Showing 181 - 196 results of 196 for search '"outsourcing"', query time: 0.03s Refine Results
  1. 181

    Blockchain-based noisy data sharing control protocol by Qingqing XIE, Nianmin YANG, Xia FENG

    Published 2023-10-01
    “…Blockchain provides a trusted channel for information sharing in an untrusted network.However, blockchain ledgers are public and transparent.Hence, the sensitive data stored in plaintext on the blockchain will compromise user privacy.Considering privacy preservation, users are more inclined to provide noisy data.And in different application scenarios, the level of data noise that users need to provide also varies.To this end, a secure, efficient, and searchable noisy data sharing control protocol was proposed based on the blockchain and smart contract technology with the ciphertext policy attribute-based encryption (CP-ABE) algorithm.First, an outsourced CP-ABE algorithm was introduced to reduce the computing burden on the user side.Secondly, smart contract was implemented to perform data search on ciphertext, which could prevent malicious operations by malicious servers.Third, the proposed protocol reduced the data update complexity to O(1), which is friendly to the scenarios with real-time data update.Finally, security analysis and simulation experiments demonstrate the security and feasibility of the proposed protocol.…”
    Get full text
    Article
  2. 182

    Between the Teacher-Translator (TT) and the Officer-Translator (OT): The Useful but Elusive Handshake? by Tunde Ajiboye

    Published 2022-07-01
    “…The central argument is that, whereas the teacher-translator is the indispensable light to the officer-translator, he is not open to being readily outsourced and that, unless regular occasions are provided for the teacher-translator to pull his weight in the field, the assumed parity between both streams might be a nullity. …”
    Get full text
    Article
  3. 183

    Analysis and improvement on identity-based cloud data integrity verification scheme by Shaohui WANG, Xiaoxiao PAN, Zhiwei WANG, Fu XIAO, Ruchuan WANG

    Published 2018-11-01
    “…Many individuals or businesses outsource their data to remote cloud.Cloud storage provides users the advantages of economic convenience,but data owners no longer physically control over the stored data,which introduces new security challenges,such as no security guarantees of integrity and privacy.The security of two identity-based cloud data integrity verification schemes by Zhang et al and Xu et al respectively are analysed.It shows that Zhang et al.’s scheme is subjected to secret key recovery attack for the cloud servers can recover user’s private key only utilizing stored data.And Xu et al.’s scheme cannot satisfy security requirements of soundness.Based on Xu et al.'…”
    Get full text
    Article
  4. 184

    Verifiable access control scheme based on unpaired CP-ABE in fog computing by Jiangtao DONG, Peiwen YAN, Ruizhong DU

    Published 2021-08-01
    “…Fog computing extends computing power and data analysis applications to the edge of the network, solves the latency problem of cloud computing, and also brings new challenges to data security.Attribute encryption based on ciphertext strategy (CP-ABE) is a technology to ensure data confidentiality and fine-grained access control.The excessive computational overhead of bilinear pairing restricts its application and development.In response to this, a verifiable access control scheme was proposed based on unpaired CP-ABE in fog computing.In order to make CP-ABE more efficient, simple scalar multiplication in elliptic curve encryption was used to replace bilinear pairing, thereby reducing the overall computational overhead.Decryption operations were outsourced to fog nodes to reduce user computational complexity, and based on the tamper-proof and traceable characteristics of the blockchain, the correctness of the access transaction was verified and the access authorization process was recorded.Security and performance analysis shows that the scheme is safe under the elliptic curve decision-making DBDH (Diffie-Hellman) assumption, and the calculation efficiency is higher.…”
    Get full text
    Article
  5. 185

    Cachez ce care que je ne saurais voir. Les ajustements méthodologiques d’une étude féministe du travail du care dans le logement collectif by Benjamin Leclercq, Audrey Courbebaisse, Ansao Totolehibe, Chloé Salembier

    Published 2024-04-01
    “…Making domestic and care work visible, quantifying and qualifying in order to recognize, distribute, share, value or outsource it among the society has been one of the major challenges of the feminist project for decades. …”
    Get full text
    Article
  6. 186

    SenseNow: A Time-Dependent Incentive Approach for Vehicular Crowdsensing by Luis G. Jaimes, Harish Chintakunta, Paniz Abedin

    Published 2024-01-01
    “…Here, a platform selects a set of spots or Places of sensing Interest (PsI) and outsources the collection of data from these places. …”
    Get full text
    Article
  7. 187

