Filters








884 Hits in 3.3 sec

Computation on Encrypted Data using Dataflow Authentication

Andreas Fischer, Benny Fuhry, Florian Kerschbaum, Eric Bodden
2020 Proceedings on Privacy Enhancing Technologies  
Encrypting data before sending it to the cloud protects it against attackers, but requires the cloud to compute on encrypted data.  ...  Yet current approaches do not support programs making control-flow decisions based on encrypted data. We introduce the concept of dataflow authentication (DFAuth) to enable such programs.  ...  -We implemented and evaluated a bytecode-tobytecode program transformation for computation on encrypted data using dataflow authentication.  ... 
doi:10.2478/popets-2020-0002 dblp:journals/popets/0011FKB20 fatcat:v6amp7ja7jfh3asee7lfeugeya

Developing an Integrated Cloud-based Framework for Securing Dataflow of Wireless Sensors

Habibah AL-Harbi, Khalil H., Ibrahim S.
2019 International Journal of Advanced Computer Science and Applications  
This paper proposes a framework to secure the dataflow of sensor devices from wireless sensor networks to cloud computing using an integrated environment.  ...  Integrating wireless sensor networks with cloud computing can overcome these problems. Cloud computing provides a more secure and high available platform for effective management of sensor data.  ...  Upon the reception of the encrypted data at cloud computing, the data is decrypted using the same symmetric encryption.  ... 
doi:10.14569/ijacsa.2019.0100715 fatcat:nmnuouousvaj7at6tspfzpj3gu

A Study on Secure Medical-Contents Strategies with DRM Based on Cloud Computing

Hoon Ko, Libor Měsíček, Jongsun Choi, Seogchan Hwang
2018 Journal of Healthcare Engineering  
The measured information is saved to a server in a medical center, and the server keeps the medical information, which also involves personal information, on a cloud system.  ...  The server and network devices are used by connecting each other, and sensitive medical records are dealt with remotely.  ...  (v) Authenticated dataflow compromised: an attacker can read or modify data transmitted over an authenticated dataflow. Solution.  ... 
doi:10.1155/2018/6410180 pmid:29796233 pmcid:PMC5896203 fatcat:yu73kaapsjfzzdnktrhxivnf4y

Advances in High Performance Computing and Related Issues

Veljko Milutinović, Borko Furht, Zoran Obradović, Nenad Korolija
2016 Mathematical Problems in Engineering  
For CPU-demanding and data-demanding applications, one can design data flow and program a dataflow computer accordingly.  ...  Mihaljević et al. proposes an encryption/decryption approach dedicated to a one-way communication between a transmitter which is a computationally powerful party and a receiver with limited computational  ... 
doi:10.1155/2016/2632306 fatcat:awr4zty7mvdb5lot735sbyiaiy

Towards secure dataflow processing in open distributed systems

Juan Du, Wei Wei, Xiaohui Gu, Ting Yu
2009 Proceedings of the 2009 ACM workshop on Scalable trusted computing - STC '09  
We have implemented a prototype of the secure dataflow processing framework and tested it on the PlanetLab testbed.  ...  In this paper, we present the design and implementation of a new secure dataflow processing system that aims at providing trustworthy continuous data processing in multi-party open distributed systems.  ...  By "data-centric", we mean that our scheme focuses on protecting and verifying the authenticity of data processing results because dataflow users are only concerned about the correctness of final data  ... 
doi:10.1145/1655108.1655120 dblp:conf/ccs/DuWGY09 fatcat:szodbyx7zzaotfqo3rvhmoylia

Benchmarking Fast-Data Platforms for the Aadhaar Biometric Database [chapter]

Yogesh Simmhan, Anshu Shukla, Arun Verma
2016 Lecture Notes in Computer Science  
critical Big Data applications,with large volumes and high velocity of data.  ...  as residents are enrolled and updated.Besides 1 million enrolments and updates per day,up to 100 million daily biometric authentications are expected during delivery of various public services.These form  ...  The packets remain encrypted right after data collection, stay encrypted on the network and on disk, and are decrypted in-memory, just in time, during data insertions or queries.  ... 
doi:10.1007/978-3-319-49748-8_2 fatcat:jlpwka5c5rgexdhikofkgjtnpi

Page 456 of Energy Research Abstracts Vol. 15, Issue 5 [page]

1990 Energy Research Abstracts  
The second is the use of higher speed interconnects between computers (allowing more data to be delivered to the processors). The third is the use of larger programs running in the computers.  ...  Related studies on the subject of electronic signatures and text authentication using public key en- cryption have been done within the Department of Energy.  ... 

