The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Cloud computing is attracting increasing attention since it enables clients with limited computing resources to perform and complete large-scale computations. However, it also comes up with some security and privacy concerns and challenges, such as the input and output privacy of the client, and cheating behaviors of the cloud. Motivated by these issues and focused on engineering optimization tasks,...
Outsourcing computation to cloud server has recently become popular in cloud computing. Cloud computing technologies enable clients with limited computational resources to outsource their massive computations to powerful cloud servers. Outsourcing computation has some new concerns, such as outsourced data and result privacy, verifiability and efficiency. Matrix multiplication is one of the most basic...
Outsourcing middleboxes brings threats to the enterprise's private information including the trafflc and rules of middleboxes. We present a secure and dynamic middlebox outsourcing framework SICS, short for Secure In-Cloud Service. SICS encrypts each packet header and uses a label for in-cloud rule matching, which enables the cloud to perform its functionalities correctly with minimum header information...
Delegated authorization protocols have become wide-spread to implement Web applications and services, where some popular providers managing people identity information and personal data allow their users to delegate third party Web services to access their data. In this paper, we analyze the risks related to untrusted providers not behaving correctly, and we solve this problem by proposing the first...
The emergence and development of the Internet resulted in the generation of huge amounts of data, which are often distributed among different sites. Many organizations and companies attempted to mine the data with cloud computing. However, given the rise of various privacy issues, sensitive data (e.g., medical records) need to be encrypted before outsourcing to the cloud. To process data mining, such...
Social data outsourcing is an emerging paradigm for effective and efficient access to the social data. In such a system, a third-party Social Data Provider (SDP) purchases complete social datasets from Online Social Network (OSN) operators and then resells them to data consumers who can be any individuals or entities desiring the complete social data satisfying some criteria. The SDP cannot be fully...
Cloud database systems such as Amazon RDS or Google Cloud SQLenable the outsourcing of a large database to a server who then responds to SQL queries. A natural problem here is to efficiently verify the correctness of responses returned by the (untrusted) server. In this paper we present vSQL, a novel cryptographic protocol for publicly verifiable SQL queries on dynamic databases. At a high level,...
Cloud computing offers an economical solution to the computationally weak clients. It enables the client to execute large computations beyond their computation capacity by outsourcing their computation load to the massive cloud servers. However, outsourcing of data and the computation to a third-party cloud server bring many security and privacy concern. In this paper, we are addressing the problem...
As the outsourcing of mobile sensitive data has been highlighted, data encryption schemes are required to protect the mobile sensitive data. Accordingly, it is necessary to develop not only a distributed index structure to efficiently manage the large amount of encrypted data, but also a query processing scheme over the encrypted data. To the best of our knowledge, there has been no research on index...
With prevalence of remote storage services, data privacy issues become more serious owing to loss of control to outsourced data. In the meanwhile, the service providers tend to minimize storage utility costs. To minimize the storage costs while preserving data privacy, secure deduplication techniques have been proposed, which are categorized into client-side or server-side approaches. Client-side...
The rapid development of cloud computing services and expansion of mobile computing devices have made computation outsourcing a promising solution for execution of extensive computation. In this framework, a computationally weak client outsources its large computation load to a cloud server. However, outsourcing of data and computation to a cloud server brings many security and privacy concern. In...
Many smartphone applications are web based and rely on cookies to maintain the status of a web session. Cookies, however, may lead to security threats since they may contain sensitive information. In addition, an attacker having access to a cookie can easily impersonate the legitimate user. In this paper, we propose and implement a system that securely outsources browser cookies to the cloud and ensures...
In this paper, we propose a new efficient solution for securely outsourcing linear regression to a public cloud with robust answer verification. Additionally, we show our construction can be utilized to efficiently and securely outsource other large-scale matrix operations, such as determinant computation.
We propose a Parity-based Data Outsourcing(PDO) model in this paper. This model outsources a set of raw data by associating it with a set of parity data and then distributing both sets of data among a number of cloud servers that are managed independently by different service providers. Users query the servers for the data of their interest and are allowed to perform both authentication and correction...
Cloud computing provides resource-constrained clients to outsource their large-scale mathematical computations to a public cloud economically. Cloud has huge computational power, massive storage, and software which are provided to clients on demand. Clients can use cloud for reducing their computational overhead and storage limitation. Though it is highly beneficial, privacy of client's confidential...
Cloud computing enables resource-constrained endusers to outsource their computational tasks to the cloud in a flexible manner. One major concern of computation outsourcing is the security of the outsourced data as well as the results. In this paper, we propose a secure outsourcing scheme (SecMul) for one basic and expensive computation in cryptography, that is scalar multiplication of points on elliptic...
We introduce a model for provable data possession (PDP) that allows a client that has stored data at an untrusted server to verify that the server possesses the original data without retrieving it. The model generates probabilistic proofs of possession by sampling random sets of blocks from the server, which drastically reduces I/O costs. The client maintains a constant amount of metadata to verify...
Inter-area Oscillations pose serious threats to the stability of power transmission grids. Failure to notice or to handle inter-area oscillations may lead to widespread catastrophic blackouts. It is, therefore, critically important to monitor the oscillation conditions such that timely mitigation controls can be applied at the early stage. Recent research shows that it is an effective approach to...
The term big data refers to the massive amounts of digital information, which can be efficiently stored and processed on a cloud computing platform. However, security and privacy issues are magnified by high volume, variety, and velocity of big data. Ciphertext-Policy Attribute-Based Encryption (CP-ABE) is a promising cryptographic primitive for the security of cloud storage system and can bring together...
Modular exponentiations are widely used in discrete-log based cryptographic protocols. Most researches have been done for outsourcing exponentiation modular a prime, while less work has been done for outsourcing exponentiation modular a composite. In this paper, we first raise a new secure outsourcing algorithm for exponentiation modular a composite in the one malicious model. Then, we prove that...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.