Showing 21 - 40 results of 411 for search 'Computer data storage', query time: 0.12s Refine Results
  1. 21
  2. 22
  3. 23

    Honest Computing: achieving demonstrable data lineage and provenance for driving data and process-sensitive policies by Florian Guitton, Axel Oehmichen, Étienne Bossé, Yike Guo

    Published 2024-01-01
    “…It enables privacy and confidentiality of data and code by design and default. We also introduce a reference framework to achieve demonstrable data lineage and provenance, contrasting it with Secure Computing, a related but differently orientated form of computing. …”
    Get full text
    Article
  4. 24

    Development of a Medical Information System with Data Storage and Intelligent Image Analysis by D. A. Yakimov, N. V. Vygovskaya, I. V. Drozdov

    Published 2024-03-01
    “…The relevance of the development of medical information systems for otolaryngology with artificial intelligence is substantiated, the process of developing an effective storage of medical data, taking into account their heterogeneity, is described. …”
    Get full text
    Article
  5. 25
  6. 26

    Data management based on blockchain and edge computing for Internet of things by Guanjie CHENG, Zhengjie HUANG, Shuiguang DENG

    Published 2020-06-01
    “…The popularity of smart devices has driven the development of the application of Internet of things (IoT) technology,and the resulting massive amount of IoT data has brought challenges to traditional centralized data management methods,such as performance,privacy,and security.Therefore,a data management framework of IoT based on blockchain and edge computing was proposed to support the distributed IoT data management.The distributed storage and access control could be provided by the framework for the IoT data.At the same time,a set of the built-in encryption scheme was designed to protect the data security and privacy and safeguard the data ownership.By introducing edge computing,the scalability bottleneck of the blockchain the system was relieved.The processes of data storage and data access based on this framework were given,and the algorithm of the system implementation based on the smart contract technology was explained in detail.Experiments show that the IoT data management system based on this framework outperforms the traditional cloud-based data management systems.…”
    Get full text
    Article
  7. 27

    New method for file deduplication in cloud storage by Chao YANG, Qian JI, Si-chun XIONG, Mao-zhen LIU, Jian-feng MA, Qi JIANG, Lin BAI

    Published 2017-03-01
    “…Deduplication is widely used in cloud storage service to save bandwidth and storage resources,however,the security of client deduplication still flaws in an external attack to access a user’s private data.Xu-CDE,a deduplication solution of encrypting data for multi-client was first proposed,which could protect the privacy of data from the external attackers and honest but curious server,with favorable theoretical meaning and representativeness.However,in Xu-CDE,the user ownership authentication credentials were lack of instantaneity protection,which could not resist replay attack.As an improvement to the flaw,the protocol MRN-CDE (MLE based and random number modified client-side deduplication of encrypted data in cloud storage) was proposed,adding random number in order to ensure the instantaneity of the authentication credentials,and using the algorithm of MLE-K<sub>P</sub>to extract key from original file to replace the file itself as an encryption key.As a consequence,the new protocol improved security while significantly reduced the amount of computation.After the safety analysis and the actual tests,results show that based on Xu-CDE,the proposed protocol MRN-CDE has stronger security of ownership,and improves time efficiency.Specially,the new protocol works better on large files in cloud with a certain value.…”
    Get full text
    Article
  8. 28
  9. 29

    Lightweight privacy protection data auditing scheme for regenerating-coding-based distributed storage by Guangjun LIU, Wangmei GUO, Jinbo XIONG, Ximeng LIU, Changyu DONG

    Published 2021-07-01
    “…To reduce the security implementation cost of the outsourcing data audit mechanism for the regenerating-coding-based distributed storage systems, an orthogonal algebraic coding method was put forward to construct a lightweight privacy-preserving audit scheme based on linear homomorphic authentication.The homomorphic authentication tags were generated with the orthogonalization between the file encoded data and the private secret key vector, and the privacy protection of the auditing response message was achieved by using the random masking that was constructed by randomizing the orthogonal basis vectors of the specific sub-vector of the user’s secret key.The work realized the effective integration of algebraic coding, privacy protection, and security auditing.Theoretical analysis shows that the proposed scheme can realize the information-theoretic security in the regenerating-coding-based storage applications.Compared with the existing works, the proposed scheme is of low computational complexity and communication overhead, and better performance advantages.…”
    Get full text
    Article
  10. 30