Architectural support for fast symmetric-key cryptography

Jerome Burke, John McDonald, Todd Austin
2000 SIGARCH Computer Architecture News  
Overall throughput on a high-end microprocessor is quite poor, a 600 Mhz processor is incapable of saturating a T3 communication line with 3DES (triple DES) encrypted data.  ...  Eight popular strong encryption algorithms are examined in detail. Analysis reveals the algorithms are computationally complex and contain little parallelism.  ...  Acknowledgements We are grateful to Phil Yeh and the anonymous referees for their comments on earlier versions of this work.  ... 
doi:10.1145/378995.379238 fatcat:a6oztrb7tbddln6nznbbdzxmda

Architectural support for fast symmetric-key cryptography

Jerome Burke, John McDonald, Todd Austin
2000 SIGPLAN notices  
Overall throughput on a high-end microprocessor is quite poor, a 600 Mhz processor is incapable of saturating a T3 communication line with 3DES (triple DES) encrypted data.  ...  Eight popular strong encryption algorithms are examined in detail. Analysis reveals the algorithms are computationally complex and contain little parallelism.  ...  Acknowledgements We are grateful to Phil Yeh and the anonymous referees for their comments on earlier versions of this work.  ... 
doi:10.1145/356989.357006 fatcat:nwovrdsbmrhr5caiyezlxlv5ui

Architectural support for fast symmetric-key cryptography

Jerome Burke, John McDonald, Todd Austin
2000 ACM SIGOPS Operating Systems Review  
Overall throughput on a high-end microprocessor is quite poor, a 600 Mhz processor is incapable of saturating a T3 communication line with 3DES (triple DES) encrypted data.  ...  Eight popular strong encryption algorithms are examined in detail. Analysis reveals the algorithms are computationally complex and contain little parallelism.  ...  Acknowledgements We are grateful to Phil Yeh and the anonymous referees for their comments on earlier versions of this work.  ... 
doi:10.1145/384264.379238 fatcat:q22e2dl5jbap7hkmupudtq6wvi

Architectural support for fast symmetric-key cryptography

Jerome Burke, John McDonald, Todd Austin
2000 Proceedings of the ninth international conference on Architectural support for programming languages and operating systems - ASPLOS-IX  
Overall throughput on a high-end microprocessor is quite poor, a 600 Mhz processor is incapable of saturating a T3 communication line with 3DES (triple DES) encrypted data.  ...  Eight popular strong encryption algorithms are examined in detail. Analysis reveals the algorithms are computationally complex and contain little parallelism.  ...  Acknowledgements We are grateful to Phil Yeh and the anonymous referees for their comments on earlier versions of this work.  ... 
doi:10.1145/378993.379238 fatcat:wvzl5bujtvdy5jmevhltqluqvy

SECURE AND COST EFFICIENT IMPLEMENTATION OF THE MOBILE COMPUTING USING OFFLOADING TECHNIQUE

Abul Bashar
2019 Journal of Information Technology and Digital World  
So the paper proposes a secure and cost efficient data offloading technique for the mobile computing to make it safe, secure with an effective management of network traffic.  ...  The offloading techniques enhance the competence of the mobile computing by reducing the congestion in the network caused by increased number of users and the enormous data traffic experienced.  ...  So the paper puts forward a secure way of offloading utilizing the advanced encryption standard for the encrypting of the data being offloaded and uses the whale optimization in the optimal key selection  ... 
doi:10.36548/jitdw.2019.1.006 fatcat:o7ehzg5e45gvrn6r23bku6wjou

Proceedings for ICPS:2006 International Conference on Pervasive Services

2006 2006 ACS/IEEE International Conference on Pervasive Services  
Grid5000 is an experimental platform for grid computing When using data encryption, the problem arises of how research that is not making any assumption on the middle- to make it  ...  Roch, “A check- 3) The controller submits to the storage grid the meta-data point/recovery model for heterogeneous dataflow computations using  ... 
doi:10.1109/perser.2006.1652198 fatcat:y2ecj26gozebzgguoe4txi6ggy

Secure computing with the MPEG RVC framework

Junaid Jameel Ahmad, Shujun Li, Richard Thavot, Marco Mattavelli
2013 Signal processing. Image communication  
A security protocol for mutual authentication was also implemented to demonstrate how one can build heterogeneous systems easily with RVC.  ...  Our study has shown that RVC can be used as a general purpose implementation independent development framework for diverse data driven applications with different complexities.  ...  The MPEG RVC framework is based on the asynchronous dataflow programming paradigm [4] and adopts a computation model defined by the formal language used to express the dataflow program [5] .  ... 
doi:10.1016/j.image.2013.08.015 fatcat:rn5trshixfccxnm5bjl7jxxfmu

Web-based secure high performance remote visualization

R J Vickery, A Cedilnik, J P Martin, Y Dandass, T Atkison, R J Moorhead, J Clarke, P Adams
2006 Journal of Physics, Conference Series  
This paper describes recent work on securing a Web-browser-based remote visualization capability for large datasets. The results from a security performance study are presented.  ...  The pvee-krb-auth program and computes the MD5 hash of the cookie data (i.e., the encrypted TGT). The hash is used to lookup the decryption key from the database on the Web server machine.  ...  Kerberos Authentication Dataflow This section describes the process of mutually authenticating PVEE users and PVEE servers (see Figure 4 ): The client uses a browser to connect to the PVEE Web server  ... 
doi:10.1088/1742-6596/46/1/075 fatcat:43hnudm73jhw3i4sx4z5osdary
« Previous Showing results 1 — 15 out of 884 results