Nothing Special   »   [go: up one dir, main page]

Fu et al., 2019 - Google Patents

Cloud-based outsourcing for enabling privacy-preserving large-scale non-negative matrix factorization

Fu et al., 2019

Document ID
616346071274129835
Author
Fu A
Chen Z
Mu Y
Susilo W
Sun Y
Wu J
Publication year
Publication venue
IEEE Transactions on Services Computing

External Links

Snippet

It is inevitable and evident that outsourcing complicated intensive tasks to public cloud vendors would be the primary option for resource-constrained clients in order to save cost. Unfortunately, the public cloud vendors are usually untrusted. They may inadvertently leak …
Continue reading at ieeexplore.ieee.org (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • G06F21/6263Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2107File encryption
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer

Similar Documents

Publication Publication Date Title
Fu et al. Cloud-based outsourcing for enabling privacy-preserving large-scale non-negative matrix factorization
CN106803784B (en) Lattice-based multi-user fuzzy searchable encryption method in secure multimedia cloud storage
Nikolaenko et al. Privacy-preserving matrix factorization
Benjamin et al. Private and cheating-free outsourcing of algebraic computations
Atallah et al. Securely outsourcing linear algebra computations
US10083310B1 (en) System and method for mobile proactive secure multi-party computation (MPMPC) using commitments
Salinas et al. Efficient secure outsourcing of large-scale linear systems of equations
US8898478B2 (en) Method for querying data in privacy preserving manner using attributes
Liu et al. Secure multi-label data classification in cloud by additionally homomorphic encryption
US20160004874A1 (en) A method and system for privacy preserving matrix factorization
Zheng et al. Privacy-preserving image denoising from external cloud databases
EP3031165A2 (en) A method and system for privacy preserving matrix factorization
Erkin et al. Privacy-preserving distributed clustering
US11411742B2 (en) Private set calculation using private intersection and calculation, and applications thereof
Guo et al. A multi-threshold secret image sharing scheme based on the generalized Chinese reminder theorem
US10211980B1 (en) Method for lattice-based decryption of data
Hu et al. Secure outsourced computation of the characteristic polynomial and eigenvalues of matrix
Chen Introduction to secure outsourcing computation
Yang et al. Zero knowledge based client side deduplication for encrypted files of secure cloud storage in smart cities
Pramkaew et al. Lightweight scheme of secure outsourcing SVD of a large matrix on cloud
Pilaram et al. An efficient lattice‐based threshold signature scheme using multi‐stage secret sharing
Hong et al. Constructing conditional PKEET with verification mechanism for data privacy protection in intelligent systems
US12008136B2 (en) Systems and methods for privacy-preserving inventory matching with security against malicious adversaries
Non-Negative Cloud-based Outsourcing for Enabling Privacy-Preserving Large-scale Non-Negative Matrix Factorization
Guo et al. A privacy preserving Markov model for sequence classification