Privacy issues and protection in secure data outsourcing [PDF]
Utilizing database encryption to safeguard data in several conditions where access control is not sufficient is unavoidable. Database encryption offers an extra layer of security to traditional access control methods. It stops users that are unauthorized,
Baharun, Sabariah +3 more
core +1 more source
Correctness Verifiable Outsourcing Computation Scheme of Shortest Path Querying over Encrypted Graph Data [PDF]
Mass graph data such as geolocation and social networks are widely used and contain massive privacy,usually,it requires varied query services through secure outsourcing computation schemes.However,it is still an open challenge to design correctness ...
DING Hongfa, YU Yingying, JIANG Heling
doaj +1 more source
Privacy-Preserving Outsourcing of Large-Scale Nonlinear Programming to the Cloud
The increasing massive data generated by various sources has given birth to big data analytics. Solving large-scale nonlinear programming problems (NLPs) is one important big data analytics task that has applications in many domains such as transport and
C Wang +14 more
core +1 more source
Secure Outsourcing Evaluation for Sparse Decision Trees
Decision tree classifiers are pervasively applied in a wide range of areas, such as healthcare, credit-risk assessment, spam detection, and many more. To ensure effectiveness and efficiency, clients usually choose to adopt classification services that ...
Zhixiang Zhang +4 more
semanticscholar +1 more source
Secure Outsourcing and Sharing of Cloud Data Using a User-Side Encrypted File System
Cloud computing is an emerging paradigm that aims to provide computing resources, massive data storage capacity and, flexible data sharing services. The explosive growth of data produced persuade business and users, driven by the cloud-top features, to ...
O. A. Khashan
semanticscholar +1 more source
Fog Computing Over IoT: A Secure Deployment and Formal Verification
Fog computing, being an extension to cloud computing has addressed some issues found in cloud computing by providing additional features, such as location awareness, low latency, mobility support, and so on.
Samman Zahra +6 more
doaj +1 more source
k-Nearest Neighbor Classification over Semantically Secure Encrypted Relational Data [PDF]
Data Mining has wide applications in many areas such as banking, medicine, scientific research and among government agencies. Classification is one of the commonly used tasks in data mining applications.
Elmehdwi, Yousef +2 more
core +3 more sources
Encrypt-to-Self: Securely Outsourcing Storage [PDF]
We put forward a symmetric encryption primitive tailored towards a specific application: outsourced storage. The setting assumes a memory-bounded computing device that inflates the amount of volatile or permanent memory available to it by letting other (untrusted) devices hold encryptions of information that they return on request.
Jeroen Pijnenburg, Bertram Poettering
openaire +1 more source
SOFIR: Securely outsourced Forensic image recognition [PDF]
Forensic image recognition tools are used by law enforcement agencies all over the world to automatically detect illegal images on confiscated equipment. This detection is commonly done with the help of a strictly confidential database consisting of hash values of known illegal images.
Bösch, C.T. +3 more
openaire +1 more source
A Lightweight Privacy-Preserving Protocol for VANETs Based on Secure Outsourcing Computing
In the VANET systems, the leakage of some sensitive data or communication information will cause heavy losses for life and property. Then, a higher security level is required in the VANET systems.
Zhijun Wei +3 more
semanticscholar +1 more source

