Showing 181 - 200 results of 411 for search 'Computer data storage', query time: 0.09s Refine Results
  1. 181

    Ciphertext policy hidden access control scheme based on blockchain and supporting data sharing by Ruizhong DU, Tianhe ZHANG, Pengliang SHI

    Published 2022-06-01
    “…Methods:Firstly,an efficient attribute vector and policy vector generation algorithm is proposed using vector compression technology, which judges whether user attributes satisfy the access policy through the inner product operation result of attribute vector and policy vector.Afterwards, the prime order bilinear group and attribute encryption technology were used to achieve fine-grained access control while avoiding the leakage of user attribute values; using the interstellar file system to store the ciphertext and storing the hash address of the ciphertext on the blockchain through a smart contract,it realizes distributed and reliable access control and reduces the storage overhead of the blockchain. The revocation function is realized by maintaining the revocation list in the revocation contract,which avoids the abuse of the user's private key.Finally, data sharing is realized by combining the proxy re-encryption technology. …”
    Get full text
    Article
  2. 182
  3. 183

    Enhancing the Security of Customer Data in Cloud Environments Using a Novel Digital Fingerprinting Technique by Nithya Chidambaram, Pethuru Raj, K. Thenmozhi, Rengarajan Amirtharajan

    Published 2016-01-01
    “…The data which is stored in the cloud can be sensitive and at times needs a proper file storage system with a tough security algorithm. …”
    Get full text
    Article
  4. 184

    Electronic medical record data sharing scheme based on searchable encryption via consortium blockchain by Shufen NIU, Wenke LIU, Lixia CHEN, Caifen WANG, Xiaoni DU

    Published 2020-08-01
    “…Considering that it was difficult to share medical record data among different medical institutions in cloud storage,an electronic medical record data sharing scheme based on searchable encryption on blockchain was proposed.In order to realize the secure storage and sharing of electronic medical records in the scheme,the patient’s electronic medical record ciphertext was stored in the hospital server,the ciphertext hash value was stored in the private blockchain,and the keyword index was stored in the consortium blockchain.Searchable encryption was used to implement secure search of keywords in the consortium blockchain,and proxy re-encryption technology was used to realize the sharing of electronic medical records of patients by other data users.Security analysis shows that the proposed scheme can achieve ciphertext security and keyword security.Moreover,the performance of the scheme was analyzed by function analysis,computational efficiency analysis and numerical simulation.The performance analysis shows that the scheme can achieve high computational efficiency.…”
    Get full text
    Article
  5. 185

    Bidimensionally partitioned online sequential broad learning system for large-scale data stream modeling by Wei Guo, Jianjiang Yu, Caigen Zhou, Xiaofeng Yuan, Zhanxiu Wang

    Published 2024-12-01
    “…Firstly, IBLS needs to retain all historical data and perform associated calculations in the incremental learning process, which causes its computational overhead and storage burden to increase over time and as such puts the efficacy of the algorithm at risk for massive or unlimited data streams. …”
    Get full text
    Article
  6. 186

    Multi-function supported privacy protection data aggregation scheme for V2G network by Baiji HU, Xiaojuan ZHANG, Yuancheng LI, Rongxin LAI

    Published 2023-04-01
    “…In view of the problem that the functions of the current privacy protection data aggregation scheme were insufficient to meet the increasingly rich application requirements, a multi-function supported privacy protection data aggregation (MFPDA) scheme for V2G network was proposed.By using cryptographic algorithms such as BGN, BLS, and Shamir’s secret sharing, as well as fog computing and consortium blockchain technology, multiple security functions like fault tolerance, resistance to internal attacks, batch signature verification, no need for trusted third parties, and multiple aggregation functions were integrated into one privacy protection data aggregation scheme.Security analysis shows that the proposed scheme can protect data aggregation’s security, privacy and reliability.The performance evaluation shows that the introduction of fog computing can significantly reduce the computing overhead of the control center, and the reduction rate can be as high as 66.6%; the improvement of the consortium blockchain can effectively reduce the communication and storage overhead of the system, and the reduction rate can reach 16.7% and 24.9% respectively.…”
    Get full text
    Article
  7. 187

    Analysis of high-rise building safety detection methods based on big data and artificial intelligence by Jiaojiao Xu, Chuanjie Yan, Yangyang Su, Yong Liu

    Published 2020-06-01
    “…The experiments in this article use the concept of big data to divide the system into modules such as data collection, data preprocessing, feature extraction, prediction model building, and model application in order to provide massive data storage and parallel computing services to form a security test system. …”
    Get full text
    Article
  8. 188

    Location-aware job scheduling for IoT systems using cloud and fog by Xiaomo Yu, Mingjun Zhu, Menghan Zhu, Xiaomeng Zhou, Long Long, Mahdi khodaparast

    Published 2025-01-01
    “…The rapid growth of Internet of Things (IoT) applications generates vast volumes of high-speed data streams from numerous devices. Cloud computing solutions often handle and manage this data; however, for certain applications, the latency introduced by transmitting data from edge devices to the cloud may be unacceptable. …”
    Get full text
    Article
  9. 189

