Introduction to Secure Outsourcing Computation
Seiten
2016
Morgan and Claypool Life Sciences (Verlag)
978-1-62705-791-2 (ISBN)
Morgan and Claypool Life Sciences (Verlag)
978-1-62705-791-2 (ISBN)
- Lieferbar
- Versandkostenfrei
- Auch auf Rechnung
- Artikel merken
Focuses on the latest technologies and applications of secure outsourcing computations. The book introduces state-of-the-art research for secure outsourcing of some specific functions, such as scientific computations, cryptographic basic operations, and verifiable large database with update.
With the rapid development of cloud computing, the enterprises and individuals can outsource their sensitive data into the cloud server where they can enjoy high quality data storage and computing services in a ubiquitous manner. This is known as the outsourcing computation paradigm. Recently, the problem for securely outsourcing various expensive computations or storage has attracted considerable attention in the academic community. In this book, we focus on the latest technologies and applications of secure outsourcing computations. Specially, we introduce the state-of-the-art research for secure outsourcing some specific functions such as scientific computations, cryptographic basic operations, and verifiable large database with update. The constructions for specific functions use various design tricks and thus result in very efficient protocols for real-world applications.
The topic of outsourcing computation is a hot research issue nowadays. Thus, this book will be beneficial to academic researchers in the field of cloud computing and big data security.
With the rapid development of cloud computing, the enterprises and individuals can outsource their sensitive data into the cloud server where they can enjoy high quality data storage and computing services in a ubiquitous manner. This is known as the outsourcing computation paradigm. Recently, the problem for securely outsourcing various expensive computations or storage has attracted considerable attention in the academic community. In this book, we focus on the latest technologies and applications of secure outsourcing computations. Specially, we introduce the state-of-the-art research for secure outsourcing some specific functions such as scientific computations, cryptographic basic operations, and verifiable large database with update. The constructions for specific functions use various design tricks and thus result in very efficient protocols for real-world applications.
The topic of outsourcing computation is a hot research issue nowadays. Thus, this book will be beneficial to academic researchers in the field of cloud computing and big data security.
Xiaofeng Chen, Xidian University, China.
Preface
Acknowledgments
Introduction
Preliminaries
Secure Outsourcing of Scientific Computations
Secure Outsourcing of Cryptographic Operations
Secure Outsourcing of Large Database With Updates
Conclusion and Future Works
Bibliography
Author's Biography
Erscheint lt. Verlag | 1.6.2016 |
---|---|
Reihe/Serie | Synthesis Lectures on Information Security, Privacy, and Trust |
Verlagsort | San Rafael, CA |
Sprache | englisch |
Maße | 191 x 235 mm |
Gewicht | 333 g |
Themenwelt | Mathematik / Informatik ► Informatik ► Netzwerke |
Informatik ► Theorie / Studium ► Kryptologie | |
ISBN-10 | 1-62705-791-9 / 1627057919 |
ISBN-13 | 978-1-62705-791-2 / 9781627057912 |
Zustand | Neuware |
Haben Sie eine Frage zum Produkt? |
Mehr entdecken
aus dem Bereich
aus dem Bereich
Geschichte, Techniken, Anwendungen
Buch | Softcover (2022)
C.H.Beck (Verlag)
CHF 13,90
Die faszinierende Geschichte der Verschlüsselung
Buch | Softcover (2022)
Springer (Verlag)
CHF 48,95