All

What are you looking for?

All
Projects
Results
Organizations

Quick search

  • Projects supported by TA ČR
  • Excellent projects
  • Projects with the highest public support
  • Current projects

Smart search

  • That is how I find a specific +word
  • That is how I leave the -word out of the results
  • “That is how I can find the whole phrase”

Privacy-enhancing Cloud Computing Solution for Big Data

The result's identifiers

  • Result code in IS VaVaI

    <a href="https://www.isvavai.cz/riv?ss=detail&h=RIV%2F00216305%3A26220%2F19%3APU133603" target="_blank" >RIV/00216305:26220/19:PU133603 - isvavai.cz</a>

  • Result on the web

    <a href="https://ieeexplore.ieee.org/abstract/document/8970982" target="_blank" >https://ieeexplore.ieee.org/abstract/document/8970982</a>

  • DOI - Digital Object Identifier

    <a href="http://dx.doi.org/10.1109/ICUMT48472.2019.8970982" target="_blank" >10.1109/ICUMT48472.2019.8970982</a>

Alternative languages

  • Result language

    angličtina

  • Original language name

    Privacy-enhancing Cloud Computing Solution for Big Data

  • Original language description

    A variety of users cyber data are daily collected by enterprises and governments. These data are processed in order to improve users lifestyle, e.g. improving healthcare and optimizing traffic. Cloud computing is often the only possible strategy which allows processing these big amount of information due to the associated costs. However, data owners remain reluctant to outsource their data to a cloud which may read, use or even sell these data leading on user privacy leakage. These threats have been already observed by EU organization and reflected in many regulations and strategies. In this paper, we present data splitting techniques as one of the most promising technology for privacy-preserving computation in a cloud. At first, we propose a new protocol for secure scalar product resistant against honest-but-curious colluding cloud. Then, we compared our new proposal with two most efficient state-of-the-art schemes. These schemes are not secure in a colluding security model. While using higher security level of our proposal, we achieved comparable performance. The protocols were implemented in real environment based on Amazon Web Services and, then, an FPGA processor cards implementation is considered in order to speed up the computations.

  • Czech name

  • Czech description

Classification

  • Type

    D - Article in proceedings

  • CEP classification

  • OECD FORD branch

    20206 - Computer hardware and architecture

Result continuities

  • Project

    <a href="/en/project/TJ02000290" target="_blank" >TJ02000290: A hardware accelerated cryptographic system for secure big data sharing</a><br>

  • Continuities

    P - Projekt vyzkumu a vyvoje financovany z verejnych zdroju (s odkazem do CEP)

Others

  • Publication year

    2019

  • Confidentiality

    S - Úplné a pravdivé údaje o projektu nepodléhají ochraně podle zvláštních právních předpisů

Data specific for result type

  • Article name in the collection

    2019 1th International Congress on Ultra Modern Telecommunications and Control Systems (ICUMT)

  • ISBN

    9781728157634

  • ISSN

    2157-023X

  • e-ISSN

  • Number of pages

    6

  • Pages from-to

    1-6

  • Publisher name

    IEEE Computer Society

  • Place of publication

    Dublin, Ireland

  • Event location

    Dublin

  • Event date

    Oct 28, 2019

  • Type of event by nationality

    WRD - Celosvětová akce

  • UT code for WoS article

    000540651700065