메뉴 건너뛰기




Volumn 24, Issue 6, 2013, Pages 1172-1181

Harnessing the cloud for securely outsourcing large-scale systems of linear equations

Author keywords

cloud computing; computation outsourcing; Confidential data; system of linear equations

Indexed keywords

ALGEBRAIC PROPERTIES; COMPUTATIONAL RESOURCES; CONFIDENTIAL DATA; ITERATIVE APPROXIMATIONS; LARGE-SCALE COMPUTATIONS; SUCCESSIVE APPROXIMATIONS; SYSTEM OF LINEAR EQUATIONS; TRADITIONAL APPROACHES;

EID: 84877785052     PISSN: 10459219     EISSN: None     Source Type: Journal    
DOI: 10.1109/TPDS.2012.206     Document Type: Article
Times cited : (150)

References (40)
  • 2
    • 77950347409 scopus 로고    scopus 로고
    • A view of cloud computing
    • Apr.
    • M. Armbrust et al., "A View of Cloud Computing," Comm. ACM, vol. 53, no. 4, pp. 50-58, Apr. 2010.
    • (2010) Comm ACM , vol.53 , Issue.4 , pp. 50-58
    • Armbrust, M.1
  • 4
    • 77649240581 scopus 로고    scopus 로고
    • Computing arbitrary functions of encrypted data
    • C. Gentry, "Computing Arbitrary Functions of Encrypted Data," Comm. ACM, vol. 53, no. 3, pp. 97-105, 2010.
    • (2010) Comm ACM , vol.53 , Issue.3 , pp. 97-105
    • Gentry, C.1
  • 5
    • 0029490594 scopus 로고
    • Solution of dense systems of linear equations arising from integral-equation formulations
    • Dec
    • K. Forsman, W. Gropp, L. Kettunen, D. Levine, and J. Salonen, "Solution of Dense Systems of Linear Equations Arising from Integral-Equation Formulations," IEEE Antennas and Propagation Magazine, vol. 37, no. 6, pp. 96-100, Dec. 1995.
    • (1995) IEEE Antennas and Propagation Magazine , vol.37 , Issue.6 , pp. 96-100
    • Forsman, K.1    Gropp, W.2    Kettunen, L.3    Levine, D.4    Salonen, J.5
  • 6
    • 84973744454 scopus 로고
    • Large dense numerical linear algebra in 1993: The parallel computing influence
    • A. Edelman, "Large Dense Numerical Linear Algebra in 1993: The Parallel Computing Influence," Int'l J. High Performance Computing Applications, vol. 7, no. 2, pp. 113-128, 1993.
    • (1993) Int'l J. High Performance Computing Applications , vol.7 , Issue.2 , pp. 113-128
    • Edelman, A.1
  • 7
    • 0037023893 scopus 로고    scopus 로고
    • An efficient solution of a dense system of linear equations arising in the method-of-moments formulation
    • DOI 10.1002/mop.10274
    • V. Prakash, S. Kwon, and R. Mittra, "An Efficient Solution of a Dense System of Linear Equations Arising in the Method-of-Moments Formulation," Microwave and Optical Technology Letters, vol. 33, no. 3, pp. 196-200, 2002. (Pubitemid 34504486)
    • (2002) Microwave and Optical Technology Letters , vol.33 , Issue.3 , pp. 196-200
    • Prakash, V.V.S.1    Kwon, S.J.2    Mittra, R.3
  • 12
    • 52049092094 scopus 로고    scopus 로고
    • Efficient secure linear algebra in the presence of covert or computationally unbounded adversaries
    • P. Mohassel and E. Weinreb, "Efficient Secure Linear Algebra in the Presence of Covert or Computationally Unbounded Adversaries," CRYPTO: Proc. 28th Ann. Int'l Cryptology Conf., pp. 481-496, 2008.
    • (2008) CRYPTO: Proc. 28th Ann. Int'l Cryptology Conf , pp. 481-496
    • Mohassel, P.1    Weinreb, E.2
  • 20
    • 77953310709 scopus 로고    scopus 로고
    • Achieving secure, scalable, and fine-grained access control in cloud computing
