Filters








5,349 Hits in 4.9 sec

Ensuring Security and Privacy Preservation for Cloud Data Services

Jun Tang, Yong Cui, Qi Li, Kui Ren, Jiangchuan Liu, Rajkumar Buyya
2016 ACM Computing Surveys  
We then dwell on existing protection solutions to achieve secure, dependable, and privacy-assured cloud data services including data search, data computation, data sharing, data storage, and data access  ...  We first present security threats and requirements of an outsourcing data service to a cloud, and follow that with a high-level overview of the corresponding security technologies.  ...  Recently, Gentry et al. [2013] proposed an approximate eigenvector method to eliminate dimension reduction and noise control.  ... 
doi:10.1145/2906153 fatcat:c57iz6lswvfxbmhireksha35vm

Secure kNN Computation and Integrity Assurance of Data Outsourcing in the Cloud

Jun Hong, Tao Wen, Quan Guo, Zhengwang Ye
2017 Mathematical Problems in Engineering  
It is indicated from the security analysis and experiment results that our scheme not only maintains the confidentiality of outsourced confidential data and query points but also has a lower kNN query  ...  A novel scheme is proposed in this paper to effectuate k-nearest neighbors (kNN) query and kNN query authentication on an encrypted outsourced spatial database.  ...  Acknowledgments This research is supported by the National Nature Science Foundation of China (nos. 61772101, 61170169, 61170168, and 61602075).  ... 
doi:10.1155/2017/8109730 fatcat:jg24dtvfnjcjdltxw7momuxh3m

Efficient and Secure Storage for Outsourced Data: A Survey

Jianfeng Wang, Xiaofeng Chen
2016 Data Science and Engineering  
This paper focuses on the techniques of verifiable data storage and secure data deduplication. We firstly summarize and classify the state-of-the-art research on cloud data storage mechanism.  ...  Then, we present some potential research directions for secure data outsourcing.  ...  [46, 48] give two solutions to the completeness problem for static and dynamic outsourced database, respectively.  ... 
doi:10.1007/s41019-016-0018-9 fatcat:acae34sgnvb73leh52qdxaddhu

A Comprehensive Survey on Secure Outsourced Computation and its Applications

Yang Yang, Xindi Huang, XiMeng Liu, Hongju Cheng, Jian Weng, Xiangyang Luo, Victor Chang
2019 IEEE Access  
However, data outsourcing brings security and privacy concerns to users when the cloud servers are not fully trusted.  ...  INDEX TERMS Secure outsourced computing, privacy preserving, homomorphic encryption, secure outsourced machine learning, data processing.  ...  Besides, the authors also applied the method of PCA (principal component analysis) for dimensionality reduction of the face templates.  ... 
doi:10.1109/access.2019.2949782 fatcat:ternbyhqezgd5cvhtfqfggqdqq

Security and Trust in IT Business Outsourcing: a Manifesto

Y. Karabulut, F. Kerschbaum, F. Massacci, P. Robinson, A. Yautsiukhin
2007 Electronical Notes in Theoretical Computer Science  
Yet, in current outsourcing practices, clients usually focus primarily on business objectives and security is negotiated only for communication links.  ...  Strong protection of a communication link is of little value if data can be easily stolen or corrupted while on a supplier's server.  ...  With this missing part, strong communications link only solves one dimension of the secure outsourcing problem (see example 1.2).  ... 
doi:10.1016/j.entcs.2006.08.030 fatcat:smdzj7hqevfibg7eo6oaedjzte

Protection of Big Data Privacy

Abid Mehmood, Iynkaran Natgunanathan, Yong Xiang, Guang Hua, Song Guo
2016 IEEE Access  
Since big data require high computational power and large storage, distributed systems are used. As multiple parties are involved in these systems, the risk of privacy violation is increased.  ...  In recent years, big data have become a hot research topic. The increasing amount of big data also increases the chance of breaching the privacy of individuals.  ...  In [55] , Oliveira and Zaiane proposed a method for centralized data by using dimensionality reduction and object similarity based representation.  ... 
doi:10.1109/access.2016.2558446 fatcat:7zpzpho4areujjfjur3hzgugzy

VESPo: Verified Evaluation of Secret Polynomials [article]

Jean-Guillaume Dumas, Daniel S. Roche
2022 arXiv   pre-print
As an important application, we show how these new techniques can be used to instantiate a Dynamic Proof of Retrievability (DPoR) for arbitrary outsourced data storage that achieves low server storage  ...  Our protocols support two important features: the polynomial itself can be encrypted on the server, and it can be dynamically updated by changing individual coefficients cheaply without redoing the entire  ...  and dynamicity, but on an unciphered polynomial) and of Section 5 (for dynamicity on a ciphered polynomial, but without public verifiability).  ... 
arXiv:2110.02022v2 fatcat:mnauk3ixhffyriibdzamcsldpu

Optimized Homomorphic Scheme on Map Reduce for Data Privacy Preserving

Konan Martin, Wenyong Wang, Brighter Agyemang
2017 Journal of Information Security  
So there is a foremost need to enable particular sorts of calculations to be done on encrypted data and additionally optimize data processing at the Map stage.  ...  Therefore, Mapreduce which is a programming framework for preparing and creating huge data collections should be optimized and securely implemented.  ...  over outsourced data processing and storage [26] .  ... 
doi:10.4236/jis.2017.83017 fatcat:4tgsar4d3beshphdcwcrcde3jy

Secure Authenticated Comparisons [chapter]

Keith B. Frikken, Hao Yuan, Mikhail J. Atallah
2011 Lecture Notes in Computer Science  
for the individual owners, and the model allows the data owners to focus on what they do best (the creation and/or acquisition of high-quality data).  ...  A problem that arises in the context of outsourced databases (particularly for XML data) is the following: There is a total order Π on n items stored with the dealer, and a user query consists of a pair  ...  Acknowledgments The authors thank the anonymous reviewers for their comments and useful suggestions.  ... 
doi:10.1007/978-3-642-21554-4_30 fatcat:n4sljbvc6faaphhk4kibjeu52m

LRSE: A Lightweight Efficient Searchable Encryption Scheme using Local and Global Representations [article]

Ruihui Zhao, Yuanliang Sun, Mizuho Iwaihara
2017 arXiv   pre-print
In this paper, we propose a novel SE scheme called LRSE which firstly integrates machine learning methods into the framework of SE and combines local and global representations of encrypted cloud data  ...  Cloud computing is emerging as a revolutionary computing paradigm, while security and privacy become major concerns in the cloud scenario.  ...  [14] propose a secure and dynamic multikeyword ranked search scheme over encrypted cloud data. The goal is supporting dynamic update operations on documents and sub-linear search time.  ... 
arXiv:1705.11056v1 fatcat:wd367mj5qrf55jbkkgzv2zkhou

The Relationship Between Strategic Orientation Dimensions and Hotel Outsourcing and Its Impact on Organizational Performance. An Application in a Tourism Destination

Tomás Espino-Rodríguez, Juan Ramírez-Fierro
2018 Sustainability  
It also analyzes whether outsourcing has an impact on organizational performance from financial and non-financial perspectives. To do so, an important European tourist destination is analyzed.  ...  The defensiveness and proactive dimensions are positively related to the level of outsourcing, whereas the competitive analysis and competitive aggressiveness dimensions influence it negatively.  ...  -Defensiveness dimension: This dimension is related to the defensive behavior described by Miles and Snow [43] , and it is expressed in terms of the emphasis on seeking cost-reduction methods and operational  ... 
doi:10.3390/su10061769 fatcat:p6a4s6ysjzdzbdbmkcwhjiff3e

Person Re-Identification over Encrypted Outsourced Surveillance Videos

Hang Cheng, Huaxiong Wang, Ximeng Liu, Yan Fang, Meiqing Wang, Xiaojun Zhang
2019 IEEE Transactions on Dependable and Secure Computing  
In recent years, the cloud storage services have made a large volume of video data outsourcing become possible.  ...  Assume that a, b, c, d are four verified data values, where a < b < c < d. h T (·) is a general collision-resistant hash function. " " indicates the concatenation of the hash values of two nodes.  ...  ACKNOWLEDGMENT The authors thank the Associate Editor and reviewers for their constructive and generous feedback. We thank Dr.  ... 
doi:10.1109/tdsc.2019.2923653 fatcat:bomso2qrljd47jekrrzwmondvy

Publicly verifiable grouped aggregation queries on outsourced data streams

S. Nath, R. Venkatesan
2013 2013 IEEE 29th International Conference on Data Engineering (ICDE)  
However, data outsourcing and remote computations intrinsically raise issues of trust, making it crucial to verify results returned by third parties.  ...  Experimental results on real and synthetic data show that our solution is practical and efficient.  ...  CONCLUSION We have proposed DiSH, a small and efficient signature to verify outsourced grouped aggregation queries on streaming data.  ... 
doi:10.1109/icde.2013.6544852 dblp:conf/icde/NathV13 fatcat:qhlefu4x6nbxfhawzijfzsyb5u

Theoretical Model to Analyze the Influence of Outsourcing on Industrial Business Value Creation

Pedro Costa Ramos
2020 Universal Journal of Management  
Based on the existing literature about Outsourcing a theoretical model was conceptualized to analyze and evaluate the influence of outsourcing on industrial and business value creation.  ...  The main conclusions to be taken from this research are: (i) that outsourcing does present a verifiable set of statistically relevant direct and indirect effects upon the internal value creation process  ...  solution reflects, for each of its outsourcing dimensions, the variance explained of the data per construct.  ... 
doi:10.13189/ujm.2020.080101 fatcat:ysluld2hvngiznndyjvw5pnkzy

Enhanced Data security through Deep Data Classification in the Cloud Computing

2020 International Journal of Emerging Trends in Engineering Research  
Several classification methods that are expressed various parameters based on different dimensions for providing the data security can be based on the level and are required protection.  ...  But, the latest approaches introduced by the cloud, related to distributed resources, multi-tenancy idea, computation outsourcing, high dynamism of the model, data warehousing and the non-transparent style  ...  Once the data is outsourced to the cloud, in general auditing can be done to verify the data integrity as done in [18] .  ... 
doi:10.30534/ijeter/2020/228892020 fatcat:xa7dczxn6bh7ho3y6y5mrxhgeu
« Previous Showing results 1 — 15 out of 5,349 results