Faster Secure Cloud Computations with a Trusted Proxy

Published: 01 Jan 2017, Last Modified: 20 May 2025IEEE Secur. Priv. 2017EveryoneRevisionsBibTeXCC BY-SA 4.0
Abstract: Cloud computing infrastructures offer many advantages to users, including large storage and high computation power. However, offloading workloads to hosting environments raises trust and privacy concerns. Algorithms that address these concerns require multiple network transactions and have low performance.
Loading