A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2012; you can also visit the original URL.
The file type is application/pdf
.
Filters
ENCRYPTED DOMAIN PROCESSING FOR CLOUD PRIVACY - Concept and Practical Experience
english
2011
Proceedings of the 1st International Conference on Cloud Computing and Services Science
unpublished
english
In some applications, in which all processing takes place at the client side and the Cloud simply handles data storage (e.g. Google Docs), on-line data encryption/decryption guarantees privacy. ...
Cloud security comprises access control and end-to-end security based on flow or message-level privacy. ...
-00010) of the CONSOLIDER-INGENIO 2010 Program; and by the Spanish Ministry of Science and Innovation FPU grant AP2006-02580. ...
doi:10.5220/0003380905910596
fatcat:y6khdyilqzbhtazhf7qatwk6p4
EXPERIMENTAL STUDY ON CLOUD SECURITY FOR PERSONAL HEALTH RECORDS OVER PATIENT CENTRIC DATA
2019
INTERNATIONAL JOURNAL OF COMPUTER ENGINEERING & TECHNOLOGY
In this paper for achieving grant and revoke privileges over encrypted data Timestamp server is introduced. ...
In order to provide security for owner health records ABE (attribute-based encryption) is best suitable for other encryption techniques. ...
to privacy he conjointly encrypts the keywords and he can transfer to the cloud. ...
doi:10.34218/ijcet.10.1.2019.009
fatcat:7lou2qxkhvduzip7dzdlpqklsa
Privacy-enabled remote health monitoring applications for resource constrained wearable devices
2016
Proceedings of the 31st Annual ACM Symposium on Applied Computing - SAC '16
In this paper, we present and evaluate a practical smartwatch based lifelog application for diabetics that leverages the cloud and homomorphic encryption for caregivers to analyze blood glucose, insulin ...
Although these technologies can significantly complement resource constrained mobile and wearable devices to store and process personal health information, privacy concerns are keeping patients from reaping ...
Acknowledgment This research is partially funded by the Research Fund KU Leuven and the ICON funding programme of iMinds. ...
doi:10.1145/2851613.2851683
dblp:conf/sac/PreuveneersJ16
fatcat:ezzie76u4vdszcv2itzpdzvlim
Improved Privacy Preserving Through Random Pixel Shifting Method RPSM in Cloud
2018
International Journal of Trend in Scientific Research and Development
In this method perform image encryption and decryption technique that is based prime number key. This proposed method use random pixel shifting method for image encryption. ...
The proposed novel approach shows better result as compare other method in terms of encryption and decryption of secure image. ...
Data utilization practice deteriorates users' personal privacy and it increases the legislation pressures and criticism. ...
doi:10.31142/ijtsrd18788
fatcat:sgit3g2b7rfjfg44xawuzb2t2y
Private VNFs for collaborative multi-operator service delivery: An architectural case
2016
NOMS 2016 - 2016 IEEE/IFIP Network Operations and Management Symposium
Specifically, we show the promise of homomorphic encryption (HE) in this context and its performance limitations through a proof of concept implementation of an image transcoder network function. ...
Owing to the (partial lack of) contractual relationships and co-opetition in the ecosystem, the privacy of user data, operator policy and even VNF code could be compromised. ...
Of these, homomorphic encryption is the appropriate choice when private data is sent to the cloud for processing and should be returned to users for decrypting after processing has taken place. ...
doi:10.1109/noms.2016.7502996
dblp:conf/noms/BiczokSBB16
fatcat:x42zasxsdbfibkplqa4s7z5lsu
A Bigdata Process for Practical Privacy-Preserving Utilizing k-Means Clustering
2019
International Journal of Engineering and Advanced Technology
To overcome such security issues cryptographic concepts have been used in this paper to provide high security of big data's with the low consumption of time for both encryption and decryption process. ...
Now a day's privacy preservation is the big issue on growing big data in various field such as medical, engineering and physical with the fast growing network. ...
But this DPQR handles only Boolean data and not found suitable for numerical and other types of data. Zhu et al., (2016) proposed a practical privacy preserving frame work called eDiag. ...
doi:10.35940/ijeat.b4085.129219
fatcat:gfn3raadqvfgnfaredmjhuk5km
Identity management in GRID computing and Service Oriented Architectures: research and practice
2009
Identity in the Information Society
Within this context, security and privacy requirements have become of great importance, as well the need for flexible and efficient identity management. ...
Today, Service-Oriented Architecture (SOA) and Grid and Cloud computing comprise the key technologies in distributed systems. ...
the original author(s) and source are credited. ...
doi:10.1007/s12394-010-0040-4
fatcat:j7xuusvm2bc2hanf4rkeayyanm
Federated Transfer Learning: concept and applications
[article]
2021
arXiv
pre-print
In more details, we study the background of FTL and its different existing applications. We further analyze FTL from privacy and machine learning perspective. ...
