Fu et al., 2019 - Google Patents
Cloud-based outsourcing for enabling privacy-preserving large-scale non-negative matrix factorizationFu et al., 2019
- Document ID
- 616346071274129835
- Author
- Fu A
- Chen Z
- Mu Y
- Susilo W
- Sun Y
- Wu J
- Publication year
- Publication venue
- IEEE Transactions on Services Computing
External Links
Snippet
It is inevitable and evident that outsourcing complicated intensive tasks to public cloud vendors would be the primary option for resource-constrained clients in order to save cost. Unfortunately, the public cloud vendors are usually untrusted. They may inadvertently leak …
- 239000011159 matrix material 0 title abstract description 73
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
- G06F21/6263—Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/64—Protecting data integrity, e.g. using checksums, certificates or signatures
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2107—File encryption
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Fu et al. | Cloud-based outsourcing for enabling privacy-preserving large-scale non-negative matrix factorization | |
CN106803784B (en) | Lattice-based multi-user fuzzy searchable encryption method in secure multimedia cloud storage | |
Nikolaenko et al. | Privacy-preserving matrix factorization | |
Benjamin et al. | Private and cheating-free outsourcing of algebraic computations | |
Atallah et al. | Securely outsourcing linear algebra computations | |
US10083310B1 (en) | System and method for mobile proactive secure multi-party computation (MPMPC) using commitments | |
Salinas et al. | Efficient secure outsourcing of large-scale linear systems of equations | |
US8898478B2 (en) | Method for querying data in privacy preserving manner using attributes | |
Liu et al. | Secure multi-label data classification in cloud by additionally homomorphic encryption | |
US20160004874A1 (en) | A method and system for privacy preserving matrix factorization | |
Zheng et al. | Privacy-preserving image denoising from external cloud databases | |
EP3031165A2 (en) | A method and system for privacy preserving matrix factorization | |
Erkin et al. | Privacy-preserving distributed clustering | |
US11411742B2 (en) | Private set calculation using private intersection and calculation, and applications thereof | |
Guo et al. | A multi-threshold secret image sharing scheme based on the generalized Chinese reminder theorem | |
US10211980B1 (en) | Method for lattice-based decryption of data | |
Hu et al. | Secure outsourced computation of the characteristic polynomial and eigenvalues of matrix | |
Chen | Introduction to secure outsourcing computation | |
Yang et al. | Zero knowledge based client side deduplication for encrypted files of secure cloud storage in smart cities | |
Pramkaew et al. | Lightweight scheme of secure outsourcing SVD of a large matrix on cloud | |
Pilaram et al. | An efficient lattice‐based threshold signature scheme using multi‐stage secret sharing | |
Hong et al. | Constructing conditional PKEET with verification mechanism for data privacy protection in intelligent systems | |
US12008136B2 (en) | Systems and methods for privacy-preserving inventory matching with security against malicious adversaries | |
Non-Negative | Cloud-based Outsourcing for Enabling Privacy-Preserving Large-scale Non-Negative Matrix Factorization | |
Guo et al. | A privacy preserving Markov model for sequence classification |