Practical secure computation outsourcing: A survey

Z Shan, K Ren, M Blanton, C Wang - ACM Computing Surveys (CSUR), 2018 - dl.acm.org
The rapid development of cloud computing promotes a wide deployment of data and
computation outsourcing to cloud service providers by resource-limited entities. Based on a …

Securing SIFT: Privacy-preserving outsourcing computation of feature extractions over encrypted image data

S Hu, Q Wang, J Wang, Z Qin… - IEEE Transactions on …, 2016 - ieeexplore.ieee.org
Advances in cloud computing have greatly motivated data owners to outsource their huge
amount of personal multimedia data and/or computationally expensive tasks onto the cloud …

Secure image LBP feature extraction in cloud-based smart campus

Z Xia, X Ma, Z Shen, X Sun, NN Xiong, B Jeon - IEEE Access, 2018 - ieeexplore.ieee.org
The smart campus can monitor students in real time by analyzing students' images, but a
large number of images bring an unbearable burden to the smart campus. The convenience …

Publicly verifiable privacy-preserving aggregation and its application in IoT

T Li, C Gao, L Jiang, W Pedrycz, J Shen - Journal of Network and Computer …, 2019 - Elsevier
With the development of smart devices, the Internet of Things (IoT) has found wide
applications and extended various services of Internet. On intermediate nodes and edge …

Cloud-based outsourcing for enabling privacy-preserving large-scale non-negative matrix factorization

A Fu, Z Chen, Y Mu, W Susilo, Y Sun… - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
It is inevitable and evident that outsourcing complicated intensive tasks to public cloud
vendors would be the primary option for resource-constrained clients in order to save cost …

A tutorial on secure outsourcing of large-scale computations for big data

S Salinas, X Chen, J Ji, P Li - IEEE Access, 2016 - ieeexplore.ieee.org
Today's society is collecting a massive and exponentially growing amount of data that can
potentially revolutionize scientific and engineering fields, and promote business innovations …

Outsourced biometric identification with privacy

S Hu, M Li, Q Wang, SSM Chow… - IEEE Transactions on …, 2018 - ieeexplore.ieee.org
Biometric identification typically scans a large-scale database of biometric records for finding
a close enough match of an individual. This paper investigates how to outsource this …

New publicly verifiable computation for batch matrix multiplication

X Zhang, T Jiang, KC Li, A Castiglione, X Chen - Information Sciences, 2019 - Elsevier
With the prevalence of cloud computing, the resource constrained clients are trended to
outsource their computation-intensive tasks to the cloud server. Although outsourcing …

Efficient secure outsourcing of large-scale sparse linear systems of equations

S Salinas, C Luo, X Chen, W Liao… - IEEE Transactions on Big …, 2017 - ieeexplore.ieee.org
Solving large-scale sparse linear systems of equations (SLSEs) is one of the most common
and fundamental problems in big data, but it is very challenging for resource-limited users …

A secure and verifiable outsourcing scheme for matrix inverse computation

C Hu, A Alhothaily, A Alrawais, X Cheng… - … -IEEE Conference on …, 2017 - ieeexplore.ieee.org
Matrix inverse computation is one of the most fundamental mathematical problems in large-
scale data analytics and computing. It is often too expensive to be solved in resource …