Hybrid VD-CPABE with Secure Outsourcing
نویسندگان
چکیده
منابع مشابه
Towards Secure Data Outsourcing
The networked and increasingly ubiquitous nature of today’s data management services mandates assurances to detect and deter malicious or faulty behavior. This is particularly relevant for outsourced data frameworks in which clients place data management with specialized service providers. Clients are reluctant to place sensitive data under the control of a foreign party without assurances of c...
متن کاملSecure Data Outsourcing
The networked and increasingly ubiquitous nature of today’s data management services mandates assurances to detect and deter malicious or faulty behavior. This is particularly relevant for outsourced data frameworks in which clients place data management with specialized service providers. Clients are reluctant to place sensitive data under the control of a foreign party without assurances of c...
متن کاملSecure computation outsourcing
Computation outsourcing is used when an entity needs to execute a task but does not have the appropriate computation power to perform it. In this paper, we will survey the approach of delegation: instead of doing the computation locally, the entity outsources it to one or more external helpers which have the appropriate resources. Although this can safely be done for most everyday life tasks, i...
متن کاملSecure Outsourcing of Some Computations
The rapid growth of the Internet facilitates the outsourcing of certain computations, in the following sense: A customer who needs these computations done on some data but lacks the computational resources (or programming expertise) to do so, can use an external agent to perform these computations. This currently arises in many practical situations, including the nancial services and petroleum ...
متن کاملSecure Outsourcing of Circuit Manufacturing
The fabrication process of integrated circuits (ICs) is complex and requires the use of off-shore foundries to lower the costs and to have access to leading-edge manufacturing facilities. Such an outsourcing trend leaves the possibility of inserting malicious circuitry (a.k.a. hardware Trojans) during the fabrication process, causing serious security issues. Hardware Trojans are very hard and e...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: International Journal for Research in Applied Science and Engineering Technology
سال: 2017
ISSN: 2321-9653
DOI: 10.22214/ijraset.2017.4250