Introduction to Secure Outsourcing Computation

Introduction to Secure Outsourcing Computation

Xiaofeng Chen
ISBN: 9781627057912 | PDF ISBN: 9781627057929
Copyright © 2016 | 93 Pages | Publication Date: February, 2016

BEFORE YOU ORDER: You may have Academic or Corporate access to this title. Click here to find out: 10.2200/S00701ED1V01Y201602SPT016


Ordering Options: Paperback $40.00   E-book $32.00   Paperback & E-book Combo $50.00

Why pay full price? Members receive 15% off all orders.
Learn More Here

Read Our Digital Content License Agreement (pop-up)

Purchasing Options:

With the rapid development of cloud computing, the enterprises and individuals can outsource their sensitive data into the cloud server where they can enjoy high quality data storage and computing services in a ubiquitous manner. This is known as the outsourcing computation paradigm. Recently, the problem for securely outsourcing various expensive computations or storage has attracted considerable attention in the academic community. In this book, we focus on the latest technologies and applications of secure outsourcing computations. Specially, we introduce the state-of-the-art research for secure outsourcing some specific functions such as scientific computations, cryptographic basic operations, and verifiable large database with update. The constructions for specific functions use various design tricks and thus result in very efficient protocols for real-world applications.

The topic of outsourcing computation is a hot research issue nowadays. Thus, this book will be beneficial to academic researchers in the field of cloud computing and big data security.

Table of Contents

Secure Outsourcing of Scientific Computations
Secure Outsourcing of Cryptographic Operations
Secure Outsourcing of Large Database With Updates
Conclusion and Future Works
Author's Biography

About the Author(s)

Xiaofeng Chen, Xidian University
Professor Xiaofeng Chen received his B.S. and M.S. on Mathematics from Northwest University, China, in 1998 and 2000, respectively. He got his Ph.D. degree in Cryptography from Xidian University in 2003. Currently, he works at Xidian University as a professor. His research interests include applied cryptography and cloud computing security. He has published over 100 research papers in refereed international conferences and journals. His work has been cited more than 3,000 times at Google Scholar. He is on the Editorial Board of Security and Communication Networks (SCN), Telecommunication Systems (TELS), Computing and Informatics (CAI), and International Journal of High Performance Computing and Networking (IJHPCN), etc. He served as general chair of the 11th ACM Asia Conference on Computer and Communications Security (AsiaCCS 2016) and as program co-chair of the 5th International Conference on Provable Security (ProvSec 2011). He has also served as program committee member in over 30 international conferences. Currently, he is a director of Information Security Center, State Key Laboratory of Integrated Service Networks (ISN), Xidian University.

Browse by Subject
Case Studies in Engineering
ACM Books
SEM Books
0 items

Note: Registered customers go to: Your Account to subscribe.

E-Mail Address:

Your Name: