2018
DOI: 10.1002/cpe.4523
|View full text |Cite
|
Sign up to set email alerts
|

Verifiable Chebyshev maps‐based chaotic encryption schemes with outsourcing computations in the cloud/fog scenarios

Abstract: SummaryBased on cloud servers' powerful storage and computing resources, users can store mass encrypted data in the cloud and outsource complex encryption computations to the cloud servers. Since cloud servers cannot be completely trusted, then data privacy and integrity are concerned about hot issues. We focus on the following problems in outsourced encryptions: how to protect the data privacy and how to check the integrity of data and the correctness of cloud server's outsourcing computations. In this paper,… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
16
0

Year Published

2018
2018
2022
2022

Publication Types

Select...
8

Relationship

0
8

Authors

Journals

citations
Cited by 16 publications
(16 citation statements)
references
References 35 publications
0
16
0
Order By: Relevance
“…However, how to securely outsource the computation to the cloud is a major challenge. Different solutions have been proposed which address this issue [77][78][79][80]. In the research of ML, Li et al [76] discussed theoretical aspects of privacy in the sense of data privacy and privacy in the training model using deep learning.…”
Section: Privacy Preservationmentioning
confidence: 99%
“…However, how to securely outsource the computation to the cloud is a major challenge. Different solutions have been proposed which address this issue [77][78][79][80]. In the research of ML, Li et al [76] discussed theoretical aspects of privacy in the sense of data privacy and privacy in the training model using deep learning.…”
Section: Privacy Preservationmentioning
confidence: 99%
“…6 For privacy protection, users often do not want to expose their personal information. 7,8 For example, some users do not want to reveal that they have been to the hospital, or some users deliberately hide their experience of having been to the bar. Users act in this way to protect their privacy and avoid check-in, which leads to the sparse check-in.…”
Section: Introductionmentioning
confidence: 99%
“…Privacy protection 6 . For privacy protection, users often do not want to expose their personal information 7,8 . For example, some users do not want to reveal that they have been to the hospital, or some users deliberately hide their experience of having been to the bar.…”
Section: Introductionmentioning
confidence: 99%
“…Jing Li et al, they proposed a verifiable chebyshev maps-based chaotic encryption schemes with outsourcing computations in the cloud/fog scenarios [32]. Jin Li, Xiaofeng Chen and Sherman S. M. Chow proposed multi-authority fine-grained access control with accountability approach for cloud computing [33]. A privacy-preserving naive bayesian classifier, secure against the substitution-then-comparison attack, was presented by Chong-zhi Gao, Qiong Cheng, and Pei He [34]; we could adapt the privacy-preserving technique into our method in the future.…”
Section: Introductionmentioning
confidence: 99%