Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Filters








817 Hits in 5.9 sec

An Efficient Privacy-Preserving Outsourced Calculation Toolkit With Multiple Keys

Ximeng Liu, Robert H. Deng, Kim-Kwang Raymond Choo, Jian Weng
2016 IEEE Transactions on Information Forensics and Security  
In this paper, we propose a toolkit for efficient and privacy-preserving outsourced calculation under multiple encrypted keys (EPOM).  ...  Last, we demonstrate the utility and the efficiency of EPOM using simulations.  ...  • We build a privacy-preserving outsourced calculation toolkit of integer numbers with multiple keys.  ... 
doi:10.1109/tifs.2016.2573770 fatcat:uxbkur6u5rcx3o7ijyfkrfe6ca

An Efficient Privacy-Preserving Outsourced Calculation Toolkits with Multiple Keys

P Vinoth Kumar, G Kannabiran, M Tech
2017 unpublished
This paper proposes a toolkit for efficient and privacy-preserving outsourced calculation under multiple encrypted keys, which is refer as EPOM.  ...  Lastly, this demonstrates the utility and the efficiency of EPOM using simulations.  ...  privacy-preserving outsourced calculation under multiple encrypted keys (EPOM).  ... 
fatcat:kf36p6i3hzaevn5lghsnluof2q

AN EXTENSIVE STUDY TOWARDS ACHIEVING FINE GRAINED ACCESS CONTROL ON ENCRYPTED CLOUD DATA

M. Amsaveni
2018 International Journal of Advanced Research in Computer Science  
The proposed notion is used as key encapsulation mechanism to the data outsourced to cloud via third party application.  ...  Through extensive analysis on different fine grained access control mechanism on the outsourced data, the ensemble operator model can gain significant performance to highlight the scalability and efficiency  ...  An Efficient Privacy-Preserving Outsourced Calculation Toolkit with Multiple Keys In this literature, an efficient privacy Preserving Outsourced Calculation Toolkit with Multiple Keys is been analysed  ... 
doi:10.26483/ijarcs.v9i3.6118 fatcat:5cg7ewgzbjemtdaojlsr7mm75e

Efficient and Privacy-Preserving Outsourced Calculation of Rational Numbers

Ximeng Liu, Kim-Kwang Raymond Choo, Robert H. Deng, Rongxing Lu, Jian Weng
2018 IEEE Transactions on Dependable and Secure Computing  
In this paper, we propose a framework for efficient and privacy-preserving outsourced calculation of rational numbers, which we refer to as POCR.  ...  We present the system architecture of POCR and the associated toolkits required in the privacy preserving calculation of integers and rational numbers to ensure that commonly used outsourced operations  ...  We build a privacy-preserving outsourced calculation toolkit for integer numbers.  ... 
doi:10.1109/tdsc.2016.2536601 fatcat:qgkune7spzf2xism3eyf4kzm5i

Secure and Evaluable Clustering based on a Multifunctional and Privacy-Preserving Outsourcing Computation Toolkit

Jialin Li, Penghao Lu, Xuemin Lin.
2022 IEEE Access  
To address this problem, a novel multifunctional and privacy-preserving outsourcing computation toolkit is proposed in this paper, which supports several homomorphic computing protocols including division  ...  Comprehensive experiments further demonstrate the efficiency and utility of our toolkit.  ...  Our toolkit is mainly based on privacy-preserving outsourcing computation framework (POCF) [5] , and we have an expansion and improvement on it.  ... 
doi:10.1109/access.2022.3166523 fatcat:dxpw6qgopffq7lo4f26fh65igy

A Comprehensive Survey on Secure Outsourced Computation and its Applications

Yang Yang, Xindi Huang, XiMeng Liu, Hongju Cheng, Jian Weng, Xiangyang Luo, Victor Chang
2019 IEEE Access  
INDEX TERMS Secure outsourced computing, privacy preserving, homomorphic encryption, secure outsourced machine learning, data processing.  ...  However, data outsourcing brings security and privacy concerns to users when the cloud servers are not fully trusted.  ...  [157] built a privacy-preserving outsourced calculation toolkit of integer numbers for the scenarios involving multiple data providers (DPs).  ... 
doi:10.1109/access.2019.2949782 fatcat:ternbyhqezgd5cvhtfqfggqdqq

A Privacy-Preserving Outsourced Data Model in Cloud Environment [article]

Rishabh Gupta, Ashutosh Kumar Singh
2022 arXiv   pre-print
Therefore, a privacy-preserving model is proposed, which protects the privacy of the data without compromising machine learning efficiency.  ...  Therefore, data security and privacy problems are among the critical hindrances to using machine learning tools, particularly with multiple data owners.  ...  It also accomplishes the feed-forward and back-propagation procedure based on an effective privacy-preserving calculation toolkit in the cloud without releasing any confidentiality.  ... 
arXiv:2211.13542v1 fatcat:3i4meh5so5ajvecx6mhetu4jyi

Distributed Outsourced Privacy-Preserving Gradient Descent Methods among Multiple Parties

Zuowen Tan, Haohan Zhang, Peiyi Hu, Rui Gao
2021 Security and Communication Networks  
To address the data and model's privacy mentioned above, we present two new outsourced privacy-preserving gradient descent (OPPGD) method schemes over horizontally or vertically partitioned data among  ...  The data privacy and the model privacy are preserved during the whole learning and prediction procedures.  ...  [36] used an efficient homomorphic encryption with multiple keys to design an outsourced privacy-preserving ID3 data mining solution. Xue et al.  ... 
doi:10.1155/2021/8876893 doaj:3acb0f2a817e45ae8c62c0df20d4f06d fatcat:orumjhurmbc67hrv6lezpumd3e

