Protecting genomic data analytics in the cloud: state of the art and opportunities
The outsourcing of genomic data into public cloud computing settings raises concerns over privacy and security. Significant advancements in secure computation methods have emerged over the past several years, but such techniques need to be rigorously ...
Haixu Tang +10 more
doaj +1 more source
Privacy-preserving and efficient outsourcing computation scheme for principal component analysis
Currently, the rapid development of Internet of Things (IoT) technology and the deepening digital transformation of traditional industries have driven substantial growth in the Machine Learning as a Service (MLaaS) market to meet massive data processing ...
Yan Ding, Ye Du
doaj +1 more source
Secure Outsourced Calculations with Homomorphic Encryption
With the rapid development of cloud computing, the privacy security incidents occur frequently, especially data security issues. Cloud users would like to upload their sensitive information to cloud service providers in encrypted form rather than the raw data, and to prevent the misuse of data. The main challenge is to securely process or analyze these
Wang, Qi, Zhou, Dehua, Li, Yanling
openaire +2 more sources
Secure Data Retrieval on the Cloud: Homomorphic Encryption meets Coresets
Secure report is the problem of a client that retrieves all records matching specified attributes from a database table at the server (e.g. cloud), as in SQL SELECT queries, but where the query and the database are encrypted.
Adi Akavia, Dan Feldman, Hayim Shaul
doaj +1 more source
Secret Sharing for Cloud Data Security
Cloud computing helps reduce costs, increase business agility and deploy solutions with a high return on investment for many types of applications. However, data security is of premium importance to many users and often restrains their adoption of cloud ...
Attasena, Varunya +2 more
core +1 more source
Research on efficient and secure cross-domain data sharing of IoV under blockchain architecture
To solve the problems of data disclosure, uncontrolled data access, and inefficiency of cross-domain data sharing in the Internet of vehicles (IoV), an efficient and secure cross-domain data sharing scheme of IoV under blockchain architecture was ...
Xuejiao LIU, Tiancong CAO, Yingjie XIA
doaj +2 more sources
The Accounting Industry in the Age of Globalization and Offshore Outsourcing [PDF]
The phenomenon of outsourcing has engulfed the accounting industry and offers a wide range of services from bookkeeping, accounts payable, debt collection, invoicing, to tax return preparation.
Daley, Ryan
core +1 more source
Preserving Both Privacy and Utility in Network Trace Anonymization
As network security monitoring grows more sophisticated, there is an increasing need for outsourcing such tasks to third-party analysts. However, organizations are usually reluctant to share their network traces due to privacy concerns over sensitive ...
Adam +22 more
core +1 more source
Supply Chains and Porous Boundaries: The Disaggregation of Legal Services [PDF]
The economic downturn has had significant effects on law firms, and is causing many of them to rethink some basic assumptions about how they operate. In important respects, however, the downturn has simply intensified the effects of some deeper trends ...
Heenan, Palmer T., Regan, Milton C.
core +2 more sources
Parallel Secure Outsourcing of Large-Scale Nonlinearly Constrained Nonlinear Programming Problems
Changqing Luo +5 more
semanticscholar +1 more source

