Refine
Year of publication
- 2018 (43) (remove)
Document Type
- Conference Proceeding (43) (remove)
Conference Type
- Konferenzartikel (37)
- Konferenz-Abstract (4)
- Konferenz-Poster (1)
- Sonstiges (1)
Is part of the Bibliography
- yes (43) (remove)
Keywords
- 5G mobile communication (2)
- Access protocols (2)
- Decoding (2)
- Gamification (2)
- Multiuser detection (2)
- Payloads (2)
- Physical layer (2)
- access protocols (2)
- decoding (2)
- network coding (2)
Institute
- Fakultät Elektrotechnik und Informationstechnik (E+I) (bis 03/2019) (21)
- ivESK - Institut für verlässliche Embedded Systems und Kommunikationselektronik (11)
- Fakultät Medien und Informationswesen (M+I) (bis 21.04.2021) (8)
- Fakultät Wirtschaft (W) (6)
- Fakultät Maschinenbau und Verfahrenstechnik (M+V) (4)
- INES - Institut für nachhaltige Energiesysteme (3)
- ACI - Affective and Cognitive Institute (2)
- WLRI - Work-Life Robotics Institute (2)
- Zentrale Einrichtungen (1)
Open Access
- Closed Access (43) (remove)
In a Semi-autonomic cloud auditing architecture we weaved in privacy enhancing mechanisms [15] by applying the public key version of the Somewhat homomorphic encryption (SHE) scheme from [4]. It turns out that the performance of the SHE can be significantly improved by carefully deriving relevant crypto parameters from the concrete cloud auditing use cases for which the scheme serves as a privacy enhancing approach. We provide a generic algorithm for finding good SHE parameters with respect to a given use case scenario by analyzing and taking into consideration security, correctness and performance of the scheme. Also, to show the relevance of our proposed algorithms we apply it to two predominant cloud auditing use cases.