Introduction to Secure Outsourcing Computation

Nonfiction, Computers, Internet, Security, Networking & Communications, Computer Security, Operating Systems
Cover of the book Introduction to Secure Outsourcing Computation by Xiaofeng Chen, Morgan & Claypool Publishers
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: Xiaofeng Chen ISBN: 9781681731995
Publisher: Morgan & Claypool Publishers Publication: February 22, 2016
Imprint: Morgan & Claypool Publishers Language: English
Author: Xiaofeng Chen
ISBN: 9781681731995
Publisher: Morgan & Claypool Publishers
Publication: February 22, 2016
Imprint: Morgan & Claypool Publishers
Language: English

With the rapid development of cloud computing, the enterprises and individuals can outsource their sensitive data into the cloud server where they can enjoy high quality data storage and computing services in a ubiquitous manner. This is known as the outsourcing computation paradigm. Recently, the problem for securely outsourcing various expensive computations or storage has attracted considerable attention in the academic community. In this book, we focus on the latest technologies and applications of secure outsourcing computations. Specially, we introduce the state-of-the-art research for secure outsourcing some specific functions such as scientific computations, cryptographic basic operations, and verifiable large database with update. The constructions for specific functions use various design tricks and thus result in very efficient protocols for real-world applications. The topic of outsourcing computation is a hot research issue nowadays. Thus, this book will be beneficial to academic researchers in the field of cloud computing and big data security.

View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart

With the rapid development of cloud computing, the enterprises and individuals can outsource their sensitive data into the cloud server where they can enjoy high quality data storage and computing services in a ubiquitous manner. This is known as the outsourcing computation paradigm. Recently, the problem for securely outsourcing various expensive computations or storage has attracted considerable attention in the academic community. In this book, we focus on the latest technologies and applications of secure outsourcing computations. Specially, we introduce the state-of-the-art research for secure outsourcing some specific functions such as scientific computations, cryptographic basic operations, and verifiable large database with update. The constructions for specific functions use various design tricks and thus result in very efficient protocols for real-world applications. The topic of outsourcing computation is a hot research issue nowadays. Thus, this book will be beneficial to academic researchers in the field of cloud computing and big data security.

More books from Morgan & Claypool Publishers

Cover of the book Linked Data by Xiaofeng Chen
Cover of the book Relativity, Symmetry, and the Structure of Quantum Theory, Volume 2 by Xiaofeng Chen
Cover of the book The Continuing Arms Race by Xiaofeng Chen
Cover of the book AdS/CFT Correspondence in Condensed Matter by Xiaofeng Chen
Cover of the book Predicting Human Decision-Making by Xiaofeng Chen
Cover of the book Lectures on Selected Topics in Mathematical Physics by Xiaofeng Chen
Cover of the book Quantum Robotics by Xiaofeng Chen
Cover of the book Essential Semiconductor Laser Physics by Xiaofeng Chen
Cover of the book Shared-Memory Parallelism Can be Simple, Fast, and Scalable by Xiaofeng Chen
Cover of the book The Electric Dipole Moment Challenge by Xiaofeng Chen
Cover of the book Embracing Interference in Wireless Systems by Xiaofeng Chen
Cover of the book Sound-Power Flow by Xiaofeng Chen
Cover of the book Neutron Stars, Black Holes, and Gravitational Waves by Xiaofeng Chen
Cover of the book Privacy Risk Analysis by Xiaofeng Chen
Cover of the book Quantum Metrology with Photoelectrons by Xiaofeng Chen
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy