A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2020; you can also visit the original URL.
The file type is application/pdf
.
Filters
An Efficient Privacy-Preserving Outsourced Calculation Toolkit With Multiple Keys
2016
IEEE Transactions on Information Forensics and Security
In this paper, we propose a toolkit for efficient and privacy-preserving outsourced calculation under multiple encrypted keys (EPOM). ...
Last, we demonstrate the utility and the efficiency of EPOM using simulations. ...
• We build a privacy-preserving outsourced calculation toolkit of integer numbers with multiple keys. ...
doi:10.1109/tifs.2016.2573770
fatcat:uxbkur6u5rcx3o7ijyfkrfe6ca
An Efficient Privacy-Preserving Outsourced Calculation Toolkits with Multiple Keys
2017
unpublished
This paper proposes a toolkit for efficient and privacy-preserving outsourced calculation under multiple encrypted keys, which is refer as EPOM. ...
Lastly, this demonstrates the utility and the efficiency of EPOM using simulations. ...
privacy-preserving outsourced calculation under multiple encrypted keys (EPOM). ...
fatcat:kf36p6i3hzaevn5lghsnluof2q
AN EXTENSIVE STUDY TOWARDS ACHIEVING FINE GRAINED ACCESS CONTROL ON ENCRYPTED CLOUD DATA
2018
International Journal of Advanced Research in Computer Science
The proposed notion is used as key encapsulation mechanism to the data outsourced to cloud via third party application. ...
Through extensive analysis on different fine grained access control mechanism on the outsourced data, the ensemble operator model can gain significant performance to highlight the scalability and efficiency ...
An Efficient Privacy-Preserving Outsourced Calculation Toolkit with Multiple Keys In this literature, an efficient privacy Preserving Outsourced Calculation Toolkit with Multiple Keys is been analysed ...
doi:10.26483/ijarcs.v9i3.6118
fatcat:5cg7ewgzbjemtdaojlsr7mm75e
Efficient and Privacy-Preserving Outsourced Calculation of Rational Numbers
2018
IEEE Transactions on Dependable and Secure Computing
In this paper, we propose a framework for efficient and privacy-preserving outsourced calculation of rational numbers, which we refer to as POCR. ...
We present the system architecture of POCR and the associated toolkits required in the privacy preserving calculation of integers and rational numbers to ensure that commonly used outsourced operations ...
We build a privacy-preserving outsourced calculation toolkit for integer numbers. ...
doi:10.1109/tdsc.2016.2536601
fatcat:qgkune7spzf2xism3eyf4kzm5i
Secure and Evaluable Clustering based on a Multifunctional and Privacy-Preserving Outsourcing Computation Toolkit
2022
IEEE Access
To address this problem, a novel multifunctional and privacy-preserving outsourcing computation toolkit is proposed in this paper, which supports several homomorphic computing protocols including division ...
Comprehensive experiments further demonstrate the efficiency and utility of our toolkit. ...
Our toolkit is mainly based on privacy-preserving outsourcing computation framework (POCF) [5] , and we have an expansion and improvement on it. ...
doi:10.1109/access.2022.3166523
fatcat:dxpw6qgopffq7lo4f26fh65igy
A Comprehensive Survey on Secure Outsourced Computation and its Applications
2019
IEEE Access
INDEX TERMS Secure outsourced computing, privacy preserving, homomorphic encryption, secure outsourced machine learning, data processing. ...
However, data outsourcing brings security and privacy concerns to users when the cloud servers are not fully trusted. ...
[157] built a privacy-preserving outsourced calculation toolkit of integer numbers for the scenarios involving multiple data providers (DPs). ...
doi:10.1109/access.2019.2949782
fatcat:ternbyhqezgd5cvhtfqfggqdqq
A Privacy-Preserving Outsourced Data Model in Cloud Environment
[article]
2022
arXiv
pre-print
Therefore, a privacy-preserving model is proposed, which protects the privacy of the data without compromising machine learning efficiency. ...
Therefore, data security and privacy problems are among the critical hindrances to using machine learning tools, particularly with multiple data owners. ...
It also accomplishes the feed-forward and back-propagation procedure based on an effective privacy-preserving calculation toolkit in the cloud without releasing any confidentiality. ...
arXiv:2211.13542v1
fatcat:3i4meh5so5ajvecx6mhetu4jyi
Distributed Outsourced Privacy-Preserving Gradient Descent Methods among Multiple Parties
2021
Security and Communication Networks
To address the data and model's privacy mentioned above, we present two new outsourced privacy-preserving gradient descent (OPPGD) method schemes over horizontally or vertically partitioned data among ...
