Results 31 to 40 of about 79,561 (230)

Privacy issues and protection in secure data outsourcing [PDF]

open access: yes, 2014
Utilizing database encryption to safeguard data in several conditions where access control is not sufficient is unavoidable. Database encryption offers an extra layer of security to traditional access control methods. It stops users that are unauthorized,
Baharun, Sabariah   +3 more
core   +1 more source

Correctness Verifiable Outsourcing Computation Scheme of Shortest Path Querying over Encrypted Graph Data [PDF]

open access: yesJisuanji kexue
Mass graph data such as geolocation and social networks are widely used and contain massive privacy,usually,it requires varied query services through secure outsourcing computation schemes.However,it is still an open challenge to design correctness ...
DING Hongfa, YU Yingying, JIANG Heling
doaj   +1 more source

Privacy-Preserving Outsourcing of Large-Scale Nonlinear Programming to the Cloud

open access: yes, 2018
The increasing massive data generated by various sources has given birth to big data analytics. Solving large-scale nonlinear programming problems (NLPs) is one important big data analytics task that has applications in many domains such as transport and
C Wang   +14 more
core   +1 more source

Secure Outsourcing Evaluation for Sparse Decision Trees

open access: yesIEEE Transactions on Dependable and Secure Computing
Decision tree classifiers are pervasively applied in a wide range of areas, such as healthcare, credit-risk assessment, spam detection, and many more. To ensure effectiveness and efficiency, clients usually choose to adopt classification services that ...
Zhixiang Zhang   +4 more
semanticscholar   +1 more source

Secure Outsourcing and Sharing of Cloud Data Using a User-Side Encrypted File System

open access: yesIEEE Access, 2020
Cloud computing is an emerging paradigm that aims to provide computing resources, massive data storage capacity and, flexible data sharing services. The explosive growth of data produced persuade business and users, driven by the cloud-top features, to ...
O. A. Khashan
semanticscholar   +1 more source

Fog Computing Over IoT: A Secure Deployment and Formal Verification

open access: yesIEEE Access, 2017
Fog computing, being an extension to cloud computing has addressed some issues found in cloud computing by providing additional features, such as location awareness, low latency, mobility support, and so on.
Samman Zahra   +6 more
doaj   +1 more source

k-Nearest Neighbor Classification over Semantically Secure Encrypted Relational Data [PDF]

open access: yes, 2014
Data Mining has wide applications in many areas such as banking, medicine, scientific research and among government agencies. Classification is one of the commonly used tasks in data mining applications.
Elmehdwi, Yousef   +2 more
core   +3 more sources

Encrypt-to-Self: Securely Outsourcing Storage [PDF]

open access: yes, 2020
We put forward a symmetric encryption primitive tailored towards a specific application: outsourced storage. The setting assumes a memory-bounded computing device that inflates the amount of volatile or permanent memory available to it by letting other (untrusted) devices hold encryptions of information that they return on request.
Jeroen Pijnenburg, Bertram Poettering
openaire   +1 more source

SOFIR: Securely outsourced Forensic image recognition [PDF]

open access: yes2014 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), 2014
Forensic image recognition tools are used by law enforcement agencies all over the world to automatically detect illegal images on confiscated equipment. This detection is commonly done with the help of a strictly confidential database consisting of hash values of known illegal images.
Bösch, C.T.   +3 more
openaire   +1 more source

A Lightweight Privacy-Preserving Protocol for VANETs Based on Secure Outsourcing Computing

open access: yesIEEE Access, 2019
In the VANET systems, the leakage of some sensitive data or communication information will cause heavy losses for life and property. Then, a higher security level is required in the VANET systems.
Zhijun Wei   +3 more
semanticscholar   +1 more source

Home - About - Disclaimer - Privacy