The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
With the continuous development of the internet of things (IoT) technology, large amount of data has been generated by lots of IoT devices which require large-scale data processing technologies and storage technologies. Cloud computation is a paradigm for handling such massive data. With the help of cloud computing, IoT devices can utilize the data more efficiently, conveniently and faster. Therefore,...
Private set intersection (PSI) protocols enable 2 parties to compute the intersection of their inputs without compromising anything about the datasets beyond the intersection. With the advent of cloud computing, outsourcing computation has been attracted wide range of attention from research community and applied widely in the industry. The cloud computing allows resources restrained devices to outsource...
Proxy re-encryption (PRE), introduced by Blaze et al. in 1998, allows a semi-trusted proxy with the re-encryption key to translatea ciphertext under the delegator into another ciphertext, which can be decrypted by the delegatee. In this process, the proxy is required to know nothing about the plaintext. Many PRE schemes have been proposed so far, however until now almost all the unidirectional PRE...
Efficient low-level resource provisioning and QoS guaranteed are key challenges for cloud computing. When using virtual machines cluster to tackle various tasks scheduling, the target is to assign the tasks to each of the available nodes evenly in in premise of ensuring QoS of services, and it also means that the cloud providers should consider to reduce the load of overload nodes, and improve resource...
More and more applications have adopted cloud services to implement their critical business, so each cloud service is expected to be dependable. However, there are many threats affecting the dependability of cloud services, and it is very difficult to find out the real cause that leads to the failures of cloud services. In order to enhance the dependability of the cloud services, we propose a self-healing...
In proxy re-encryption (PRE), a proxy with re-encryption keys can transfer aciphertext computed under Alice's public key into a new one, which can be decrypted by Bob only with his secret key. Recently, Wang et al. introduced the concept of PRE plus (PRE+) scheme, which can be seen as the dual of PRE, and is almost the same as PRE scheme except that the re-encryption keys are generated by the encrypter...
Rapid development of cloud storage services produces a tremendous amount of user data outsourcing to cloud servers. Therefore, it is easy to generate data multi-replica, which is able to improve data availability and users' experience. However, when the management of data is poor, the sensitive information will be disclosed more easily. This may bring serious security and privacy challenges for both...
Today, the cloud computing has been an important platform for various resources and sharing. But at present, many cloud computing platforms have not used the service-oriented system architecture, which could bring about more flexibility, higher extendibility and reusability. The cloud computing has always been an important computing platform for sharing various resources including infrastructures,...
These years attribute based encryption (ABE) is a very hot research topic for its very flexible control on the encrypted content. Typically, there are three parties in an attribute based encryption system: PKG, User (Decrypter), Encrypter. The PKG (Private Key Generator) is responsible to generate secret keys for the User (Decrypter) according to the attributes (CP-ABE) or the policy (KP-ABE), then...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.