The data privacy and the model privacy are preserved during the whole learning and prediction procedures. ...
[36] used an efficient homomorphic encryption with multiple keys to design an outsourced privacy-preserving ID3 data mining solution. Xue et al. ...
doi:10.1155/2021/8876893
doaj:3acb0f2a817e45ae8c62c0df20d4f06d
fatcat:orumjhurmbc67hrv6lezpumd3e
Fuzzy Based Implementation of Multi - Keyword Ranked Search over Encrypted Cloud Data in Secure Cloud Environment
2017
International Journal of Scientific Research and Management
An effective method proposed for this challenging problem is privacy-preserving search over encrypted cloud data. ...
Cloud computing enables the paradigm of data outsourcing. ...
Supporting effective data search operations over outsourced cloud data in a privacy-preserving manner is another key challenge. ...
doi:10.18535/ijsrm/v5i12.06
fatcat:zqne5kvarzdw7pgeizjwbztmpm
A Survey on Identity-Based Authenticated and Efficient Traceable Search System
2018
IJARCCE
If we figure out malicious user we can efficiently revoke that user. Again if we have, flexible multiple keywords subset search pattern, which will also not affect the order of search result. ...
Secure search over encrypted remote data is crucial in cloud computing to ensure the data privacy and usability. ...
This paper proposes a toolkit for efficient and privacy-preserving outsourced calculation under multiple encrypted keys, which we refer to as EPOM. ...
doi:10.17148/ijarcce.2018.7106
fatcat:pxtkeczkrndu3j3zqkiknesure
Towards Secure Big Data Analysis via Fully Homomorphic Encryption Algorithms
2022
Entropy
Privacy-preserving techniques allow private information to be used without compromising privacy. ...
We also discuss a security framework for Big Data analysis while preserving privacy using homomorphic encryption algorithms. ...
Conclusions In this paper, we presented an overview of privacy-preserving techniques in Big Data analytics with homomorphic encryption algorithms. ...
doi:10.3390/e24040519
pmid:35455182
pmcid:PMC9024588
fatcat:2zn7e6yi45fpfdpwj6aynu5bwu
Privacy-Preserving Outsourced Calculation on Floating Point Numbers
2016
IEEE Transactions on Information Forensics and Security
We then present an approach to outsourcing floating point numbers for storage in privacy-preserving way, and securely processing commonly used floating point number operations on-the-fly. ...
In this paper, we propose a framework for privacypreserving outsourced calculation of floating point numbers, which we refer to as POCF. ...
We built toolkits to perform privacy preserving calculations to handle most commonly used integer operations, and to process outsourced FPNs numbers in a privacy-preserving way. ...
doi:10.1109/tifs.2016.2585121
fatcat:7ugnfufva5f3pj5gnphilncxqa
Verifiable privacy-preserving single-layer perceptron training scheme in cloud computing
2018
Soft Computing - A Fusion of Foundations, Methodologies and Applications
Therefore, privacy preservation for the client and verification for the returned results become two challenges to be dealt with. ...
In addition, adopting classical secure two-party computation method, we design a novel lightweight privacy-preserving predictive algorithm. ...
Compliance with ethical standards Conflict of interest All authors declare that there is no conflict of interest. ...
doi:10.1007/s00500-018-3233-7
fatcat:yuyk5az6arbijmzudy4jwpt5t4
Efficient Privacy-Preserving Scheme for Location Based Services in VANET System
2020
IEEE Access
Analysis and evaluation results demonstrate that P 2 FHE-AES scheme can preserve the privacy of the drivers' future routes in an efficient and secure way. ...
INDEX TERMS Advanced encryption standard, CloudSim, fully homomorphic encryption, LBS, MANET, NS-2, privacy-preserving, SUMO, VANET. ...
It is a toolkit supports modeling of cloud environment under single or multiple clouds. ...
doi:10.1109/access.2020.2982636
fatcat:votngx6c4fcplgco7jlphkj4s4
Cloud-ElGamal: An efficient homomorphic encryption scheme
2016
2016 International Conference on Wireless Networks and Mobile Communications (WINCOM)
Data encrypted using proposed HEE scheme, using Microsoft Azure toolkit and basic .NET package with SQL server. ...
To implement our work, column oriented database (HBase), an awesome storage explanation for NoSQL database is chosen. ...
But order preserving Encryption (OPES) is not a better solution for preserving data as it would leak information [4] . A smart model was made for the analysis outsourced software. ...
doi:10.1109/wincom.2016.7777192
dblp:conf/wincom/MakkaouiHE16
fatcat:nsl2yiozmjfjdabbfwvka6l5e4
« Previous
Showing results 1 — 15 out of 817 results