scholarly journals Privacy-Preserving Outsourcing of Large-Scale Nonlinear Programming to the Cloud

Author(s):  
Ang Li ◽  
Wei Du ◽  
Qinghua Li
Author(s):  
Kiyotaka Shimizu ◽  
Yo Ishizuka ◽  
Jonathan F. Bard

Author(s):  
Wei Zhang ◽  
Jie Wu ◽  
Yaping Lin

Cloud computing has attracted a lot of interests from both the academics and the industries, since it provides efficient resource management, economical cost, and fast deployment. However, concerns on security and privacy become the main obstacle for the large scale application of cloud computing. Encryption would be an alternative way to relief the concern. However, data encryption makes efficient data utilization a challenging problem. To address this problem, secure and privacy preserving keyword search over large scale cloud data is proposed and widely developed. In this paper, we make a thorough survey on the secure and privacy preserving keyword search over large scale cloud data. We investigate existing research arts category by category, where the category is classified according to the search functionality. In each category, we first elaborate on the key idea of existing research works, then we conclude some open and interesting problems.


Symmetry ◽  
2020 ◽  
Vol 12 (10) ◽  
pp. 1687 ◽  
Author(s):  
Mahmood A. Al-shareeda ◽  
Mohammed Anbar ◽  
Selvakumar Manickam ◽  
Iznan H. Hasbullah

The security and privacy issues in vehicular ad hoc networks (VANETs) are often addressed with schemes based on either public key infrastructure, group signature, or identity. However, none of these schemes appropriately address the efficient verification of multiple VANET messages in high-density traffic areas. Attackers could obtain sensitive information kept in a tamper-proof device (TPD) by using a side-channel attack. In this paper, we propose an identity-based conditional privacy-preserving authentication scheme that supports a batch verification process for the simultaneous verification of multiple messages by each node. Furthermore, to thwart side-channel attacks, vehicle information in the TPD is periodically and frequently updated. Finally, since the proposed scheme does not utilize the bilinear pairing operation or the Map-To-Point hash function, its performance outperforms other schemes, making it viable for large-scale VANETs deployment.


2020 ◽  
Vol 514 ◽  
pp. 557-570
Author(s):  
Yongzhong He ◽  
Chao Wang ◽  
Guangquan Xu ◽  
Wenjuan Lian ◽  
Hequn Xian ◽  
...  

Author(s):  
Wenzhe Lv ◽  
Sheng Wu ◽  
Chunxiao Jiang ◽  
Yuanhao Cui ◽  
Xuesong Qiu ◽  
...  

Sign in / Sign up

Export Citation Format

Share Document