Privacy-preserving cloud computing on sensitive data: A survey of methods, products and challenges
The increasing volume of personal and sensitive data being harvested by data controllers
makes it increasingly necessary to use the cloud not just to store the data, but also to …
makes it increasingly necessary to use the cloud not just to store the data, but also to …
Practical secure computation outsourcing: A survey
The rapid development of cloud computing promotes a wide deployment of data and
computation outsourcing to cloud service providers by resource-limited entities. Based on a …
computation outsourcing to cloud service providers by resource-limited entities. Based on a …
A hyper-heuristic scheduling algorithm for cloud
CW Tsai, WC Huang, MH Chiang… - … on Cloud Computing, 2014 - ieeexplore.ieee.org
Rule-based scheduling algorithms have been widely used on many cloud computing
systems because they are simple and easy to implement. However, there is plenty of room to …
systems because they are simple and easy to implement. However, there is plenty of room to …
Secure and efficient outsourcing of PCA-based face recognition
Face recognition has become increasingly popular in recent years. However, in some
special cases, many face recognition calculations cannot be performed effectively due to the …
special cases, many face recognition calculations cannot be performed effectively due to the …
Link prediction via linear optimization
Link prediction is an elemental challenge in network science, which has already found
applications in guiding laboratorial experiments, digging out drug targets, recommending …
applications in guiding laboratorial experiments, digging out drug targets, recommending …
Achieving security, robust cheating resistance, and high-efficiency for outsourcing large matrix multiplication computation to a malicious cloud
Computation outsourcing to the cloud has become a popular application in the age of cloud
computing. This computing paradigm brings in some new security concerns and challenges …
computing. This computing paradigm brings in some new security concerns and challenges …
OPoR: Enabling proof of retrievability in cloud computing with resource-constrained devices
Cloud computing moves the application software and databases to the centralized large
data centers, where the management of the data and services may not be fully trustworthy. In …
data centers, where the management of the data and services may not be fully trustworthy. In …
Energy minimization with soft real-time and DVS for uniprocessor and multiprocessor embedded systems
Energy-saving is extremely important in real-time embedded systems. Dynamic voltage
scaling (DVS) is one of the prime techniques used to achieve energy-saving. Due to the …
scaling (DVS) is one of the prime techniques used to achieve energy-saving. Due to the …
Cloud computing service: The caseof large matrix determinant computation
Cloud computing paradigm provides an alternative and economical service for resource-
constrained clients to perform large-scale data computation. Since large matrix determinant …
constrained clients to perform large-scale data computation. Since large matrix determinant …
Cross-layer design for secure and resilient cyber-physical systems
This book presents control and game-theoretic tools to design secure and resilient cyber-
physical systems, including cloud-enabled control systems, 3D printers, robotic systems, and …
physical systems, including cloud-enabled control systems, 3D printers, robotic systems, and …