Articles with "encrypted data" as a keyword



Photo by campaign_creators from unsplash

Statistical learning based fully homomorphic encryption on encrypted data

Sign Up to like & get
recommendations!
Published in 2017 at "Soft Computing"

DOI: 10.1007/s00500-016-2296-6

Abstract: Statistical learning has been widely used in many fields, such as science, engineering and finance, to extract important patterns, trends, and understand “what the data say”. Privacy of statistical learning, i.e., user and sensitive data,… read more here.

Keywords: encrypted data; computation; fully homomorphic; statistical learning ... See more keywords
Photo from wikipedia

Security analysis of secure kNN and ranked keyword search over encrypted data

Sign Up to like & get
recommendations!
Published in 2019 at "International Journal of Information Security"

DOI: 10.1007/s10207-019-00461-y

Abstract: Wong et al. proposed a novel symmetric encryption scheme in which we can find the k-nearest neighbors from encrypted data and an encrypted query. Their scheme uses a pair of encryption functions that has an… read more here.

Keywords: attack; encryption functions; encrypted data; security ... See more keywords
Photo by campaign_creators from unsplash

Efficient Multi-user Similarity Search Over Encrypted Data in Cloud Storage

Sign Up to like & get
recommendations!
Published in 2019 at "Wireless Personal Communications"

DOI: 10.1007/s11277-018-5744-z

Abstract: In cloud-assisted data outsourcing systems, the privacy of sensitive data is a major concern. Thus, data are uploaded in encrypted form in many cloud applications while providing some basic yet critical functionalities, such as the… read more here.

Keywords: encrypted data; multi user; similarity; cloud ... See more keywords
Photo by campaign_creators from unsplash

Aggregation Tree Statistical Computing Based on Functional Encryption

Sign Up to like & get
recommendations!
Published in 2019 at "Wuhan University Journal of Natural Sciences"

DOI: 10.1007/s11859-019-1376-8

Abstract: The medical monitoring system is widely used. In the medical monitoring system, each user only possesses one piece of data logging that participates in statistical computing. Specifically in such a situation, a feasible solution is… read more here.

Keywords: encrypted data; statistical computing; aggregation; data aggregation ... See more keywords
Photo from wikipedia

Cloud based private data analytic using secure computation over encrypted data

Sign Up to like & get
recommendations!
Published in 2021 at "Journal of King Saud University - Computer and Information Sciences"

DOI: 10.1016/j.jksuci.2021.06.014

Abstract: Abstract Secure and efficient analytic over sensitive data becomes nowadays a big challenge for some enterprises (medical health care, insurance, etc). While these companies are collecting a large amount of sensitive data, cloud system is… read more here.

Keywords: encrypted data; data cloud; computation; computation encrypted ... See more keywords
Photo by bermixstudio from unsplash

Crypt4GH: a file format standard enabling native access to encrypted data

Sign Up to like & get
recommendations!
Published in 2021 at "Bioinformatics"

DOI: 10.1093/bioinformatics/btab087

Abstract: Abstract Motivation The majority of genome analysis tools and pipelines require data to be decrypted for access. This potentially leaves sensitive genetic data exposed, either because the unencrypted data is not removed after analysis, or… read more here.

Keywords: encrypted data; crypt4gh file; format standard; file format ... See more keywords
Photo by campaign_creators from unsplash

Efficient Client-Side Deduplication of Encrypted Data With Public Auditing in Cloud Storage

Sign Up to like & get
recommendations!
Published in 2018 at "IEEE Access"

DOI: 10.1109/access.2018.2836328

Abstract: At present, there is a considerable increase in the amount of data stored in storage services, along with dramatic evolution of networking techniques. In storage services with huge data, the storage servers may want to… read more here.

Keywords: encrypted data; storage; deduplication encrypted; integrity ... See more keywords
Photo by campaign_creators from unsplash

Attribute-Based Equality Test Over Encrypted Data Without Random Oracles

Sign Up to like & get
recommendations!
Published in 2020 at "IEEE Access"

DOI: 10.1109/access.2020.2973459

Abstract: Sensitive data would be encrypted before uploading to the cloud due to the privacy issue. However, how to compare the encrypted data efficiently becomes a problem. Public Key Encryption with Equality Test (PKEET) provides an… read more here.

Keywords: encrypted data; equality; attribute based; equality test ... See more keywords
Photo by campaign_creators from unsplash

Attribute-Based Encryption Approach for Storage, Sharing and Retrieval of Encrypted Data in the Cloud

Sign Up to like & get
recommendations!
Published in 2020 at "IEEE Access"

DOI: 10.1109/access.2020.3023893

Abstract: One of the most cost-effective services in cloud computing is storage, used by businesses and individuals to outsource their massive data to untrusted servers. Efforts have studied problems around this application scenario in different fronts:… read more here.

Keywords: tex math; encrypted data; attribute based; inline formula ... See more keywords
Photo by joakimnadell from unsplash

An Architecture to Accelerate Computation on Encrypted Data

Sign Up to like & get
recommendations!
Published in 2022 at "IEEE Micro"

DOI: 10.1109/mm.2022.3170792

Abstract: Fully homomorphic encryption (FHE) allows computing on encrypted data, enabling secure offloading of computation to untrusted servers. Though it provides ideal security, FHE is prohibitively expensive when executed in software. These overheads are a major… read more here.

Keywords: architecture accelerate; computation encrypted; accelerate computation; encrypted data ... See more keywords
Photo from wikipedia

Translating Algorithms to Handle Fully Homomorphic Encrypted Data on the Cloud

Sign Up to like & get
recommendations!
Published in 2018 at "IEEE Transactions on Cloud Computing"

DOI: 10.1109/tcc.2015.2481416

Abstract: Cloud provides large shared resources where users (or foundations) can enjoy the facility of storing data or executing applications. In spite of gaining convenience of large resources, storing critical data in cloud is not secured.… read more here.

Keywords: encrypted data; data cloud; translating algorithms; fully homomorphic ... See more keywords