    Cloud data secure deduplication scheme via role-based symmetric encryption by Jinbo XIONG, Yuanyuan ZHANG, Youliang TIAN, Zuobin YING, Qi LI, Rong MA

    Published 2018-05-01
    “…The rapid development of cloud computing and big data technology brings prople to enter the era of big data,more and more enterprises and individuals outsource their data to the cloud service providers.The explosive growth of data and data replicas as well as the increasing management overhead bring a big challenge to the cloud storage space.Meanwhile,some serious issues such as the privacy disclosure,authorized access,secure deduplication,rekeying and permission revocation should also be taken into account.In order to address these problems,a role-based symmetric encryption algorithm was proposed,which established a mapping relation between roles and role keys.Moreover,a secure deduplication scheme was proposed via role-based symmetric encryption to achieve both the privacy protection and the authorized deduplication under the hierarchical architecture in the cloud computing environment.Furthermore,in the proposed scheme,the group key agreement protocol was utilized to achieve rekeying and permission revocation.Finally,the security analysis shows that the proposed role-based symmetric encryption algorithm is provably secure under the standard model,and the deduplication scheme can meet the security requirements.The performance analysis and experimental results indicate that the proposed scheme is effective and efficient.…”
    Get full text
    Article
  8. 188

    Convolutional neural network model over encrypted data based on functional encryption by Chen WANG, Jiarun LI, Jian XU

    Published 2024-03-01
    “…Currently, homomorphic encryption, secure multi-party computation, and other encryption schemes are used to protect the privacy of sensitive data in outsourced convolutional neural network (CNN) models.However, the computational and communication overhead caused by the above schemes would reduce system efficiency.Based on the low cost of functional encryption, a new convolutional neural network model over encrypted data was constructed using functional encryption.Firstly, two algorithms based on functional encryption were designed, including inner product functional encryption and basic operation functional encryption algorithms to implement basic operations such as inner product, multiplication, and subtraction over encrypted data, reducing computational and communication costs.Secondly, a secure convolutional computation protocol and a secure loss optimization protocol were designed for each of these basic operations, which achieved ciphertext forward propagation in the convolutional layer and ciphertext backward propagation in the output layer.Finally, a secure training and classification method for the model was provided by the above secure protocols in a module-composable way, which could simultaneously protect the confidentiality of user data as well as data labels.Theoretical analysis and experimental results indicate that the proposed model can achieve CNN training and classification over encrypted data while ensuring accuracy and security.…”
    Get full text
    Article
  9. 189

    Time-based and privacy protection revocable and traceable data sharing scheme in cloud computing by Jiawei ZHANG, Jianfeng MA, Zhuo MA, Teng LI

    Published 2021-10-01
    “…General ciphertext-policy attribute-based encryption (CP-ABE) provides fine-grained access control for data sharing in cloud computing, but its plaintext formed access policy may cause leakage of private and sensitive data.And revoking a malicious user by accurately tracing the identity according to a leaked decryption key is a huge challenge.Moreover, most of existing revocable schemes incur long user revocation list and low efficiency.To solve these problems, a time-based and privacy preserving revocable and traceable data sharing scheme was proposed based on CP-ABE to support expressive monotonic and partial hidden access policy, large attribute universe by conceal the attribute values in access policy.Time-limited data access control using hierarchical identity-based encryption was achieved to set key valid period for users.Moreover, with the approaches of white-box tracing and binary tree, efficient user tracing and direct revocation with shorter revocation list was realized together with high efficiency via online/offline and verifiable outsourced decryption techniques.Furthermore, the scheme was secure under decisional q-BDHE assumption.Theoretical analysis and extensive experiments demonstrate its advantageous performance in computational and storage cost.…”
    Get full text
    Article
  10. 190

    The Situation of Social Cooperatives in Small Villages in Hungary by Katalin Lipták

    Published 2024-12-01
    “…Social cooperatives, which are an important pillar of the solidarity economy, have become increasingly popular and common in Hungary over the past 10 years, especially in disadvantaged settlements, where the administrative burden of public employment is outsourced to social cooperatives. Analyzing social cooperatives in small villages is a relevant topic for local economic development. …”
    Get full text
    Article
  11. 191

    Designing an integrated model for innovative goods order fulfillment in a assemble-to-order system considering uncertainty in demand by Babak Javadi, Sasan Taslimi, Niloofar Abdolmaleki

    Published 2024-03-01
    “…Flexible processes, however, are typically outsourced to expedite order delivery and enhance production capacity. …”
    Get full text
    Article
  12. 192

