Browsing Academic by Subject "Confidentiality"
Now showing items 1-8 of 8
-
Data Obfuscation for Privacy and Confidentiality in Cloud Computing
( Institute of Electrical and Electronics Engineers Inc. , 2015 , Conference Paper)This paper proposes a data obfuscation approach in outsourcing matrix multiplication to cloud computing. It is primarily based on splitting the rows and columns of matrices to alter their actual dimension coupled with ... -
Design and Analysis of Lightweight Authentication Protocol for Securing IoD
( IEEE , 2021 , Article)The Internet-of-drones (IoD) environment is a layered network control architecture designed to maintain, coordinate, access, and control drones (or Unmanned Aerial vehicles UAVs) and facilitate drones' navigation services. ... -
Leveraging utilization as performance metric for CDN enabled energy efficient internet of things
( Elsevier B.V. , 2019 , Article)The exponential increase in the Internet of Things (IoT) has drastically augmented the need for computing and storage resources. IoT devices generate massive data that requires to be efficiently stored and disseminated for ... -
A Lightweight Privacy-Aware IoT-Based Metering Scheme for Smart Industrial Ecosystems
( IEEE Computer Society , 2021 , Article)The smart grid emerges as a new era of the electronic power grid. It integrates advanced sensing technologies, communications, and controlling methods that tell how electricity travels from different generation points to ... -
Performance analysis of secure AF relay networks using cooperative jamming under outdated CSI
( Institution of Engineering and Technology , 2017 , Article)This paper studies cooperative transmission for securing a two-hop network where the eavesdropper can wiretap the relay channels. With outdated channel state information (CSI), we propose an opportunistic relaying with ... -
PriviPK: Certificate-less and secure email communication
( Elsevier Ltd , 2017 , Article)We introduce PriviPK, an infrastructure that is based on a novel combination of certificateless (CL) cryptography and key transparency techniques to enable e2e email encryption. Our design avoids (1) key escrow and deployment ... -
Secure cloud services: Matrix multiplication revisited
( IEEE , 2013 , Conference Paper)This paper revisits the issue of secure outsourcing of services. It proposes a data scrambling approach of transforming private data into public without public key encryption in the cloud computing context. The approach ... -
Using block cipher for confidentiality of images in cloud-based systems
( Institute of Electrical and Electronics Engineers Inc. , 2016 , Conference Paper)This paper deals with outsourcing of computing to cloud servers where clients' images are computed and stored. It proposes a technique that obfuscates images before sending them to servers. Cloud servers can perform ...