Outsourcing home network security [PDF]
The growth of home and small enterprise networks brings with it a large number of devices and networks that are either managed poorly or not at all. Hosts on these networks may become compromised and become sources of spam, denial-of-service traffic, or the site of a scam or phishing attack site.
openaire +1 more source
SensorCloud: Towards the Interdisciplinary Development of a Trustworthy Platform for Globally Interconnected Sensors and Actuators [PDF]
Although Cloud Computing promises to lower IT costs and increase users' productivity in everyday life, the unattractive aspect of this new technology is that the user no longer owns all the devices which process personal data.
Eggert, Michael +9 more
core +2 more sources
Faster Homomorphic Trace-Type Function Evaluation
Homomorphic encryption enables computations over encrypted data without decryption, and can be used for outsourcing computations to some untrusted source.
Yu Ishimaki, Hayato Yamana
doaj +1 more source
Comment on "Efficient and Secure Outsourcing Scheme for RSA Decryption in Internet of Things"
Internet-of-Things (IoT) devices have grown in popularity over the past few years. The RSA public-key cryptographic primitive is time consuming for resource-constrained IoT. Recently, Zhang et al.
Damien Vergnaud
semanticscholar +1 more source
Secure Outsourcing Algorithm of BTC Feature Extraction in Cloud Computing
Advances in cloud computing have aroused many researchers’ interest in privacy-preserving feature extraction over outsourced multimedia data, especially private image data. Since block truncation coding (BTC) is known as a simple and efficient technology
Mingfang Jiang, Hengfu Yang
semanticscholar +1 more source
A Framework for Outsourcing of Secure Computation [PDF]
We study the problem of how to efficiently outsource a sensitive computation on secret inputs to a number of untrusted workers, under the assumption that at least one worker is honest.In our setting there is a number of clients C_1,…,Cn with inputs x1,…,xn. The clients want to delegate a secure computation of f(x1,…,xn) to a set of untrusted workers W1,
Thomas P. Jakobsen +2 more
openaire +1 more source
Handling Confidential Data on the Untrusted Cloud: An Agent-based Approach [PDF]
Cloud computing allows shared computer and storage facilities to be used by a multitude of clients. While cloud management is centralized, the information resides in the cloud and information sharing can be implemented via off-the-shelf techniques for ...
Damiani, Ernesto, Pagano, Francesco
core +1 more source
E-SC: Collusion-Resistant Secure Outsourcing of Sequence Comparison Algorithm
The sequence comparison of large-scale string-typed data is fundamental in computer science and other computational disciplines. Its development has been promoted into an emerging outsourcing service by the almost unlimited powerful computing and storage
Xiaofei Wang, Yuqing Zhang
doaj +1 more source
Secure data outsourcing in presence of the inference problem: issues and directions
With the emergence of cloud computing paradigms, secure data outsourcing has become one of the crucial challenges which strongly imposes itself. Data owners place their data among cloud service providers in order to increase flexibility, optimize storage,
Adel Jebali +2 more
doaj +1 more source
Secure Cloud-Aided Approximate Nearest Neighbor Search on High-Dimensional Data
As one fundamental data-mining problem, ANN (approximate nearest neighbor search) is widely used in many industries including computer vision, information retrieval, and recommendation system.
Jia Liu +7 more
doaj +1 more source

