A General Framework for Privacy-preserving Computation on Cloud Environments
Abstract
References
Index Terms
- A General Framework for Privacy-preserving Computation on Cloud Environments
Recommendations
An efficient and secure data sharing framework using homomorphic encryption in the cloud
Cloud-I '12: Proceedings of the 1st International Workshop on Cloud IntelligenceDue to cost-efficiency and less hands-on management, data owners are outsourcing their data to the cloud which can provide access to the data as a service. However, by outsourcing their data to the cloud, the data owners lose control over their data as ...
Privacy-Preserving Certificateless Cloud Auditing with Multiple Users
Cloud auditing is one of the important processes to ensure the security and integrity of data in cloud storage. Implementing cloud auditing requires various cryptographic tools such as identity-based cryptography and its variant: certificateless ...
Privacy-Preserving Computing Framework for Encrypted Data Under Multiple Keys
Smart Computing and CommunicationAbstractWith the popularity of cloud computing, data owners encrypt their data with different keys before uploading data to the cloud due to privacy concerns. Homomorphic encryption makes it possible to calculate on encrypted data but is usually ...
Comments
Information & Contributors
Information
Published In
- General Chairs:
- Kenneth Johnson,
- Josef Spillner,
- Program Chairs:
- Dalibor Klusáček,
- Ashiq Anjum
Sponsors
- SIGARCH: ACM Special Interest Group on Computer Architecture
- IEEE TCSC: IEEE Technical Committee on Scalable Computing
Publisher
Association for Computing Machinery
New York, NY, United States
Publication History
Check for updates
Author Tags
Qualifiers
- Research-article
Conference
- SIGARCH
- IEEE TCSC
Acceptance Rates
Contributors
Other Metrics
Bibliometrics & Citations
Bibliometrics
Article Metrics
- 0Total Citations
- 221Total Downloads
- Downloads (Last 12 months)10
- Downloads (Last 6 weeks)0
Other Metrics
Citations
View Options
Login options
Check if you have access through your login credentials or your institution to get full access on this article.
Sign in