نتایج جستجو برای: outsourced data

تعداد نتایج: 2411127  

Journal: :CoRR 2012
Robert Nix Murat Kantarcioglu

To save time and money, businesses and individuals have begun outsourcing their data and computations to cloud computing services. These entities would, however, like to ensure that the queries they request from the cloud services are being computed correctly. In this paper, we use the principles of economics and competition to vastly reduce the complexity of query verification on outsourced da...

2011
Michael T. Goodrich Michael Mitzenmacher

Suppose a client, Alice, has outsourced her data to an external storage provider, Bob, because he has capacity for her massive data set, of size n, whereas her private storage is much smaller—say, of size O(n), for some constant r > 1. Alice trusts Bob to maintain her data, but she would like to keep its contents private. She can encrypt her data, of course, but she also wishes to keep her acce...

2008
Hong Chen Xiaonan Ma Windsor W. Hsu Ninghui Li Qihua Wang

Outsourced data publishing is a promising approach to achieve higher distribution efficiency, greater data survivability, and lower management cost. In outsourced data publishing (sometimes referred to as third-party publishing), a data owner gives the content of databases to multiple publishers which answer queries sent by clients. In many cases, the trustworthiness of the publishers cannot be...

Journal: :JCP 2012
Xiaoming Wang Yanchun Lin

In this paper, we analyze Liu et al.’s scheme and show that their scheme is not secure. Then we modify their scheme and present an efficient access scheme to outsourced data. Our scheme adopts two-layer encryption model and all users are divided into different groups according to their access privilege. We employ filter functions to construct the key derivation procedure to prevent the revoked ...

Journal: :Future Internet 2017
Jinsheng Zhang Qiumao Ma Wensheng Zhang Daji Qiao

This paper proposes TSKT-oblivious RAM (ORAM), an efficient multi-server ORAM construction, to protect a client’s access pattern to outsourced data. TSKT-ORAM organizes each of the server storages as a k-ary tree and adopts XOR-based private information retrieval (PIR) and a novel delayed eviction technique to optimize both the data query and data eviction process. TSKT-ORAM is proven to protec...

2013
Jaspreet Kaur Jasmeet Singh

www.ijarcet.org 2236  Abstract— Cloud Computing is the arising technology that delivers software, platform and infrastructure as a service over a network. Cloud minimizes the burden of users by allowing them to remotely store their data and eliminates the need of local storage and maintenance. Even though benefits are higher but while storing data in cloud, correctness of data and security are...

Journal: :Remote Sensing 2021

Over the last few decades, we witnessed a revolution in acquiring very high resolution and accurate geo-information. One of reasons was advances photonics LiDAR, which had remarkable impact applications requiring information with accuracy and/or elevated completeness, such as flood modelling, forestry, construction, mining. Also, miniaturization within electronics played an important role it al...

2018
Sharad Mehrotra Shantanu Sharma Jeffrey D. Ullman Anurag Mishra

Despite extensive research on cryptography, secure and efficient query processing over outsourced data remains an open challenge. This paper continues along the emerging trend in secure data processing that recognizes that the entire dataset may not be sensitive, and hence, non-sensitivity of data can be exploited to overcome some of the limitations of existing encryption-based approaches. Taki...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید