PRESAGE: PRivacy-preserving gEnetic testing via SoftwAre Guard Extension
Background Advances in DNA sequencing technologies have prompted a wide range of genomic applications to improve healthcare and facilitate biomedical research.
Feng Chen +9 more
doaj +1 more source
Privacy-Preserving and Outsourced Multi-User k-Means Clustering [PDF]
Many techniques for privacy-preserving data mining (PPDM) have been investigated over the past decade. Often, the entities involved in the data mining process are end-users or organizations with limited computing and storage resources.
Bertino, Elisa +4 more
core +3 more sources
Secure efficient and verifiable large linear equations solve outsourcing computing scheme
A secure,efficient and verifiable outsourcing computation scheme was proposed based on the current problems of leaking users information and tampering with the calculating results,which were encountered while solving large-scale linear equations in ...
Xing-lan ZHANG,Xiang LIU
doaj +3 more sources
Secure k-Nearest Neighbor Query over Encrypted Data in Outsourced Environments [PDF]
For the past decade, query processing on relational data has been studied extensively, and many theoretical and practical solutions to query processing have been proposed under various scenarios.
Elmehdwi, Yousef +2 more
core +3 more sources
Practical Secure Computation Outsourcing [PDF]
The rapid development of cloud computing promotes a wide deployment of data and computation outsourcing to cloud service providers by resource-limited entities. Based on a pay-per-use model, a client without enough computational power can easily outsource large-scale computational tasks to a cloud. Nonetheless, the issue of security and privacy becomes
Zihao Shan +3 more
openaire +1 more source
Outsourcing Eigen-Decomposition and Singular Value Decomposition of Large Matrix to a Public Cloud
Cloud computing enables customers with limited computational resources to outsource their huge computation workloads to the cloud with massive computational power.
Lifeng Zhou, Chunguang Li
doaj +1 more source
Correctness Verifiable Outsourcing Computation Scheme of Shortest Path Querying over Encrypted Graph Data [PDF]
Mass graph data such as geolocation and social networks are widely used and contain massive privacy,usually,it requires varied query services through secure outsourcing computation schemes.However,it is still an open challenge to design correctness ...
DING Hongfa, YU Yingying, JIANG Heling
doaj +1 more source
Privacy-Preserving Outsourcing of Large-Scale Nonlinear Programming to the Cloud
The increasing massive data generated by various sources has given birth to big data analytics. Solving large-scale nonlinear programming problems (NLPs) is one important big data analytics task that has applications in many domains such as transport and
C Wang +14 more
core +1 more source
Fog Computing Over IoT: A Secure Deployment and Formal Verification
Fog computing, being an extension to cloud computing has addressed some issues found in cloud computing by providing additional features, such as location awareness, low latency, mobility support, and so on.
Samman Zahra +6 more
doaj +1 more source
Encrypt-to-Self: Securely Outsourcing Storage [PDF]
We put forward a symmetric encryption primitive tailored towards a specific application: outsourced storage. The setting assumes a memory-bounded computing device that inflates the amount of volatile or permanent memory available to it by letting other (untrusted) devices hold encryptions of information that they return on request.
Jeroen Pijnenburg, Bertram Poettering
openaire +1 more source

