Security and privacy in cloud computing
Z Xiao, Y Xiao - IEEE communications surveys & tutorials, 2012 - ieeexplore.ieee.org
Recent advances have given rise to the popularity and success of cloud computing.
However, when outsourcing the data and business application to a third party causes the …
However, when outsourcing the data and business application to a third party causes the …
Practical secure computation outsourcing: A survey
The rapid development of cloud computing promotes a wide deployment of data and
computation outsourcing to cloud service providers by resource-limited entities. Based on a …
computation outsourcing to cloud service providers by resource-limited entities. Based on a …
Secure attribute-based data sharing for resource-limited users in cloud computing
Data sharing becomes an exceptionally attractive service supplied by cloud computing
platforms because of its convenience and economy. As a potential technique for realizing …
platforms because of its convenience and economy. As a potential technique for realizing …
Secure outsourced matrix computation and application to neural networks
Homomorphic Encryption (HE) is a powerful cryptographic primitive to address privacy and
security issues in outsourcing computation on sensitive data to an untrusted computation …
security issues in outsourcing computation on sensitive data to an untrusted computation …
Securely outsourcing attribute-based encryption with checkability
Attribute-Based Encryption (ABE) is a promising cryptographic primitive which significantly
enhances the versatility of access control mechanisms. Due to the high expressiveness of …
enhances the versatility of access control mechanisms. Due to the high expressiveness of …
Identity-based encryption with outsourced revocation in cloud computing
Identity-Based Encryption (IBE) which simplifies the public key and certificate management
at Public Key Infrastructure (PKI) is an important alternative to public key encryption …
at Public Key Infrastructure (PKI) is an important alternative to public key encryption …
New algorithms for secure outsourcing of modular exponentiations
With the rapid development of cloud services, the techniques for securely outsourcing the
prohibitively expensive computations to untrusted servers are getting more and more …
prohibitively expensive computations to untrusted servers are getting more and more …
Delegatable pseudorandom functions and applications
We put forth the problem of delegating the evaluation of a pseudorandom function (PRF) to
an untrusted proxy and introduce a novel cryptographic primitive called delegatable …
an untrusted proxy and introduce a novel cryptographic primitive called delegatable …
Verifiable computation over large database with incremental updates
The notion of verifiable database (VDB) enables a resource-constrained client to securely
outsource a very large database to an untrusted server so that it could later retrieve a …
outsource a very large database to an untrusted server so that it could later retrieve a …
New publicly verifiable databases with efficient updates
The notion of verifiable database (VDB) enables a resource-constrained client to securely
outsource a very large database to an untrusted server so that it could later retrieve a …
outsource a very large database to an untrusted server so that it could later retrieve a …