Academia.edu no longer supports Internet Explorer.
To browse Academia.edu and the wider internet faster and more securely, please take a few seconds to upgrade your browser.
Abstract We present a general-purpose protocol that enables a client to delegate the computation of any function to a cluster of n machines in such a way that no adversary that corrupts at most n− 1 machines can recover any information about the client's input or output. The protocol makes black-box use of multi-party computation (MPC) and secret sharing and inherits the security properties of the underlying MPC protocol (ie, passive vs. adaptive security and security in the presence of a semi-honest vs. malicious adversary).
ACM Computing Surveys
Practical Secure Computation Outsourcing2019 •
The rapid development of cloud computing promotes a wide deployment of data and computation outsourcing to cloud service providers by resource-limited entities. Based on a pay-per-use model, a client without enough computational power can easily outsource large-scale computational tasks to a cloud. Nonetheless, the issue of security and privacy becomes a major concern when the customer’s sensitive or confidential data is not processed in a fully trusted cloud environment. Recently, a number of publications have been proposed to investigate and design specific secure outsourcing schemes for different computational tasks. The aim of this survey is to systemize and present the cutting-edge technologies in this area. It starts by presenting security threats and requirements, followed with other factors that should be considered when constructing secure computation outsourcing schemes. In an organized way, we then dwell on the existing secure outsourcing solutions to different computatio...
2011 •
Abstract We initiate the study of secure multi-party computation (MPC) in a server-aided setting, where the parties have access to a single server that (1) does not have any input to the computation;(2) does not receive any output from the computation; but (3) has a vast (but bounded) amount of computational resources. In this setting, we are concerned with designing protocols that minimize the computation of the parties at the expense of the server.
2019 •
This paper presents Kosto – a framework that provisions a marketplace for secure outsourced computations, wherein the pool of computing resources aggregates that which are offered by a large cohort of independent compute nodes. Kosto protects the confidentiality of clients’ inputs and the integrity of the outsourced computations using trusted hardware’s enclave execution (e.g., Intel SGX). Furthermore, Kosto mediates exchanges between the clients’ payments and the compute nodes’ work in servicing the clients’ requests without relying on a trusted third party. Empirical evaluation on the prototype implementation of Kosto shows that performance overhead incurred by enclave execution is as small as \(3\%\) for computation-intensive operations, and \(1.5{\times }\) for I/O-intensive operations.
Data outsourcing allows data owners to keep their data at untrusted clouds that do not ensure the privacy of data and/or computations. One useful framework for fault-tolerant data processing in a distributed fashion is MapReduce, which was developed for trusted private clouds. This paper presents algorithms for data outsourcing based on Shamir's secret-sharing scheme and for executing privacy-preserving SQL queries such as count, selection including range selection, projection, and join while using MapReduce as an underlying programming model. The proposed algorithms prevent the untrusted cloud to know the database or the query while also preventing output size and access-pattern attacks. Interestingly, our algorithms do not need the database owner, which only creates and distributes secret-shares once, to be involved to answer any query, and hence, the database owner also cannot learn the query. We evaluate the efficiency of the algorithms on parameters: (i) the number of communication rounds (between a user and a cloud), (ii) the total amount of bit flow (between a user and a cloud), and (iii) the computational load at the user-side and the cloud-side.
2013 IEEE 33rd International Conference on Distributed Computing Systems Workshops
Practical and Secure Outsourcing of Matrix Computations to the Cloud2013 •
IACR Cryptology ePrint Archive , 709
Secure Computation for Cloud data Storage2019 •
One of the main goals of securing data transmission is focused on the security of cloud data storage. In this paper, we describe several cryptographic techniques which can be used to address the relevant threats and security goals for analyzing cloud computing security. Private semi-trusted clouds, allow researchers to design private clouds by using cryptographic techniques, to protect the semi-trusted ones. Finally, we elaborate on semi-trusted clouds which are related to real-world deployments of cloud resources, and how optimizing cryptographic protocols, would indeed lead to the usage of this certain cloud and therefore practical ways of securing this type of data.
İletişim Perspektifinden Çanakkale'nin Değerleri
MARKALAŞMA YOLUNDA ÇANAKKALE İÇİN BİR DEĞER ÖNERİSİ: ULUSLARARASI TROYA ÖDÜLLERİ2022 •
I paesaggi fluviali della Sesia fra storia e archeologia. Territori, insediamenti, rappresentazioni, a cura di R. Rao
Le cascine in età moderna. Uno sguardo sulla piana vercellese sud-orientale2016 •
Journal of the American Oriental Society
Review of "Man'yōshū Book 16" by Alexander Vovin2022 •
2024 •
Journal of Environmental Management
Value transfer in ecosystem accounting applications2023 •
Psychologie & Gezondheid
Psychosociale problematiek na eenmalig trauma bij migranten: de casus van een Marokkaanse man met PTSS2011 •
1st Workshop of the Schubert Research Center, ÖAW Vienna, 22-23 March
Schubert, Koželuch, and the History of the Fantasy Genre as a Historiographical Problem2022 •
Soil Research
Seeding next to previous year’s crop row (near-row sowing) can increase grain yields on water repellent soils2021 •
Veterinary Sciences
Doping in Racing Pigeons (Columba livia domestica): A Review and Actual Situation in Belgium, a Leading Country in This Field2022 •
Transactions of the Japan Society of Mechanical Engineers Series C
大型フレキシブル骨組み構造物の混合型最適設計に関する研究 (第1報)1992 •
International Journal of Applied Pharmaceutics
DEVELOPMENT AND OPTIMIZATION OF COATED TABLET CONTAINING AMLODIPINE AND VALSARTAN FOR HYPERTENSION TREATMENT