDF]
This is a copy of the author 's final draft version of an article published in the "Journal of ambient intelligence and humanized computing". The final publication is available at Springer via http://dx.doi.org/10.1007/s12652-017-0658-2In this paper two ...
An Wang, Xu +4 more
core +4 more sources
Ultrafast homomorphic encryption models enable secure outsourcing of genotype imputation. [PDF]
Kim M +20 more
europepmc +2 more sources
Securely Outsource Modular Exponentiations With Single Untrusted Cloud Server
Modular exponentiation is one of the most fundamental operations in lots of encryption and signature systems. Due to the heavy computation cost of modular exponentiation, many schemes have been put forward to securely outsource modular exponentiation to ...
Dezhi An, Yan Li, Shengcai Zhang, Jun Lu
doaj +1 more source
A Comprehensive Survey on Secure Outsourced Computation and Its Applications
With the ever-increasing requirement of storage and computation resources, it is unrealistic for local devices (with limited sources) to implement large-scale data processing.
Yang Yang +6 more
doaj +1 more source
The Melbourne Shuffle: Improving Oblivious Storage in the Cloud [PDF]
We present a simple, efficient, and secure data-oblivious randomized shuffle algorithm. This is the first secure data-oblivious shuffle that is not based on sorting. Our method can be used to improve previous oblivious storage solutions for network-based
B. Pinkas +6 more
core +1 more source
Privacy-preserving string search on encrypted genomic data using a generalized suffix tree
Background and objective: Efficient sequencing technologies generate a plethora of genomic data and make it available to researchers. To compute a massive genomic dataset, outsourcing the data to the cloud is often required.
Md Safiur Rahman Mahdi +3 more
doaj +1 more source
A secure data outsourcing scheme based on Asmuth – Bloom secret sharing [PDF]
The file attached to this record is the author's final peer reviewed version. The Publisher's final version can be found by following the DOI link.Data outsourcing is an emerging paradigm for data management in which a database is provided as a service ...
Habbal, Adib +4 more
core +1 more source
Secure outsourcing of sequence comparisons [PDF]
Large-scale problems in the physical and life sciences are being revolutionized by Internet computing technologies, like grid computing, that make possible the massive cooperative sharing of computational power, bandwidth, storage, and data. A weak computational device, once connected to such a grid, is no longer limited by its slow speed, small ...
Mikhail J. Atallah, Jiangtao Li
openaire +1 more source
Outsourcing Managed Security Services [PDF]
As computer attack patterns shift and threats to networks change and grow almost daily, it is critical that organizations achieve reliable information security. Investment decisions about information security are best considered in the context of managing business risk. Risks can be accepted, mitigated, avoided, or transferred.
Carol Sledge +4 more
openaire +2 more sources
Toward Efficient Encrypted Image Retrieval in Cloud Environment
Outsourcing image search services to public clouds is an ever-increasing trend. However, directly outsourcing image datasets to untrusted clouds introduces privacy concerns. Several secure image retrieval schemes have been proposed recently.
Zhengbai Huang, Meng Zhang, Yi Zhang
doaj +1 more source

