We consider the problem of privacy-preserving processing of outsourced data in the context of user-customised services. Clients store their data on a server. In order to provide user-dependent services, service providers may ask the server to compute functions on the users’ data. We propose a new solution to this problem that guarantees data privacy (i.e., an honest-but-curious server cannot access plaintexts), as well as that service providers can correctly decrypt only –functions on– the data the user gave them access to (i.e., service providers learn nothing more than the result of user-selected computations). Our solution has as base point a new secure labelled homomorphic encryption scheme (LEEG). LEEG supports additional algorithms (F...
The importance of privacy has been growing steadily for over 25 years. Increasingly popularareas (su...
In recent years, signal processing applications that deal with user-related data have aroused privac...
Database outsourcing, whilst becoming more popular in recent years, is creating substantial security...
In the digital era, users share their personal data with service providers to obtain some utility, e...
In the work at hand, we state that privacy and malleability of data are two aspects highly desired b...
The advent of application domains and technologies such as big data analytics, the Internet of Thing...
In today's data-driven world, we are conflicted with two opposing phenomena. On the one hand, collec...
Recommender systems have become an important tool for personalization of online services. Generating...
With the increasing prevalence of digital technologies in our lives, authentication systems have bee...
Information systems generally involve storage and analytics of large-scale data, many of which may b...
Location-based software services require knowledge about a user's geographic data. Sharing these dat...
In the online world, increasing amounts of personal data of users are processed by service providers...
Data has been widely recognized as one of the most valuable assets that can be utilized to make dyna...
In many application scenarios, data need to be collected, stored and processed. Often sensitive data...
Cloud computing provides an efficient and convenient platform for cloud users to store, process and ...
The importance of privacy has been growing steadily for over 25 years. Increasingly popularareas (su...
In recent years, signal processing applications that deal with user-related data have aroused privac...
Database outsourcing, whilst becoming more popular in recent years, is creating substantial security...
In the digital era, users share their personal data with service providers to obtain some utility, e...
In the work at hand, we state that privacy and malleability of data are two aspects highly desired b...
The advent of application domains and technologies such as big data analytics, the Internet of Thing...
In today's data-driven world, we are conflicted with two opposing phenomena. On the one hand, collec...
Recommender systems have become an important tool for personalization of online services. Generating...
With the increasing prevalence of digital technologies in our lives, authentication systems have bee...
Information systems generally involve storage and analytics of large-scale data, many of which may b...
Location-based software services require knowledge about a user's geographic data. Sharing these dat...
In the online world, increasing amounts of personal data of users are processed by service providers...
Data has been widely recognized as one of the most valuable assets that can be utilized to make dyna...
In many application scenarios, data need to be collected, stored and processed. Often sensitive data...
Cloud computing provides an efficient and convenient platform for cloud users to store, process and ...
The importance of privacy has been growing steadily for over 25 years. Increasingly popularareas (su...
In recent years, signal processing applications that deal with user-related data have aroused privac...
Database outsourcing, whilst becoming more popular in recent years, is creating substantial security...