    Dynamic multi-keyword searchable encryption scheme by Chenghao YUAN, Yong LI, Shuang REN

    Published 2023-04-01
    “…Users of cloud storage often outsource their data to cloud servers to save local storage resources.However, cloud storage data is out of the user’s physical control, which may lead to malicious theft or disclosure of private data on cloud.At present, dynamic searchable encryption schemes are mostly based on symmetric searchable encryption, which need to establish a secure key sharing channel in advance, and cannot be directly applied to data sharing in cloud storage scenarios.For the secure sharing scenario of multi-party data in cloud storage, a dynamic multi-keyword searchable encryption scheme was proposed.The forward index was constructed by a cuckoo filter to enable data owners to perform documents and index dynamic updates.The conjunctive multi-keywords search was supported by combining bilinear pairing with Lagrangian interpolation polynomials.To reduce the computational overhead in the ciphertext retrieval phase, a combination of inverted index and forward index was constructed to improve the retrieval efficiency of cloud server.This scheme is provably secure with the indistinguishability in adaptively chosen keyword attack under decision linear Diffie-Hellman problem.Simulation experiments were conducted to analyze the execution efficiency of the scheme for keyword search and index update in different datasets.The results show that the scheme effectively avoids the linear correlation between the retrieval time and the number of ciphertexts, and reduces the computational overhead in the update operation with a large amount of data.…”
    Get full text
    Article
  13. 193

    Encrypted Search Method for Cloud Computing Data Under Attack Based on TF-IDF and Apriori Algorithm by Demei Mao, Mingzhu Wang

    Published 2025-12-01
    “…This research realizes the semantic security of outsourced data, which can efficiently and comprehensively carry out cryptographic retrieval based on keyword sorting.…”
    Get full text
    Article
  14. 194

    The perspective of key stakeholders on the sustainable design of reverse logistics in e-commerce: an interpretive sensemaking review by Iria González Romero, Ángel Ortiz Bas, J. Carlos Prado Prado

    Published 2025-01-01
    “…When this process is outsourced, transport companies also have an impact on all relevant elements. …”
    Get full text
    Article
  15. 195

    Proof of storage with corruption identification and recovery for dynamic group users by Tao JIANG, Hang XU, Liangmin WANG, Jianfeng MA

    Published 2022-10-01
    “…The outsourced storage mode of cloud computing leads to the separation of data ownership and management rights of data owners, which changes the data storage network model and security model.To effectively deal with the software and hardware failures of the cloud server and the potential dishonest service provider and also ensure the availability of the data owners’ data, the design of secure and efficient data availability and recoverability auditing scheme has both theoretical and practical importance in solving the concern of users and ensuring the security of cloud data.However, most of the existing studies were designed for the security and efficiency of data integrity or recoverability schemes, without considering the fast identification and reliable recovery of damaged data under dynamic group users.Thus, to quickly identify and recover damaged data, a publicly verifiable proof of storage scheme was proposed for dynamic group cloud users.The designed scheme enabled a trusted third-party auditor to efficiently identify the damaged files through a challenge-response protocol and allowed the cloud storage server to effectively recover them when the degree of data damage is less than an error correction ability threshold.The scheme combined association calculation and accumulation calculation, which effectively reduced the number of calculations for the identification of damaged data.By combining erasure coding and shared coding technology, the scheme achieved effective recovery of damaged data of dynamic group users.At the same time, the scheme also supported dynamic user revocation, which ensured the integrity audit and reliable recovery of the collective data after user revocation.The network model and threat model of the designed scheme were defined and the security of the scheme under the corresponding security model was proved.Through the prototype implementation of the scheme in the real environment and the modular performance analysis, it is proved that the proposed scheme can effectively identify the damaged data and reliably recover the cloud data when the data is damaged.Besides, compared with other schemes, it is also proved that the proposed scheme has less computational overhead in identifying and recovering damaged data.…”
    Get full text
    Article
  16. 196

    Towards equitable carbon responsibility: Integrating trade-related emissions and carbon sinks in urban decarbonization by Junliang Wu, Yafei Wang, Shuya Zhang, Yu Zhu, Bingyue Fu, Zhihui Zhang, Hanxi Chen, Shaoqing Chen

    Published 2025-03-01
    “…The redistribution of outsourced emissions through supply chains alleviates the mitigation burden on producer cities by 20–30 %. …”
    Get full text
    Article