    • S. Yu, C. Wang, K. Ren, and W. Lou, "Achieving Secure, Scalable, and Fine-Grained Access Control in Cloud Computing," Proc. IEEE INFOCOM, pp. 534-542, 2010.
    • (2010) Proc IEEE INFOCOM , pp. 534-542
    • Yu, S.1    Wang, C.2    Ren, K.3    Lou, W.4
  • 21
    • 84861636543 scopus 로고    scopus 로고
    • Achieving usable and privacy-assured similarity search over outsourced cloud data
    • C. Wang, K. Ren, S. Yu, and K. Mahendra Raje Urs, "Achieving Usable and Privacy-Assured Similarity Search Over Outsourced Cloud Data," Proc. IEEE INFOCOM, pp. 451-459, 2012.
    • (2012) Proc IEEE INFOCOM , pp. 451-459
    • Wang, C.1    Ren, K.2    Yu, S.3    Mahendra Raje Urs, K.4
  • 26
    • 50849114523 scopus 로고    scopus 로고
    • Fast batch verification for modular exponentiation and digital signatures
    • Advances in Cryptology - EUROCRYPT '98
    • M. Bellare, J. Garay, and T. Rabin, "Fast Batch Verification for Modular Exponentiation and Digital Signatures," Eurocrypt: Proc. Int'l Conf. the Theory and Application of Cryptographic Techniques, pp. 236-250, 1998. (Pubitemid 128081489)
    • (1998) Lecture Notes In Computer Science , Issue.1403 , pp. 236-250
    • Bellare, M.1    Garay, J.A.2    Rabin, T.3
  • 29
    • 77951765127 scopus 로고    scopus 로고
    • Privacy-preserving gradient-descent methods
    • June
    • S. Han, W.K. Ng, L. Wan, and V.C. Lee, "Privacy-Preserving Gradient-Descent Methods," IEEE Trans. Knowledge and Data Eng., vol. 22, no. 6, pp. 884-899, June 2010.
    • (2010) IEEE Trans. Knowledge and Data Eng , vol.22 , Issue.6 , pp. 884-899
    • Han, S.1    Ng, W.K.2    Wan, L.3    Lee, V.C.4
  • 32
    • 77956778645 scopus 로고    scopus 로고
    • Secure outsourcing of scientific computations
    • Trends in Software Engineering
    • M.J. Atallah, K.N. Pantazopoulos, J.R. Rice, and E.H. Spafford, "Secure Outsourcing of Scientific Computations," Advances in Computers, vol. 54, pp. 216-272, 2001. (Pubitemid 33319801)
    • (2001) Advances In Computers , vol.54 , pp. 216-272
    • Atallah, M.J.1    Pantazopoulos, K.N.2    Rice, J.R.3    Spafford, E.4
  • 33
    • 79960862322 scopus 로고    scopus 로고
    • Secure and practical outsourcing of linear programming in cloud computing
    • C. Wang, K. Ren, and J. Wang, "Secure and Practical Outsourcing of Linear Programming in Cloud Computing," Proc. IEEE INFOCOM, pp. 820-828, 2011.
    • (2011) Proc IEEE INFOCOM , pp. 820-828
    • Wang, C.1    Ren, K.2    Wang, J.3
  • 35
    • 36949019777 scopus 로고    scopus 로고
    • Oblivious neural network computing via homomorphic encryption
    • C. Orlandi, A. Piva, and M. Barni, "Oblivious Neural Network Computing via Homomorphic Encryption," EURASIP J. Information Security, vol. 2007, pp. 1-10, 2007.
    • (2007) EURASIP J. Information Security , vol.2007 , pp. 1-10
    • Orlandi, C.1    Piva, A.2    Barni, M.3
  • 38
    • 84937555419 scopus 로고    scopus 로고
    • Uncheatable distributed computations
    • Topics in Cryptology - CT-RSA 2001 The Cryptographers' Track at RSA Conference 2001 San Francisco, CA, USA, April 8-12, 2001 Proceedings
    • P. Golle and I. Mironov, "Uncheatable Distributed Computations," CT-RSA: Proc. Conf. Topics in Cryptology: The Cryptographer's Track at RSA, pp. 425-440, 2001. (Pubitemid 33255180)
    • (2001) Lecture Notes In Computer Science , Issue.2020 , pp. 425-440
    • Golle, P.1    Mironov, I.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.