◾ Mobile Multimedia Cloud Computing

2014 ◽  
pp. 23-42
2014 ◽  
pp. 1-20 ◽  
Author(s):  
Jiehan Zhou ◽  
Haibin Zhu ◽  
Mika Ylianttila ◽  
Mika Rautiainen

Sensors ◽  
2016 ◽  
Vol 16 (2) ◽  
pp. 246 ◽  
Author(s):  
Guangjie Han ◽  
Wenhui Que ◽  
Gangyong Jia ◽  
Lei Shu

IEEE Access ◽  
2019 ◽  
Vol 7 ◽  
pp. 131534-131542 ◽  
Author(s):  
Qi Li ◽  
Youliang Tian ◽  
Yinghui Zhang ◽  
Limin Shen ◽  
Jingjing Guo

2016 ◽  
Vol 2 (1) ◽  
pp. 37-49 ◽  
Author(s):  
Syed Fawad Haider ◽  
Laraib Abbas ◽  
Amjad Ali ◽  
Muddesar Iqbal ◽  
Imran Raza ◽  
...  

Electronics ◽  
2021 ◽  
Vol 10 (21) ◽  
pp. 2685
Author(s):  
Yanfeng Shi ◽  
Shuo Qiu

In a multimedia cloud computing system, suppose all cloud users outsource their own data sets to the cloud in the encrypted form. Each outsourced set is associated with an access structure such that a valid data user, Bob, with the credentials satisfying the access structure is able to conduct computing over outsourced encrypted set (e.g., decryption or other kinds of computing function). Suppose Bob needs to compute the set intersection over a data owner Alice’s and his own outsourced encrypted sets. Bob’s simple solution is to download Alice’s and Bob’s outsourced encrypted sets, perform set intersection operation, and decrypt the set intersection ciphertexts. A better solution is for Bob to delegate the cloud to calculate the set intersection, without giving the cloud any ability in breaching the secrecy of the sets. To solve this problem, this work introduces a novel primitive called ciphertext-policy attribute-based encryption with outsourced set intersection for multimedia cloud computing. It is the first cryptographic algorithm supporting a fully outsourced encrypted storage, computation delegation, fine-grained authorization security for ciphertext-policy model, without relying on an online trusted authority or data owners, and multi-elements set, simultaneously. We construct a scheme that provably satisfies the desirable security properties, and analyze its efficiency.


2014 ◽  
pp. 21-46
Author(s):  
Xiaoming Nan ◽  
Yifeng He ◽  
Ling Guan

Sign in / Sign up

Export Citation Format

Share Document