2021 IEEE/ACM 21st International Symposium on Cluster, Cloud and Internet Computing (CCGrid) 2021
DOI: 10.1109/ccgrid51090.2021.00046
|View full text |Cite
|
Sign up to set email alerts
|

SAED: Edge-Based Intelligence for Privacy-Preserving Enterprise Search on the Cloud

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2022
2022
2022
2022

Publication Types

Select...
2

Relationship

1
1

Authors

Journals

citations
Cited by 2 publications
(2 citation statements)
references
References 25 publications
0
2
0
Order By: Relevance
“…In particular, we study the impact of software architecture (monolithic vs micro-service) used to develop an application on confidential computing. We unfold the structure of monolithic confidential computing applications (e.g., S3C [33], S3BD [34], and ClusPr [35]), as well as microservice-based ones (e.g., SAED [36]). What is more, we study how application partitioning (across edge-cloud) and application-data encryption can influence confidential computing.…”
Section: Taxonomy Of Confidential Computing Across Edge-to-cloudmentioning
confidence: 99%
See 1 more Smart Citation
“…In particular, we study the impact of software architecture (monolithic vs micro-service) used to develop an application on confidential computing. We unfold the structure of monolithic confidential computing applications (e.g., S3C [33], S3BD [34], and ClusPr [35]), as well as microservice-based ones (e.g., SAED [36]). What is more, we study how application partitioning (across edge-cloud) and application-data encryption can influence confidential computing.…”
Section: Taxonomy Of Confidential Computing Across Edge-to-cloudmentioning
confidence: 99%
“…According to the taxonomy, the application logic (i.e., algorithm) can be written such that the sensitive parts are executed on the trusted machine/TEE and the non-sensitive parts are executed on the normal (non-trusted) machines. For instance, SAED [36], a tool for secure semantic search of encrypted cloud data, realizes confidential computing via partitioning the search logic/algorithm. The intelligent part that captures semantics of the user's search query is performed on-premise (on a trusted edge server).…”
Section: Application Architecture and Partitioningmentioning
confidence: 99%