Homomorphic computing of encrypted data outsourcing in cloud data center

Authors

  • Hao Bao

DOI:

https://doi.org/10.54097/fcis.v2i1.2482

Keywords:

Cloud data center, Data encryption, Data outsourcing, Homomorphic computing

Abstract

In the era of data explosion, data contains massive information, such as health data, time and place, hydrological waves, etc. In order to process and calculate these data, local Wang networking devices will send data to the cloud data center for outsourcing processing due to their limited storage and computing capabilities. However, our data contains a large amount of private data, so we need to protect the privacy of our outsourced data before outsourcing, so as to protect our personal privacy. At the same time, cloud data centers have strong advantages in data storage and computing capabilities, so cloud data centers are increasingly used.

Downloads

Download data is not yet available.

References

Y. Guan, R. Lu, Y. Zheng, S. Zhang, J. Shao, and G. Wei, "Toward Privacy-Preserving Cybertwin-Based Spatio-Temporal Keyword Query for ITS in 6G Era", IEEE Internet of Things Journal, Vol. 8, No. 22, pp. 16243-16255, 2021.

J. Jiao, S. Wu, R. Lu, and Q. Zhang, "Massive Access in Space-based Internet of Things: Challenges, Opportunities, and Future Directions,” IEEE Wireless Communications, Vol. 28, No. 5, pp. 118-125, 2021.

M. Zhou, Y. Zheng, Y. Guan, L. Peng, and R. Lu, "Efficient and Privacy-Preserving Range-Max Query In Fog-based Agriculture IoT", Peer-to-Peer Networking and Applications, Vol. 14, No. 4, pp. 2156-2170, 2021.

J. Jiao, L. Xu, S. Wu, R. Lu, and Q. Zhang, "MSPA: Multi-Slot Pilot Allocation Random Access Protocol for mMTC-enabled IoT System", IEEE Internet of Things Journal, Vol. 8, No. 24, pp. 17403-17416, 2021.

X. Yang, H. Zhu, F. Wang, S. Zhang, R. Lu, and H. Li, "MASK: Efficient and Privacy-Preserving M-tree Based Biometric Identification over Cloud", Peer-to-Peer Networking and Applications, Vol. 14, No. 4, pp. 2171-2186, 2021.

X. Zhang, R. Lu, J. Shao, H. Zhu, and A. Ghorbani, "Continuous Probabilistic Skyline Query for Secure Worker Selection in Mobile Crowdsensing", IEEE Internet of Things Journal, Vol. 8, No. 14, pp. 11758-11772, 2021.

P. Zeng, Z. Zhang, R. Lu, and K. Choo, "Efficient Policy-Hiding and Large Universe Attribute-Based Encryption with Public Traceability for Internet of Medical Things", IEEE Internet of Things Journal, Vol. 8, No. 13, pp. 10963-10972, 2021.

X. Li, S. Liu, R. Lu, and X. Zhang, "On Security of An Identity-Based Dynamic Data Auditing Protocol for Big Data Storage", IEEE Transactions on Big Data, Vol. 7, No. 6, pp. 975-977, 2021.

Q. Kong, R. Lu, Y. Feng, and S. Cui, "Privacy-Preserving Continuous Data Collection for Predictive Maintenance in Vehicular Fog-Cloud", IEEE Transactions on Intelligent Transportation Systems, Vol. 22, No. 8, pp. 5060-5070, 2021.

K. Zhang, M. Wen, R. Lu, and K. Chen, "Multi-client Sub-Linear Boolean Keyword Searching for Encrypted Cloud Storage with Owner-Enforced Authorization", Transactions on Dependable and Secure Computing, Vol. 18, No. 6, pp. 2875-2887, 2021.

X. Yang, R. Lu, J. Shao, X. Tang, and A. Ghorbani, "Achieving Efficient and Privacy-Preserving Multi-Domain Big Data Deduplication in Cloud", IEEE Transactions on Services Computing, Vol. 14, No. 5, pp. 1292-1305, 2021.

Q. Kong, R. Lu, F. Yin, and S. Cui, "Blockchain-Based Privacy-Preserving Driver Monitoring for MaaS in the Vehicular IoT", IEEE Transactions on Vehicular Technology, Vol. 70, No. 4, pp. 3788-3799, 2021. [PDF]

Y. Zhan, B. Wang, R. Lu, and Y. Yu, "DRBFT: Delegated Randomization Byzantine Fault Tolerance Consensus Protocol for Blockchains", Information Science, Vol. 559, pp. 8-21, 2021. [PDF]

S. Zhang, S. Ray, R. Lu, Y. Zheng, and J. Shao, "Preserving Location Privacy for Outsourced Most-Frequent Item Query in Mobile Crowdsensing", IEEE Internet of Things Journal, Vol. 8, No. 11, pp. 9139-9150, 2021. [PDF]

F. Wang, H. Zhu, R. Lu, Y. Zheng, and H. Li, "A Privacy-preserving and Non-interactive Federated Learning Scheme for Regression Training with Gradient Descent", Information Sciences, Vol. 552, pp. 183-200, 2021. [PDF]

B. Hu, Z. Zhang, J. Liu, Y. Liu, J. Yin, R. Lu, and X. Lin, "A Comprehensive Survey on Smart Contract Construction and Execution: Paradigms, Tools and Systems", Patterns, Vol. 2, No. 2, pp. 100179, 2021. [PDF]

J. Wang, S. Hao, R. Wen, B. Zhang, H. Hu, and R. Lu, "IoT-Praetor: Undesired Behaviors Detection for IoT Devices", IEEE Internet of Things Journal, Vol. 8, No. 2, pp. 927-940, 2021.

Downloads

Published

23-11-2022

Issue

Section

Articles

How to Cite

Bao, H. (2022). Homomorphic computing of encrypted data outsourcing in cloud data center. Frontiers in Computing and Intelligent Systems, 2(1), 1-3. https://doi.org/10.54097/fcis.v2i1.2482