[Retracted] The Rise of Cloud Computing: Data Protection, Privacy, and Open Research Challenges—A Systematic Literature Review (SLR)

J Hassan, D Shehzad, U Habib… - Computational …, 2022 - Wiley Online Library
Cloud computing is a long‐standing dream of computing as a utility, where users can store
their data remotely in the cloud to enjoy on‐demand services and high‐quality applications …

Homomorphic encryption for machine learning in medicine and bioinformatics

A Wood, K Najarian, D Kahrobaei - ACM Computing Surveys (CSUR), 2020 - dl.acm.org
Machine learning and statistical techniques are powerful tools for analyzing large amounts
of medical and genomic data. On the other hand, ethical concerns and privacy regulations …

A pragmatic introduction to secure multi-party computation

D Evans, V Kolesnikov, M Rosulek - Foundations and Trends® …, 2018 - nowpublishers.com
Secure multi-party computation (MPC) has evolved from a theoretical curiosity in the 1980s
to a tool for building real systems today. Over the past decade, MPC has been one of the …

Sok: General purpose compilers for secure multi-party computation

M Hastings, B Hemenway, D Noble… - … IEEE symposium on …, 2019 - ieeexplore.ieee.org
Secure multi-party computation (MPC) allows a group of mutually distrustful parties to
compute a joint function on their inputs without revealing any information beyond the result …

Privacy-preserving cloud computing on sensitive data: A survey of methods, products and challenges

J Domingo-Ferrer, O Farras, J Ribes-González… - Computer …, 2019 - Elsevier
The increasing volume of personal and sensitive data being harvested by data controllers
makes it increasingly necessary to use the cloud not just to store the data, but also to …

HE3DB: An efficient and elastic encrypted database via arithmetic-and-logic fully homomorphic encryption

S Bian, Z Zhang, H Pan, R Mao, Z Zhao, Y **… - Proceedings of the …, 2023 - dl.acm.org
As concerns are increasingly raised about data privacy, encrypted database management
system (DBMS) based on fully homomorphic encryption (FHE) attracts increasing research …

Secure and efficient outsourcing of PCA-based face recognition

Y Zhang, X **ao, LX Yang, Y **ang… - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
Face recognition has become increasingly popular in recent years. However, in some
special cases, many face recognition calculations cannot be performed effectively due to the …

OBFP: Optimized blockchain-based fair payment for outsourcing computations in cloud computing

C Lin, D He, X Huang, KKR Choo - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
Outsourcing computations have been widely used to meet the growing computing demands,
although achieving trust in an untrusted (or a zero-trust) environment can be challenging in …

Enhancing trust and privacy in distributed networks: a comprehensive survey on blockchain-based federated learning

J Liu, C Chen, Y Li, L Sun, Y Song, J Zhou… - … and Information Systems, 2024 - Springer
While centralized servers pose a risk of being a single point of failure, decentralized
approaches like blockchain offer a compelling solution by implementing a consensus …

SOCI: A toolkit for secure outsourced computation on integers

B Zhao, J Yuan, X Liu, Y Wu, HH Pang… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
Secure outsourced computation is a key technique for protecting data security and privacy in
the cloud. Although fully homomorphic encryption (FHE) enables computations over …