    An Efficient Approach to Extract and Store Big Semantic Web Data Using Hadoop and Apache Spark GraphX by Wria Mohammed Salih Mohammed, Alaa Khalil Jumaa

    Published 2024-06-01
    “…Furthermore, the proposed techniques improve the data storage efficiency by reducing the amount of storage space by half when converting from Semantic Web Data to a GraphX file, meaning the RDF size is around 133.8 and GraphX is 75.3. …”
    Get full text
    Article
  10. 190

    An introductory guide to cloud load balancing techniques by Mingyue Wang

    Published 2023-06-01
    “…The goal of research in the intriguing area of cloud computing is to discover the most effective solution and method for sharing and protecting data. …”
    Get full text
    Article
  11. 191
  12. 192

    Volume-hiding encrypted multi-map scheme based on hierarchical structure by Jing CHEN, Hanxing LI, Kun HE, Meng JIA, Yuqing LI, Ruiying DU

    Published 2024-01-01
    “…The volume-hiding encrypted multi-map (EMM) scheme is able to prevent attackers from inferring plaintext through the volume leakage, but existing solutions have problems with large storage and search computational costs.Based on the characteristic that the volume of the searched data often follows Zipf’s law, a hierarchical volume-hiding EMM scheme was proposed.Compared to the plain scheme that filled all keys’ volumes equally, converting the filling of the overall data into the filling of multiple sub-data blocks could reduce storage costs, and also achieved constant level complexity query overhead.Security analysis shows that the proposed scheme can achieve hidden matching volume without loss of query results.Simulation results show that compared with the most efficient scheme XorMM, the proposed scheme can increase the storage overhead by 10%, reduce the search computing overhead by 90%, and significantly improve the search efficiency.…”
    Get full text
    Article
  13. 193

    Predicting Short-Term Variations in End-to-End Cloud Data Transfer Throughput Using Neural Networks by Esma Yildirim, Arafat Akon

    Published 2023-01-01
    “…In this project, we collected multivariate time series data from Amazon Web Services (AWS) by conducting intra- and inter-region transfers between storage systems and compute resources using monitoring services. …”
    Get full text
    Article
  14. 194

    DARE: A decentralized association rules extraction scheme for embedded data sets in distributed IoT devices by Márcio Alencar, Raimundo Barreto, Horácio Fernandes, Eduardo Souto, Richard Pazzi

    Published 2020-10-01
    “…Performing knowledge extraction in a decentralized approach is a computational challenge considering the tight storage and processing constraints of IoT devices, unlike deep learning, which demands a massive amount of data, memory, and processing capability. …”
    Get full text
    Article
  15. 195
  16. 196

    Optimal Information Hiding: Advanced Bitstream-Based Watermarking for Secure and Efficient Integration of Image Data in Digital Videos by null Ramyashree, Venugopala P. S., Raghavendra S., null Sarojadevi

    Published 2024-01-01
    “…In order to assess the quality of the bitstream video watermarking technique, the peak signal-to-noise ratio (PSNR), structural similarity index (SSIM), and normalized correlation coefficient (NCC) are computed and examined by the testing data. The suggested model achieved a PSNR value up to 32.52 dB, SSIM value up to 0.97, and NCC value is 1. …”
    Get full text
    Article
  17. 197

    Threshold re-encryption based secure deduplication method for cloud data with resistance against side channel attack by Xin TANG, Linna ZHOU, Weijie SHAN, Dan LIU

    Published 2020-06-01
    “…For security and efficiency problems in threshold based deduplication for cloud data,a novel method based on threshold re-encryption was proposed to deal with side channel attacks.A lightweight threshold re-encryption mechanism was presented to transfer the secondary encryption to the cloud for execution and allow clients to generate ciphertext based on key segmentation instead of ciphertext segmentation,both of which largely reduce computational overhead of clients.Also,the proposed mechanism enables clients to decrypt from both one-time encrypted and re-encrypted ciphertext,thus avoiding the overhead of redundant encryption of the same file.Mutual integrity verification between cloud service provider and clients was also supported by the proposed method,which directly ensured the correctness of the correspondence between ciphertext and plaintext on client side.Experiments show that the proposed method not only largely reduces the computational overhead on client side,but also achieves superior storage performance on cloud side simultaneously.…”
    Get full text
    Article
  18. 198
  19. 199

    Privacy-Enhanced Data Sharing Systems from Hierarchical ID-Based Puncturable Functional Encryption with Inner Product Predicates by Cheng-Yi Lee, Zi-Yuan Liu, Masahiro Mambo, Raylin Tso

    Published 2024-01-01
    “…The emergence of cloud computing enables users to upload data to remote clouds and compute them. …”
    Get full text
    Article
  20. 200

    A Novel Massive Big Data Analysis of Educational Examination Research Using a Linear Mixed-Effects Model by Jing Zhao, Yiwen Wang

    Published 2021-01-01
    “…Experimental results have shown that the proposed model can not only effectively improve the efficiency of test data acquisition and storage but also reduce the computational burden and the memory usage, solve the problem of insufficient memory, and increase the calculation speed.…”
    Get full text
    Article