GIP3: Make Privacy Preserving be Easier on Cloud
نویسندگان
چکیده
منابع مشابه
Privacy-Preserving Accountable Cloud Storage
In cloud storage services, a wide range of sensitive information may be leaked to the host server via the exposure of access pattern albeit data is encrypted. Many security-provable schemes have been proposed to preserve the access pattern privacy; however, they may be vulnerable to attacks towards data integrity or availability from malicious users. This is due to the fact that, preserving acc...
متن کاملPrivacy Preserving Distributed Cloud Storage
Cloud computing models stores data and computing resources in virtual servers located in large data centres’ and are managed using a centralized architecture. Distributed cloud uses resources provided by users who are geographically distributed over a large area. Distributed cloud is completely decentralised and resources are provided in a P2P fashion. This model of distributed cloud is based o...
متن کاملPrivacy-Preserving Cloud Database Querying
Due to its low cost, robustness, flexibility and ubiquitous nature, cloud computing is changing the way entities manage their data. However, various privacy concerns arise whenever potentially sensitive data is outsourced to the cloud. This paper presents a novel approach for coping with such privacy concerns. The proposed scheme prevents the cloud server from learning any possibly sensitive pl...
متن کاملPrivacy-Preserving Cloud-Based Grasp Planning
To support industrial automation, systems such as Grasp-it! and Dex-Net 1.0 provide Grasp Planning as a Service (GPaaS). For example, a manufacturer setting up an automated assembly line for a new product can upload part geometry to the service and receive a ranked set of robust grasp configurations, and the GPaaS can accelerate future grasp planning by statistically analyzing grasps on the par...
متن کاملSecure Cloud based Privacy Preserving DataMinning Platform
The adoption of cloud environment for various application uses has led to security and privacy concern of user’s data. To protect user data and privacy on such platform is an area of concern. Many cryptography strategy has been presented to provide secure sharing of resource on cloud platform. These methods tries to achieve a secure authentication strategy to realize feature such as self-blinda...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: ICST Transactions on Security and Safety
سال: 2021
ISSN: 2032-9393
DOI: 10.4108/eai.25-6-2021.170249