Search
Now showing items 1-10 of 10
CloudFlow: A data-aware programming model for cloud workflow applications on modern HPC systems
(
Elsevier
, 2015 , Article)
Traditional High-Performance Computing (HPC) based big-data applications are usually constrained by having to move large amount of data to compute facilities for real-time processing purpose. Modern HPC systems, represented ...
An efficient instance hiding scheme
(
Association for Computing Machinery
, 2016 , Conference Paper)
Delegating computation, which is applicable to many practical contexts such as cloud computing or pay-TV system, concerns the task where a computationally weak client wants to securely compute a very complex function f on ...
Similarity Group-by Operators for Multi-Dimensional Relational Data
(
IEEE Computer Society
, 2016 , Conference Paper)
The SQL group-by operator plays an important role in summarizing and aggregating large datasets in a data analytics stack. While the standard group-by operator, which is based on equality, is useful in several applications, ...
A scalable solution for finding overlaps between sequences using map-reduce
(
The International Society for Computers and Their Applications (ISCA)
, 2016 , Conference Paper)
The overlap stage of a string graph-based assembler is considered one of the most time- and space-consuming stages in any de novo overlap-based assembler. This is due to the huge output of the next-generation sequencing ...
Privacy preserving computation in cloud using noise-free fully homomorphic encryption (FHE) schemes
(
Springer Verlag
, 2016 , Conference Paper)
With the wide adoption of cloud computing paradigm, it is important to develop appropriate techniques to protect client data privacy in the cloud. Encryption is one of the major techniques that could be used to achieve ...
Skyline Discovery and Composition of Multi-Cloud Mashup Services
(
Institute of Electrical and Electronics Engineers
, 2016 , Article)
A cloud mashup is composed of multiple services with shared datasets and integrated functionalities. For example, the elastic compute cloud (EC2) provided by Amazon Web Service (AWS), the authentication and authorization ...
Automatic generation of optimized workflow for distributed computations on large-scale matrices
(
Springer Verlag
, 2014 , Conference Paper)
Efficient evaluation of distributed computation on large-scale data is prominent in modern scientific computation; especially analysis of big data, image processing and data mining applications. This problem is particularly ...
Paillier's encryption: Implementation and cloud applications
(
Institute of Electrical and Electronics Engineers Inc.
, 2015 , Conference Paper)
Paillier's additive homomorphic encryption is increasingly used in recent research in the field of cloud secure outsourcing and privacy-preserving computation in addition to other cryptographic tools such as garbled circuits. ...
A Domain Specific Language for Secure Outsourcing of Computation to the Cloud
(
Institute of Electrical and Electronics Engineers Inc.
, 2015 , Conference Paper)
Secure outsourcing of computation has gained importance with the proliferation of cloud services. However, existing outsourcing protocol specification languages are mainly suitable for secure multi-party computation. They ...
A model driven framework for secure outsourcing of computation to the cloud
(
IEEE Computer Society
, 2014 , Conference Paper)
This paper presents a model driven approach to define then coordinate the execution of protocols for secure outsourcing of computation of large datasets in cloud computing environments. First we present our Outsourcing ...