Fuzzy Based Implementation of Multi - Keyword Ranked Search over Encrypted Cloud Data in Secure Cloud Environment

Gladiss Merlin. N
2017 International Journal of Scientific Research and Management  
An effective method proposed for this challenging problem is privacy-preserving search over encrypted cloud data.  ...  Cloud computing enables the paradigm of data outsourcing.  ...  Supporting effective data search operations over outsourced cloud data in a privacy-preserving manner is another key challenge.  ... 
doi:10.18535/ijsrm/v5i12.06 fatcat:zqne5kvarzdw7pgeizjwbztmpm

A Survey on Identity-Based Authenticated and Efficient Traceable Search System

Shital Khandare, Prof.H.A. Hingoliwala
2018 IJARCCE  
If we figure out malicious user we can efficiently revoke that user. Again if we have, flexible multiple keywords subset search pattern, which will also not affect the order of search result.  ...  Secure search over encrypted remote data is crucial in cloud computing to ensure the data privacy and usability.  ...  This paper proposes a toolkit for efficient and privacy-preserving outsourced calculation under multiple encrypted keys, which we refer to as EPOM.  ... 
doi:10.17148/ijarcce.2018.7106 fatcat:pxtkeczkrndu3j3zqkiknesure

Towards Secure Big Data Analysis via Fully Homomorphic Encryption Algorithms

Rafik Hamza, Alzubair Hassan, Awad Ali, Mohammed Bakri Bashir, Samar M. Alqhtani, Tawfeeg Mohmmed Tawfeeg, Adil Yousif
2022 Entropy  
Privacy-preserving techniques allow private information to be used without compromising privacy.  ...  We also discuss a security framework for Big Data analysis while preserving privacy using homomorphic encryption algorithms.  ...  Conclusions In this paper, we presented an overview of privacy-preserving techniques in Big Data analytics with homomorphic encryption algorithms.  ... 
doi:10.3390/e24040519 pmid:35455182 pmcid:PMC9024588 fatcat:2zn7e6yi45fpfdpwj6aynu5bwu

Privacy-Preserving Outsourced Calculation on Floating Point Numbers

Ximeng Liu, Robert H. Deng, Wenxiu Ding, Rongxing Lu, Baodong Qin
2016 IEEE Transactions on Information Forensics and Security  
We then present an approach to outsourcing floating point numbers for storage in privacy-preserving way, and securely processing commonly used floating point number operations on-the-fly.  ...  In this paper, we propose a framework for privacypreserving outsourced calculation of floating point numbers, which we refer to as POCF.  ...  We built toolkits to perform privacy preserving calculations to handle most commonly used integer operations, and to process outsourced FPNs numbers in a privacy-preserving way.  ... 
doi:10.1109/tifs.2016.2585121 fatcat:7ugnfufva5f3pj5gnphilncxqa

Verifiable privacy-preserving single-layer perceptron training scheme in cloud computing

Xiaoyu Zhang, Xiaofeng Chen, Jianfeng Wang, Zhihui Zhan, Jin Li
2018 Soft Computing - A Fusion of Foundations, Methodologies and Applications  
Therefore, privacy preservation for the client and verification for the returned results become two challenges to be dealt with.  ...  In addition, adopting classical secure two-party computation method, we design a novel lightweight privacy-preserving predictive algorithm.  ...  Compliance with ethical standards Conflict of interest All authors declare that there is no conflict of interest.  ... 
doi:10.1007/s00500-018-3233-7 fatcat:yuyk5az6arbijmzudy4jwpt5t4

Efficient Privacy-Preserving Scheme for Location Based Services in VANET System

Fifi Farouk, Yasmin Alkady, Rawya Rizk
2020 IEEE Access  
Analysis and evaluation results demonstrate that P 2 FHE-AES scheme can preserve the privacy of the drivers' future routes in an efficient and secure way.  ...  INDEX TERMS Advanced encryption standard, CloudSim, fully homomorphic encryption, LBS, MANET, NS-2, privacy-preserving, SUMO, VANET.  ...  It is a toolkit supports modeling of cloud environment under single or multiple clouds.  ... 
doi:10.1109/access.2020.2982636 fatcat:votngx6c4fcplgco7jlphkj4s4

Cloud-ElGamal: An efficient homomorphic encryption scheme

Khalid El Makkaoui, Abderrahim Beni-Hssane, Abdellah Ezzati
2016 2016 International Conference on Wireless Networks and Mobile Communications (WINCOM)  
Data encrypted using proposed HEE scheme, using Microsoft Azure toolkit and basic .NET package with SQL server.  ...  To implement our work, column oriented database (HBase), an awesome storage explanation for NoSQL database is chosen.  ...  But order preserving Encryption (OPES) is not a better solution for preserving data as it would leak information [4] . A smart model was made for the analysis outsourced software.  ... 
doi:10.1109/wincom.2016.7777192 dblp:conf/wincom/MakkaouiHE16 fatcat:nsl2yiozmjfjdabbfwvka6l5e4
« Previous Showing results 1 — 15 out of 817 results