語系:
繁體中文
English
說明(常見問題)
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Trade-Offs Among Data Security, Usab...
~
Zhou, Kai.
Trade-Offs Among Data Security, Usability and Complexity in Mobile Cloud Computing.
紀錄類型:
書目-語言資料,手稿 : Monograph/item
正題名/作者:
Trade-Offs Among Data Security, Usability and Complexity in Mobile Cloud Computing./
作者:
Zhou, Kai.
面頁冊數:
1 online resource (183 pages)
附註:
Source: Dissertation Abstracts International, Volume: 79-09(E), Section: B.
標題:
Electrical engineering. -
電子資源:
click for full text (PQDT)
ISBN:
9780355865899
Trade-Offs Among Data Security, Usability and Complexity in Mobile Cloud Computing.
Zhou, Kai.
Trade-Offs Among Data Security, Usability and Complexity in Mobile Cloud Computing.
- 1 online resource (183 pages)
Source: Dissertation Abstracts International, Volume: 79-09(E), Section: B.
Thesis (Ph.D.)--Michigan State University, 2018.
Includes bibliographical references
The proliferation of mobile cloud computing changes the way that data is utilized. Huge volume of data is collected at the network edge, transmitted through the network, gathered in the cloud, and utilized by various end-users. Data security, usability, and complexity are among the most important design issues in mobile computing environment. Trade- offs generally exist among these issues. While data encryption is a primary mechanism to ensure data security, it will inevitably introduce some computational overhead to the data owners. Also, data encryption will reduce data usability since typically it is hard to conduct computations over encrypted data.
Electronic reproduction.
Ann Arbor, Mich. :
ProQuest,
2018
Mode of access: World Wide Web
ISBN: 9780355865899Subjects--Topical Terms:
596380
Electrical engineering.
Index Terms--Genre/Form:
554714
Electronic books.
Trade-Offs Among Data Security, Usability and Complexity in Mobile Cloud Computing.
LDR
:03413ntm a2200337K 4500
001
914812
005
20180724121430.5
006
m o u
007
cr mn||||a|a||
008
190606s2018 xx obm 000 0 eng d
020
$a
9780355865899
035
$a
(MiAaPQ)AAI10792270
035
$a
(MiAaPQ)grad.msu:15933
035
$a
AAI10792270
040
$a
MiAaPQ
$b
eng
$c
MiAaPQ
100
1
$a
Zhou, Kai.
$3
1188176
245
1 0
$a
Trade-Offs Among Data Security, Usability and Complexity in Mobile Cloud Computing.
264
0
$c
2018
300
$a
1 online resource (183 pages)
336
$a
text
$b
txt
$2
rdacontent
337
$a
computer
$b
c
$2
rdamedia
338
$a
online resource
$b
cr
$2
rdacarrier
500
$a
Source: Dissertation Abstracts International, Volume: 79-09(E), Section: B.
500
$a
Adviser: Jian Ren.
502
$a
Thesis (Ph.D.)--Michigan State University, 2018.
504
$a
Includes bibliographical references
520
$a
The proliferation of mobile cloud computing changes the way that data is utilized. Huge volume of data is collected at the network edge, transmitted through the network, gathered in the cloud, and utilized by various end-users. Data security, usability, and complexity are among the most important design issues in mobile computing environment. Trade- offs generally exist among these issues. While data encryption is a primary mechanism to ensure data security, it will inevitably introduce some computational overhead to the data owners. Also, data encryption will reduce data usability since typically it is hard to conduct computations over encrypted data.
520
$a
In this thesis, we focus on designing secure, efficient and versatile protocols that can achieve trade-offs among data security, data usability, and computational complexity, featuring the mobile cloud computing environment. In particular, we explore the trade-offs from two aspects. First, we design secure computation outsourcing schemes for a wide variety of computational problems such as general scientific computation and cryptographic computation, trying to alleviate the computational overhead at the user side while preserving the security of the outsourced data. Our proposed scheme is cost-aware in that it provides different levels of security protection for the outsourced problem with different computational overhead. Second, we design a specific encryption scheme that enables certain computations to be conducted directly over encrypted data. In this way, data users can directly utilize encrypted data to meet the demands of various applications without compromising data security. More specifically, our proposed encryption scheme encrypts two vectors in such a manner that the inner product of the vectors can be evaluated and compared to a pre-defined threshold. We show that an encryption scheme can be utilized as an essential building block to construct various privacy-preserving applications such as an online biometric authentication system. Our proposed schemes are highly efficient and suitable for resource-constrained devices in the mobile cloud computing environment to greatly expand the computational capacity and/or extend battery life.
533
$a
Electronic reproduction.
$b
Ann Arbor, Mich. :
$c
ProQuest,
$d
2018
538
$a
Mode of access: World Wide Web
650
4
$a
Electrical engineering.
$3
596380
650
4
$a
Computer science.
$3
573171
655
7
$a
Electronic books.
$2
local
$3
554714
690
$a
0544
690
$a
0984
710
2
$a
ProQuest Information and Learning Co.
$3
1178819
710
2
$a
Michigan State University.
$b
Electrical Engineering - Doctor of Philosophy.
$3
1187603
856
4 0
$u
http://pqdd.sinica.edu.tw/twdaoapp/servlet/advanced?query=10792270
$z
click for full text (PQDT)
筆 0 讀者評論
多媒體
評論
新增評論
分享你的心得
Export
取書館別
處理中
...
變更密碼[密碼必須為2種組合(英文和數字)及長度為10碼以上]
登入