In the digital era, users share their personal data with service providers to obtain some utility, e.g., access to high-quality services. Yet, the induced information flows raise privacy and integrity concerns. Consequently, cautious users may want to protect their privacy by minimizing the amount of information they disclose to curious service providers. Service providers are interested in verifying the integrity of the users' data to improve their services and obtain useful knowledge for their business. In this work, we present a generic solution to the trade-off between privacy, integrity, and utility, by achieving authenticity verification of data that has been encrypted for offloading to service providers. Based on lattice-based homomo...
Often service providers need to outsource computations on sensitive datasets and subsequently publis...
With computation power in the cloud becoming a commodity, it is more and more convenient to outsourc...
The advent of application domains and technologies such as big data analytics, the Internet of Thing...
We consider the problem of privacy-preserving processing of outsourced data in the context of user-c...
Abstract. We study the problem of privacy-preserving proofs on authenticated data in which a party r...
AbstractThe many sensors embedded in phones nowadays provide advanced sensing capabilities that make...
Today, it is common practice to outsource time-consuming computations to the cloud. Using the cloud...
The captured data from smart devices via IoT wireless sensors are vulnerable to numerous online and ...
In this paper, we present a privacy-preserving protocol between an energy provider and smart meters....
Cloud computing has promoted the success of Internet of Things (IoT) with offering abundant storage ...
In many application scenarios, data need to be collected, stored and processed. Often sensitive data...
Though the smart electrical grid promises many advantages in efficiency and reliability, the risks t...
Crowd-sourced sensing systems allow people to voluntarily contribute sensor data from mobile devices...
Privacy and control over data have become a public concern. Simultaneously, the increasing likelihoo...
© Springer International Publishing AG 2017. Biometric authentication is becoming increasingly popul...
Often service providers need to outsource computations on sensitive datasets and subsequently publis...
With computation power in the cloud becoming a commodity, it is more and more convenient to outsourc...
The advent of application domains and technologies such as big data analytics, the Internet of Thing...
We consider the problem of privacy-preserving processing of outsourced data in the context of user-c...
Abstract. We study the problem of privacy-preserving proofs on authenticated data in which a party r...
AbstractThe many sensors embedded in phones nowadays provide advanced sensing capabilities that make...
Today, it is common practice to outsource time-consuming computations to the cloud. Using the cloud...
The captured data from smart devices via IoT wireless sensors are vulnerable to numerous online and ...
In this paper, we present a privacy-preserving protocol between an energy provider and smart meters....
Cloud computing has promoted the success of Internet of Things (IoT) with offering abundant storage ...
In many application scenarios, data need to be collected, stored and processed. Often sensitive data...
Though the smart electrical grid promises many advantages in efficiency and reliability, the risks t...
Crowd-sourced sensing systems allow people to voluntarily contribute sensor data from mobile devices...
Privacy and control over data have become a public concern. Simultaneously, the increasing likelihoo...
© Springer International Publishing AG 2017. Biometric authentication is becoming increasingly popul...
Often service providers need to outsource computations on sensitive datasets and subsequently publis...
With computation power in the cloud becoming a commodity, it is more and more convenient to outsourc...
The advent of application domains and technologies such as big data analytics, the Internet of Thing...