Secure Outsourcing of Sequence Comparisons
Download
Author
Mikhail J. Atallah, Jiangtao Li
Tech report number
CERIAS TR 2005-126
Entry type
article
Abstract
Internet computing technologies, like grid computing, enable a weak computational device connected to such a grid to be less limited by its inadequate local computational, storage, and bandwidth resources. However, such a weak computational device (PDA, smartcard, sensor, etc.) often cannot avail itself of the abundant resources available on the network because its data are sensitive. This motivates the design of techniques for computational outsourcing in a privacy-preserving manner, i.e., without revealing to the remote agents whose computational power is being used either one
Download
Date
2005
Key alpha
Secure outsourcing, sequence comparisons
Publisher
Springer-Verlag
School
Purdue University
Bibdate
2005
Publication Date
2005-01-01
Contents
1. Introduction
2. Related work
3. Preliminaries
4. Edit distance protocol
5. Computing the edit path
6. Conclusion and future work
Copyright
Springer-Verlag 2005
Keywords
Privacy, Secure outsourcing, Secure multiparty computation, Sequence comparison, Edit Distance
Language
English

