An End to End Cloud Computing Privacy Framework Using Blind Processing

[1]  H. T. Mouftah,et al.  Blind decryption for cloud computing , 2016, 2016 IEEE Symposium on Computers and Communication (ISCC).

[2]  Matthew Green Secure Blind Decryption , 2011, IACR Cryptol. ePrint Arch..

[3]  Joseph K. Liu,et al.  Building a dynamic searchable encrypted medical database for multi-client , 2020, Inf. Sci..

[4]  Tingting Wang,et al.  An Efficient Secure Channel Free Searchable Encryption Scheme with Multiple Keywords , 2016, NSS.

[5]  Khalil El-Khatib,et al.  Encrypted processes for oblivious data retrieval , 2011, 2011 International Conference for Internet Technology and Secured Transactions.

[6]  Rafail Ostrovsky,et al.  Searchable symmetric encryption: Improved definitions and efficient constructions , 2011, J. Comput. Secur..

[7]  Joonsang Baek,et al.  Public Key Encryption with Keyword Search Revisited , 2008, ICCSA.

[8]  Anat Paskin-Cherniavsky,et al.  Evaluating Branching Programs on Encrypted Data , 2007, TCC.

[9]  Xudong Fan,et al.  TPTVer: A trusted third party based trusted verifier for multi-layered outsourced big data system in cloud environment , 2018, China Communications.

[10]  George J. Pappas,et al.  Secure Multi-party Computation for Cloud-based Control , 2019, Privacy in Dynamical Systems.

[11]  Mohammed Ahmed Al-Fayoumi,et al.  Blind Decryption and Privacy Protection , 2005 .

[12]  Fumiaki Sato,et al.  Securing of Clouds Based on Lightweight Secure Multi-party Computation , 2018, CISIS.

[13]  Khalil El-Khatib,et al.  Privacy Preserving Scheme for Location-Based Services , 2012, J. Information Security.

[14]  Bingsheng Zhang,et al.  Efficient Generalized Selective Private Function Evaluation with Applications in Biometric Authentication , 2009, Inscrypt.

[15]  Salvatore J. Stolfo,et al.  Usable, Secure, Private Search , 2012, IEEE Security & Privacy.

[16]  Mihir Bellare,et al.  Searchable Encryption Revisited: Consistency Properties, Relation to Anonymous IBE, and Extensions , 2005, Journal of Cryptology.

[17]  Khalil El-Khatib,et al.  A fully private video on-Demand service , 2012, 2012 25th IEEE Canadian Conference on Electrical and Computer Engineering (CCECE).

[18]  Elisa Bertino,et al.  DBMask: Fine-Grained Access Control on Encrypted Relational Databases , 2016, Trans. Data Priv..

[19]  Craig Gentry,et al.  Private Database Queries Using Somewhat Homomorphic Encryption , 2013, ACNS.

[20]  Yuval Ishai,et al.  Selective private function evaluation with applications to private statistics , 2001, PODC '01.

[21]  Khalil El-Khatib,et al.  A Secure Database System using Homomorphic Encryption Schemes , 2011, DBKDA 2011.

[22]  D.K. Aarthy,et al.  Reputation-based trust management in cloud using a trusted third party , 2017, 2017 Third International Conference on Science Technology Engineering & Management (ICONSTEM).

[23]  Debasis Das,et al.  Secure cloud computing algorithm using homomorphic encryption and multi-party computation , 2018, 2018 International Conference on Information Networking (ICOIN).

[24]  Craig Gentry,et al.  Computing arbitrary functions of encrypted data , 2010, CACM.

[25]  Jianhua Chen,et al.  Certificateless Searchable Public Key Encryption Scheme for Industrial Internet of Things , 2018, IEEE Transactions on Industrial Informatics.

[26]  Adil Maarouf,et al.  An Autonomic SLA Monitoring Framework Managed by Trusted Third Party in the Cloud Computing , 2018, Int. J. Cloud Appl. Comput..

[27]  Noopur Katre,et al.  Trusted third party for data security in cloud environment , 2016, 2016 2nd International Conference on Advances in Electrical, Electronics, Information, Communication and Bio-Informatics (AEEICB).

[28]  Michael Mitzenmacher,et al.  Privacy Preserving Keyword Searches on Remote Encrypted Data , 2005, ACNS.

[29]  Albert Levi,et al.  Towards Practical PFE: An Efficient 2-Party Private Function Evaluation Protocol Based on Half Gates , 2019, IACR Cryptol. ePrint Arch..

[30]  Jian Shen,et al.  Privacy preserving multi-party computation delegation for deep learning in cloud computing , 2018, Inf. Sci..

[31]  Mehmet Sabir Kiraz,et al.  Highly Efficient and Reusable Private Function Evaluation with Linear Complexity , 2018, IACR Cryptol. ePrint Arch..

[32]  Kouichi Sakurai,et al.  Blind Decoding, Blind Undeniable Signatures, and Their Applications to Privacy Protection , 1996, Information Hiding.

[33]  Rafail Ostrovsky,et al.  Public Key Encryption with Keyword Search , 2004, EUROCRYPT.

[34]  Hongwei Li,et al.  Secure Multi-Party Computation: Theory, practice and applications , 2019, Inf. Sci..

[35]  Valéria Cesário Times,et al.  A framework for investigating the performance of sum aggregations over encrypted data warehouses , 2015, SAC.