Security and privacy in cloud computing

Z Xiao, Y Xiao - IEEE communications surveys & tutorials, 2012 - ieeexplore.ieee.org
Recent advances have given rise to the popularity and success of cloud computing.
However, when outsourcing the data and business application to a third party causes the …

Practical secure computation outsourcing: A survey

Z Shan, K Ren, M Blanton, C Wang - ACM Computing Surveys (CSUR), 2018 - dl.acm.org
The rapid development of cloud computing promotes a wide deployment of data and
computation outsourcing to cloud service providers by resource-limited entities. Based on a …

Secure attribute-based data sharing for resource-limited users in cloud computing

J Li, Y Zhang, X Chen, Y Xiang - computers & security, 2018 - Elsevier
Data sharing becomes an exceptionally attractive service supplied by cloud computing
platforms because of its convenience and economy. As a potential technique for realizing …

Secure outsourced matrix computation and application to neural networks

X Jiang, M Kim, K Lauter, Y Song - … of the 2018 ACM SIGSAC conference …, 2018 - dl.acm.org
Homomorphic Encryption (HE) is a powerful cryptographic primitive to address privacy and
security issues in outsourcing computation on sensitive data to an untrusted computation …

Securely outsourcing attribute-based encryption with checkability

J Li, X Huang, J Li, X Chen… - IEEE Transactions on …, 2013 - ieeexplore.ieee.org
Attribute-Based Encryption (ABE) is a promising cryptographic primitive which significantly
enhances the versatility of access control mechanisms. Due to the high expressiveness of …

Identity-based encryption with outsourced revocation in cloud computing

J Li, J Li, X Chen, C Jia, W Lou - IEEE Transactions on …, 2013 - ieeexplore.ieee.org
Identity-Based Encryption (IBE) which simplifies the public key and certificate management
at Public Key Infrastructure (PKI) is an important alternative to public key encryption …

New algorithms for secure outsourcing of modular exponentiations

X Chen, J Li, J Ma, Q Tang… - IEEE Transactions on …, 2013 - ieeexplore.ieee.org
With the rapid development of cloud services, the techniques for securely outsourcing the
prohibitively expensive computations to untrusted servers are getting more and more …

Delegatable pseudorandom functions and applications

A Kiayias, S Papadopoulos, N Triandopoulos… - Proceedings of the …, 2013 - dl.acm.org
We put forth the problem of delegating the evaluation of a pseudorandom function (PRF) to
an untrusted proxy and introduce a novel cryptographic primitive called delegatable …

Verifiable computation over large database with incremental updates

X Chen, J Li, J Weng, J Ma… - IEEE transactions on …, 2015 - ieeexplore.ieee.org
The notion of verifiable database (VDB) enables a resource-constrained client to securely
outsource a very large database to an untrusted server so that it could later retrieve a …

New publicly verifiable databases with efficient updates

X Chen, J Li, X Huang, J Ma… - IEEE Transactions on …, 2014 - ieeexplore.ieee.org
The notion of verifiable database (VDB) enables a resource-constrained client to securely
outsource a very large database to an untrusted server so that it could later retrieve a …