نتایج جستجو برای: outsourced data
تعداد نتایج: 2411127 فیلتر نتایج به سال:
In the past few years, outsourcing private data to untrusted servers has become an important challenge. This raises severe questions concerning the security and privacy of the data on the external storage. In this paper we consider a scenario where multiple clients want to share data on a server, while hiding all access patterns. We propose here a first solution to this problem based on Oblivio...
Users and companies are more and more resorting to external providers for storing their data and making them available to others. Since data sharing is typically selective (i.e., accesses to certain data should be allowed only to authorized users), there is the problem of enforcing authorizations on the outsourced data. Recently proposed approaches based on selective encryption provide convenie...
With the rapid development of big data and Internet of things (IOT), the number of networking devices and data volume are increasing dramatically. Fog computing, which extends cloud computing to the edge of the network can effectively solve the bottleneck problems of data transmission and data storage. However, security and privacy challenges are also arising in the fog-cloud computing environm...
The IS organization of the future will be greatly impacted by the IT global sourcing phenomena that became highly visible after Kodak outsourced its data center operations in 1989 and which has since grown rapidly to encompass offshoring as well as domestic outsourcing. IS departments have already been impacted — some in carefully-conceived and planned ways; others in unplanned ways that have c...
Spurred by developments including cloud processing, there has become considerable recent fascination with the paradigm connected with data mining-as-a-service. A corporation (data owner) short of expertise or even computational methods can outsource their mining must a 3rd party service (server). Even so, both the things and the particular association rules on the outsourced database are though...
A growing trend to simultaneously insource and outsource the same information technology (IT) activities (“concurrent IT sourcing”) has not yet received research attention. Although it is widespread and recent empirical studies have detected that in-house IT can complement IT outsourcing, when and how concurrent IT sourcing pays off is not yet understood. This study introduces the notion of con...
Location-based services (LBSs) facilitate people’s lives; location-based service providers (LBSPs) usually outsource to third parties provide better services. However, the party is a dishonest entity that might return incorrect or incomplete query results under consideration of saving storage space and computation resources. In this paper, we propose security-enhanced result verification scheme...
model Object
As cloud computing services and location-aware devices are fully developed, a large amount of spatial data needs to be outsourced to the cloud storage provider, so the research on privacy protection for outsourced spatial data gets increasing attention from academia and industry. As a kind of spatial transformation method, Hilbert curve is widely used to protect the location privacy for spatial...
Nowadays, cloud data outsourcing provides users and companies with powerful capabilities to store and process their data in third-party data centers. However, the privacy of the outsourced data is not guaranteed by the cloud providers. One solution for protecting the user data against security attacks is to encrypt the data before being sent to the cloud servers. Then, the main problem is to ev...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید