Practical secure computation outsourcing: A survey

Z Shan, K Ren, M Blanton, C Wang - ACM Computing Surveys (CSUR), 2018 - dl.acm.org
The rapid development of cloud computing promotes a wide deployment of data and
computation outsourcing to cloud service providers by resource-limited entities. Based on a …

A comprehensive survey on secure outsourced computation and its applications

Y Yang, X Huang, X Liu, H Cheng, J Weng, X Luo… - IEEE …, 2019 - ieeexplore.ieee.org
With the ever-increasing requirement of storage and computation resources, it is unrealistic
for local devices (with limited sources) to implement large-scale data processing. Therefore …

A secure and verifiable access control scheme for big data storage in clouds

C Hu, W Li, X Cheng, J Yu, S Wang… - IEEE Transactions on …, 2017 - ieeexplore.ieee.org
Due to the complexity and volume, outsourcing ciphertexts to a cloud is deemed to be one of
the most effective approaches for big data storage and access. Nevertheless, verifying the …

Secured fine-grained selective access to outsourced cloud data in IoT environments

Q Xia, EB Sifah, KOBO Agyekum, H Xia… - IEEE Internet of …, 2019 - ieeexplore.ieee.org
With the vast increase in data transmission due to a large number of information collected by
devices, data management, and security has been a challenge for organizations. Many data …

EO-PSI-CA: Efficient outsourced private set intersection cardinality

AA Jolfaei, H Mala, M Zarezadeh - Journal of Information Security and …, 2022 - Elsevier
Private set intersection cardinality (PSI-CA) is a useful cryptographic primitive for many data
analysis techniques, eg in genomic computations and data mining. In the last few years …

A secure and verifiable outsourcing scheme for matrix inverse computation

C Hu, A Alhothaily, A Alrawais, X Cheng… - … -IEEE Conference on …, 2017 - ieeexplore.ieee.org
Matrix inverse computation is one of the most fundamental mathematical problems in large-
scale data analytics and computing. It is often too expensive to be solved in resource …

Practical and secure outsourcing algorithms of matrix operations based on a novel matrix encryption method

S Zhang, C Tian, H Zhang, J Yu, F Li - IEEE Access, 2019 - ieeexplore.ieee.org
With the recent growth and commercialization of cloud computing, outsourcing computation
has become one of the most important cloud services, which allows the resource …

A stable online scheduling strategy for real-time stream computing over fluctuating big data streams

D Sun, R Huang - IEEE Access, 2016 - ieeexplore.ieee.org
The issue of high system stability is one of the major obstacles for real-time computing over
fluctuating big data streams. A stable scheduling is more important than an efficient …

[PDF][PDF] A Review on Big Data Analytics between Security and Privacy Issue

RR Asaad, NL Abdulnabi - Academic Journal of Nawroz …, 2022 - pdfs.semanticscholar.org
Because of technology, a large number of portable devices, and the great use of networks
and the need for them in education, industry, and politics. This widespread has led to the …

Securing Files on Cloud Storage with Group Key Management Protocol

S Gowri, K Appathurai, RM Gomathi… - 2023 5th International …, 2023 - ieeexplore.ieee.org
Due to an exponential rise in the incidence of cyberattacks, there is a greater than ever need
for enhanced Intrusion Detection Systems (IDS). In this aspect, the early classification of the …