搜索结果: 1-15 共查到“军事学 Cloud”相关记录92条 . 查询时间(0.074 秒)
Breaking and Fixing Anonymous Credentials for the Cloud (Full Version)
Attribute-based credentials Privacy-preserving authentication Strong authentication
2019/9/23
In an attribute-based credential (ABC) system, users obtain a digital certificate on their personal attributes, and can later prove possession of such a certificate in an unlinkable way, thereby selec...
Secure Computation for Cloud data Storage
Multi-party computation semi-trusted cloud data security
2019/6/19
One of the main goals of securing data transmission is focused on the security of cloud data storage. In this paper, we describe several cryptographic techniques which can be used to address the relev...
We develop a new methodology to assess cryptographic key strength using cloud computing, by calculating the true economic cost of (symmetric- or private-) key retrieval for the most common cryptograph...
Secure Data Retrieval On The Cloud Homomorphic Encryption Meets Coresets
secure search secure report fully homomorphic encryption
2018/11/5
emph{Secure Report} is the problem of retrieving from a database table (e.g. on the cloud) all records matching specified attributes, as in SQL SELECT queries, but where the query and possibly the dat...
Definitions for Plaintext-Existence Hiding in Cloud Storage
Cloud Storage Side-channel analysis Information Leakage
2018/8/20
Cloud storage services use deduplication for saving bandwidth and storage. An adversary can exploit side-channel information in several attack scenarios when deduplication takes place at the client si...
CHARIOT: Cloud-Assisted Access Control for the Internet of Things
access control cloud computing Internet of Things
2018/6/27
The Internet of Things (IoT) technology has expanded widely across the world, promising new data management opportunities for industries, companies and individuals in different sectors, such as health...
Betrayal, Distrust, and Rationality: Smart Counter-Collusion Contracts for Verifiable Cloud Computing
Verifiable Computing Smart Contract Game Theory
2018/5/28
Cloud computing has become an irreversible trend. Together comes the pressing need for verifiability, to assure the client the correctness of computation outsourced to the cloud. Existing verifiable c...
Achieving Fine-grained Multi-keyword Ranked Search over Encrypted Cloud Data
FMRS secret-key cryptography
2018/5/15
With the advancement of Cloud computing, people now store their data on remote Cloud servers for larger computation and storage resources. However, users’ data may contain sensitive information of use...
Privacy-Preserving Multibiometric Authentication in Cloud with Untrusted Database Providers
biometrics MPC protocols
2018/4/19
This paper introduces a secure and privacy-preserving mechanism for biometric-based user authentication in a distributed manner. The design combines three modalities (face, iris and fingerprint) accor...
Secure Cloud Storage Scheme Based On Hybrid Cryptosystem
Cloud storage ECC based public key cryptography hybrid cryptosystem
2018/3/26
This paper presents a secure cloud storage scheme based on hybrid cryptosystem, which consists of Elliptic Curve Cryptography (ECC), Advanced Encryption Standard (AES), and one-way hash function. Here...
A High-Security Searchable Encryption Framework for Privacy-Critical Cloud Storage Services
Privacy-enhancing technologies private cloud services dynamic searchable symmetric encryption
2017/12/25
Searchable encryption has received a significant attention from the research community with various constructions being proposed, each achieving asymptotically optimal complexity for specific metrics ...
Efficient Oblivious Data Structures for Database Services on the Cloud
Privacy-enhancing Technologies Oblivious Data Structure ORAM
2017/12/25
Database-as-a-service (DBaaS) allows the client to store and manage structured data on the cloud remotely. Despite its merits, DBaaS also brings significant privacy issues. Existing encryption techniq...
Security notions for cloud storage and deduplication
storage systems generic cryptographic components
2017/12/19
Cloud storage is in widespread use by individuals and enterprises but introduces a wide array of attack vectors. A basic step for users is to encrypt their data, but it is not obvious what precise sec...
On the Security of a Lightweight Cloud Data Auditing Scheme
Cloud storage public auditing privacy preserving
2017/11/10
In cloud storage service, public auditing mechanisms allow a third party to verify integrity of the outsourced data on behalf of data users without the need to retrieve data from the cloud server. Rec...
CoRPA: A Novel Efficient Shared Data Auditing Protocol in Cloud Storage
Cloud storage shared data public auditing, identity privacy
2017/9/28
As data sharing has become one of the most popular features offered by cloud storage services, designing public auditing mechanisms for integrity of shared data stored at the cloud becomes much more i...