Among different variants of the federated learning, noteworthy is federated transfer learning (FTL) that allows knowledge to be transferred across domains that do not have many overlapping features and ...
In this work, we analyzed the concept of FTL and its applications in several practical domains. Furthermore, we did a detailed review of the machine learning techniques used in FTL. ...
arXiv:2010.15561v3
fatcat:3udixrhta5btlb7w7r4fomwpzu
Securing the e-health cloud
2010
Proceedings of the ACM international conference on Health informatics - IHI '10
To fill this gap, we present a security architecture for establishing privacy domains in e-health infrastructures. ...
Moreover, we discuss further open problems and research challenges on security, privacy and usability of e-health cloud systems. ...
., cloud computing) and other services (e.g., billing processing and accounting for medical practices) leads to a complex system where privacy-sensitive data are stored and processed at many different ...
doi:10.1145/1882992.1883024
dblp:conf/ihi/LohrSW10
fatcat:wllmswats5enzihifeuhim2onu
Survey on Homomorphic Encryption and Address of New Trend
2020
International Journal of Advanced Computer Science and Applications
This article aims to introduce a literature survey to close the gap in homomorphic encryption systems and their applications in the protection of privacy. ...
Homomorphic encryption is one of the most important encryption-related processes which allows performing operation over encrypted data. ...
Finally more work is needed to apply the concept of homomorphic encryption for cloud environment. ...
doi:10.14569/ijacsa.2020.0110774
fatcat:f27kc4abbbbmddnjmwlz3ijmyu
Identity Management in Cloud Computing
2013
International Journal of Computer Applications
The various security issues are attracting attention, one of which is identity and privacy of the cloud user. ...
We present an analysis of various identity management systems and proposing a simple trust based scheme for a cloud computing application and service. ...
The concept of virtual reality is used for privacy and to minimize the impact of data breaches. ...
doi:10.5120/10509-5467
fatcat:qbui7ui4erevldbiwb5sngro6q
Privacy Protection and Data Security in Cloud Computing: A Survey, Challenges and Solutions
2019
IEEE Access
First, we discuss the architecture, concepts and several shortcomings of cloud computing, and propose a framework of privacy protection; second, we discuss and analyze basic ABE, KP-ABE (key policy attribute-based ...
cloud computing; finally, we point out corresponding privacy protection laws to make up for the technical deficiencies. ...
Mobile cloud involves a large number of task allocations in the scheduling process. How to solve the contradiction between cloud user privacy and task allocation is a challenge for mobile cloud. ...
doi:10.1109/access.2019.2946185
fatcat:tbg5a25f5rd3je4mogemegrvje
A Secured Data Processing Technique for Effective Utilization of Cloud Computing
2018
Journal of Data Mining and Digital Humanities
Recently, various solutions have been suggested tosecure data processing in cloud environement. ...
Specifically, security is the majorfactor hindering the widespread acceptance of this new concept. As a case study, we review the use ofcloud computing to process digital images safely. ...
However, homomorphic encryption is too slow for most practical applications that require complex image processing operations. ...
doi:10.46298/jdmdh.4085
fatcat:hbvlhd6bk5ghvhn6exdmdn6xsa
Improved Searchable Encryption via Conglomerate Keys in Federated Cloud Storage
2016
Indian Journal of Science and Technology
Objectives: Cloud computing is the sort of computing process that shares the data and its resources in the Internet. ...
Findings: By reducing the count of trapdoor function to cloud data from the multi-user, an effective search over the encrypted data is performed. ...
In 12 enhanced the HABE concept by the re-encryption process. ...
doi:10.17485/ijst/2016/v9i42/97522
fatcat:tgtj7uffh5bwzpyign7qyb5cse
An Efficient File Hierarchy based E-System with Clinical Document Architecture in Cloud Computing
2018
International Journal of Trend in Scientific Research and Development
They collect the real time personal information (PHI) and patient's physical problem and transmitted it to the healthcare provider. share the PHR information in cloud computing, a patient divides his PHR ...
Then the patient adopts CP-ABE scheme to encrypt the information m1 and m2 by different access policies based on the actual need. Also we propose The Clinical Document Architecture (CDA). ...
CLOUD STORAGE Patients can store their personal data and upload records on cloud storage. For security reasons, all data must be encrypted. It uses ABE algorithm for encryption. ...
doi:10.31142/ijtsrd10785
fatcat:r35em5ncdregrkcpew3wn7uuqm
« Previous
Showing results 1 — 15 out of 8,387 results