{"title":"Secure problems solving scheme","authors":"H. Yamaguchi, M. Gotaishi, S. Tsujii","doi":"10.1109/ICOSC.2015.7050821","DOIUrl":null,"url":null,"abstract":"The ultimate objective of the problem solving system is to provide an interrelated framework for prospective users to facilitate their work, such as biological and biomedical knowledge retrieval, discovery, capture. In addition to this objective, there is demand for secure and practical computing algorithms which address the challenge to safely outsource data processing onto remote computing resources. This allows users to confidently outsource computation over sensitive information from the security level of the remote delegate. In this paper, we present the computing algorithms which preserve privacy of users and confidentiality of service providers in the cloud environment.","PeriodicalId":126701,"journal":{"name":"Proceedings of the 2015 IEEE 9th International Conference on Semantic Computing (IEEE ICSC 2015)","volume":"69 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2015-03-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings of the 2015 IEEE 9th International Conference on Semantic Computing (IEEE ICSC 2015)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICOSC.2015.7050821","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
The ultimate objective of the problem solving system is to provide an interrelated framework for prospective users to facilitate their work, such as biological and biomedical knowledge retrieval, discovery, capture. In addition to this objective, there is demand for secure and practical computing algorithms which address the challenge to safely outsource data processing onto remote computing resources. This allows users to confidently outsource computation over sensitive information from the security level of the remote delegate. In this paper, we present the computing algorithms which preserve privacy of users and confidentiality of service providers in the cloud environment.