Achieving Scalable Access Control Over Encrypted Data for Edge Computing Networks
نویسندگان
چکیده
منابع مشابه
Auditing Services in Cloud Computing For Achieving Data Access Control
Cloud computing has a great tendancy of providing robust computational power to the society at reduced cost. The wide adoption of this promising computation model is prevented by security which is the primary obstacle especially for customers when their confidential data are consumed and produced during the computation. The data stored in the cloud may be frequently updated by the users. It has...
متن کاملReview of " Achieving Secure , Scalable , and Fine - grained Data Access Control in Cloud Computing
Cloud computing is an emerging computing paradigm in which resources of the computing infrastructure are provided as services over the Internet. As promising as it is, this paradigm also brings forth many new challenges for data security and access control when users outsource sensitive data for sharing on cloud servers, which are not within the same trusted domain as data owners. To keep sensi...
متن کاملCrypto-Nets: Neural Networks over Encrypted Data
The problem we address is the following: how can a user employ a predictive model that is held by a third party, without compromising private information. For example, a hospital may wish to use a cloud service to predict the readmission risk of a patient. However, due to regulations, the patient’s medical files cannot be revealed. The goal is to make an inference using the model, without jeopa...
متن کاملCryptoDL: Deep Neural Networks over Encrypted Data
Machine learning algorithms based on deep neural networks have achieved remarkable results and are being extensively used in different domains. However, the machine learning algorithms requires access to raw data which is often privacy sensitive. To address this issue, we develop new techniques to provide solutions for running deep neural networks over encrypted data. In this paper, we develop ...
متن کاملComputing on Encrypted Data
Encryption secures our stored data but seems to make it inert. Can we process encrypted data without having to decrypt it first? Answers to this fundamental question give rise to a wide variety of applications. Here, we explore this question in a number of settings, focusing on how interaction and secure hardware can help us compute on encrypted data, and what can be done if we have neither int...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IEEE Access
سال: 2018
ISSN: 2169-3536
DOI: 10.1109/access.2018.2844373