Ensuring security and privacy preservation for cloud data services

J Tang, Y Cui, Q Li, K Ren, J Liu, R Buyya - ACM Computing Surveys …, 2016 - dl.acm.org
With the rapid development of cloud computing, more and more enterprises/individuals are
starting to outsource local data to the cloud servers. However, under open networks and not …

Efficient secure similarity computation on encrypted trajectory data

A Liu, K Zhengy, L Liz, G Liu, L Zhao… - 2015 IEEE 31st …, 2015 - ieeexplore.ieee.org
Outsourcing database to clouds is a scalable and cost-effective way for large scale data
storage, management, and query processing. Trajectory data contain rich spatio-temporal …

Efficient oblivious query processing for range and knn queries

Z Chang, D Xie, F Li, JM Phillips… - … on Knowledge and …, 2021 - ieeexplore.ieee.org
Increasingly, individuals and companies adopt a cloud service provider as a primary data
and IT infrastructure platform. The remote access of the data inevitably brings the issue of …

A Parallel Privacy-Preserving k-Means Clustering Algorithm for Encrypted Databases in Cloud Computing

Y Song, HJ Kim, HJ Lee, JW Chang - Applied Sciences, 2024 - mdpi.com
With the development of cloud computing, interest in database outsourcing has recently
increased. However, when the database is outsourced, there is a problem in that the …

Partial message verification in fog-based industrial Internet of things

H Yan, H Hu, Q Ye - Computers & Security, 2023 - Elsevier
Due to the emergence of fog computing, the computational resources can be deployed close
to the data source and conduct data-driven tasks. A typical scenario is integrity assurance in …

Performing secure queries from a higher security domain of information in a lower security domain

GA Bent, FA Bergamaschi - US Patent 10,572,677, 2020 - Google Patents
(57) ABSTRACT A method generates, in a higher security domain (SD), public and secret
keys using a first homomorphic encryption scheme (HES), passes the public key to a first …

MExMI: Pool-based active model extraction crossover membership inference

Y Xiao, Q Ye, H Hu, H Zheng… - Advances in Neural …, 2022 - proceedings.neurips.cc
With increasing popularity of Machine Learning as a Service (MLaaS), ML models trained
from public and proprietary data are deployed in the cloud and deliver prediction services to …

Efficient two party oblivious transfer using a leveled fully homomorphic encryption

DF Bacon, GA Bent, FA Bergamaschi… - US Patent …, 2017 - Google Patents
A querying node generates public keys, secret keys, and switch key matrices. A public key
associated with a first level and the switch key matrices are sent to a receiving node. The …

DeepMark: A Scalable and Robust Framework for DeepFake Video Detection

L Tang, Q Ye, H Hu, Q Xue, Y Xiao, J Li - ACM Transactions on Privacy …, 2024 - dl.acm.org
With the rapid growth of DeepFake video techniques, it becomes increasingly challenging to
identify them visually, posing a huge threat to our society. Unfortunately, existing detection …

On search friction of route discovery in offchain networks

S Tochner, S Schmid - 2020 IEEE International Conference on …, 2020 - ieeexplore.ieee.org
Offchain networks provide a promising solution to overcome the scalability challenges of
cryptocurrencies. However, design tradeoffs of offchain networks are still not well …