نتایج جستجو برای: outsourced data

تعداد نتایج: 2411127  

Journal: :IACR Cryptology ePrint Archive 2013
Muhammad Rizwan Asghar Mihaela Ion Giovanni Russello Bruno Crispo

Data outsourcing is a growing business model offering services to individuals and enterprises for processing and storing a huge amount of data. It is not only economical but also promises higher availability, scalability, and more effective quality of service than in-house solutions. Despite all its benefits, data outsourcing raises serious security concerns for preserving data confidentiality....

Journal: :Journal of Systems and Software 2017
Rui Zhang Hui Ma Yao Lu

Attribute-based encryption (ABE) has potential to be applied in cloud computing applications to provide fine-grained access control over encrypted data. However, the computation cost of ABE is considerably expensive, because the pairing and exponentiation operations grow with the complexity of access formula. In this work, we propose a fully outsourced ciphertextpolicy ABE scheme that for the f...

Journal: :Information Systems Research 2010
Anjana Susarla Ramanath Subramanyam Prasanna P. Karhade

T complexity and scope of outsourced information technology (IT) demands relationship-specific investments from vendors, which, when combined with contract incompleteness, may result in underinvestment and inefficient bargaining, referred to as the holdup problem. Using a unique data set of over 100 IT outsourcing contracts, we examine whether contract extensiveness, i.e., the extent to which f...

Journal: :IACR Cryptology ePrint Archive 2016
Jinsheng Zhang Qiumao Ma Wensheng Zhang Daji Qiao

This paper proposes MSKT-ORAM, an efficient multiple server ORAM construction, to protect a client’s access pattern to outsourced data. MSKT-ORAM organizes each of the server storage as a k-ary tree and adopts XOR based PIR and a novel delayed eviction technique to optimize both the data query and data eviction process. MSKT-ORAM is proved to protect the data access pattern privacy at a failure...

2016
Ajay Goel Rupesh Gupta Fabien A. P. Petitcolas Fabien A.P. Petitcolas Ross J. Anderson Markus G. Kuhn Juan R. Hernandez Frank Hartung Jonathan K. Su

Strengthening the ownership rights on outsourced relational database is very important in today’s internet environment. Especially where sensitive, valuable content is to be outsourced. Let us take an example of university database, weather data, stock market data, power consumption consumer behaviour data, and medical and scientific data. The increasing use of databases in applications beyond ...

2014
M. M. Waghmare

Data mining-as-a-service has been selected as considerable research issue by researchers. An organization (data owner) can outsource its mining needs like resources or expertise to a third party service provider (server). However, both the association rules and the items of the outsourced transaction database are private property of data owner. The data owner encrypts its data, send data and mi...

Journal: :IACR Cryptology ePrint Archive 2005
Maithili Narasimha Gene Tsudik

Database outsourcing is an important emerging trend which involves data owners delegating their data management needs to an external service provider. In this model, a service provider hosts clients’ databases and offers mechanisms to create, store, update and access (query) outsourced databases. Since a service provider is almost never fully trusted, security and privacy of outsourced data are...

2016
Zeeshan Pervez Mahmood Ahmad Asad Masood Khattak Sungyoung Lee Tae Choong Chung

Privacy-aware search of outsourced data ensures relevant data access in the untrusted domain of a public cloud service provider. Subscriber of a public cloud storage service can determine the presence or absence of a particular keyword by submitting search query in the form of a trapdoor. However, these trapdoor-based search queries are limited in functionality and cannot be used to identify se...

2015
Foteini Baldimtsi Olga Ohrimenko

We propose a framework where a user can outsource his data to a cloud server in an encrypted form and then request the server to perform computations on this data and sort the result. Sorting is achieved via a novel protocol where the server is assisted by a secure coprocessor that is required to have only minimal computational and memory resources. The server and the coprocessor are assumed to...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید