Towards secure big data analytic for cloud-enabled applications with fully homomorphic encryption
暂无分享,去创建一个
Xun Yi | Abdulatif Alabdulatif | Ibrahim Khalil | X. Yi | I. Khalil | A. Alabdulatif | Abdulatif Alabdulatif
[1] Kim-Kwang Raymond Choo,et al. Cloud Manufacturing: Security, Privacy, and Forensic Concerns , 2016, IEEE Cloud Computing.
[2] Josep Domingo-Ferrer,et al. Privacy-preserving cloud computing on sensitive data: A survey of methods, products and challenges , 2019, Comput. Commun..
[3] Yücel Saygin,et al. Privacy preserving clustering on horizontally partitioned data , 2007, Data Knowl. Eng..
[4] Chris Peikert,et al. On Ideal Lattices and Learning with Errors over Rings , 2010, JACM.
[5] Yitao Duan,et al. Practical Distributed Privacy-Preserving Data Analysis at Large Scale , 2014, Large-Scale Data Analytics.
[6] Ibrahim Khalil,et al. Privacy-preserving anomaly detection in cloud with lightweight homomorphic encryption , 2017, J. Comput. Syst. Sci..
[7] Abdulsalam Yassine,et al. IoT big data analytics for smart homes with fog and cloud computing , 2019, Future Gener. Comput. Syst..
[8] Jian Weng,et al. Privacy-Preserving Image Processing in the Cloud , 2018, IEEE Cloud Computing.
[9] Wenjing Lou,et al. A privacy-preserved full-text retrieval algorithm over encrypted data for cloud storage applications , 2017, J. Parallel Distributed Comput..
[10] T. Elgamal. A public key cryptosystem and a signature scheme based on discrete logarithms , 1984, CRYPTO 1984.
[11] Debasish Ghose,et al. Applications to Ubiquitous Computing Environments , 2017 .
[12] Oded Goldreich,et al. Foundations of Cryptography - A Primer , 2005, Found. Trends Theor. Comput. Sci..
[13] Maria Fazio,et al. A framework for real time end to end monitoring and big data oriented management of smart environments , 2019, J. Parallel Distributed Comput..
[14] Craig Gentry,et al. (Leveled) fully homomorphic encryption without bootstrapping , 2012, ITCS '12.
[15] Osmar R. Zaïane,et al. Privacy Preserving Clustering by Data Transformation , 2010, J. Inf. Data Manag..
[16] Devesh C. Jinwala,et al. An Efficient Approach for Privacy Preserving Distributed Clustering in Semi-honest Model Using Elliptic Curve Cryptography , 2015 .
[17] Adi Shamir,et al. A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.
[18] Zekeriya Erkin,et al. Privacy-preserving distributed clustering , 2013, EURASIP J. Inf. Secur..
[19] Agostinho C. Rosa,et al. Spectrometric differentiation of yeast strains using minimum volume increase and minimum direction change clustering criteria , 2014, Pattern Recognit. Lett..
[20] Tinghuai Ma,et al. A privacy preserving location service for cloud-of-things system , 2019, J. Parallel Distributed Comput..