    Data comparable encryption scheme based on cloud computing in Internet of things by Qian MENG, Jianfeng MA, Kefei CHEN, Yinbin MIAO, Tengfei YANG

    Published 2018-04-01
    “…The previously proposed short comparable encryption (SCE) scheme can infer the plaintext relationship by comparing the ciphertexts relationship as well as ensuring data security in Internet of things.Unfortunately,it will incur high storage and computational burden during the process of comparing ciphertexts and generating tokens.To this end,an efficient short comparable encryption scheme called SCESW was proposed,which was utilizing the sliding window method with the same size window.Formal security analysis shows that the scheme can guarantee weak indistinguishability in standard model as well as data security and integrity.The experimental results demonstrate that the storage of the SCESW scheme is <inline-formula><math xmlns="http://www.w3.org/1998/Math/MathML"> <mfrac> <mn>1</mn> <mi>t</mi> </mfrac> <mo stretchy="false">(</mo><mi>t</mi><mi>></mi><mn>1</mn><mo stretchy="false">)</mo></math></inline-formula> times shorter than that of the SCE scheme and the efficiency of the SCESW scheme is superior to that of the SCE scheme.…”
    Get full text
    Article
  11. 31

    Analysis of the Impact of Big Data on E-Commerce in Cloud Computing Environment by Rongrui Yu, Chunqiong Wu, Bingwen Yan, Baoqin Yu, Xiukao Zhou, Yanliang Yu, Na Chen

    Published 2021-01-01
    “…These two storage mechanisms together constitute a data storage subsystem. …”
    Get full text
    Article
  12. 32
  13. 33
  14. 34

    Cloud storage scheme based on closed-box encryption by Rui-zhong DU, Shao-xuan WANG, Jun-feng TIAN

    Published 2017-07-01
    “…Aiming at protecting the confidentiality of data for cloud storage users,a scheme that encrypt data in cloud service providers was presented.The scheme constructed a closed-box computing environment by virtual machine isolation technique,improved algorithm of RSA to change keys without having to produce large prime numbers,transfer data and keys through SSL and encrypted data in the closed computing environment before storing to the distributed file system.Closed-box computing environment can prevent attacks from cloud administrators and malicious applications in the operating system.It also can guard against data leakage effectively.The result of experiment shows that the confidentiality of data improved and the performance loss is decreased considering to other cloud storage scheme that encrypt data in cloud.…”
    Get full text
    Article
  15. 35

    Optimal dispatch of distributed renewable energy and energy storage systems via optimal configuration of mobile edge computing by He Jiang, Yan Zhao, Hang Zhou

    Published 2024-12-01
    “…The lower model ensures the complete accommodation of renewable energy and the optimal economic operation of the whole area through the introduction of electric vehicles (EVs) and secondary operation of energy storage systems under the constraint of MEC server computing delay. …”
    Get full text
    Article
  16. 36

    Study and implementation of electric cloud storage pool’s management system by Feng SHANG, Aiqiang Dong, Jian ZHANG, Guoxia WANG, Hongge ZHANG

    Published 2018-04-01
    “…The storage pool is an important part of the resource pool and plays an important role in data storage and data backup.The storage pool has the characteristics of large scale,prominent isomerism,and complex functions.The storage pool management system of the storage pool guarantees the normal work of the storage pool.Based on the design of the storage pool architecture,the functional framework of the storage pool was clarified,and the deployment structure of the storage pool management system and the overall architecture of the storage pool management system was proposed and designed,and the implementation functions and display form of the management system were elaborated in detail.The research and implementation of the storage pool management system not only promoted the construction of the power cloud resource pool,but also provided a good reference for other companies’ cloud computing technology.…”
    Get full text
    Article
  17. 37

    An edge cloud–based body data sensing architecture for artificial intelligence computation by TaeYoung Kim, JongBeom Lim

    Published 2019-04-01
    “…As various applications and workloads move to the cloud computing system, traditional approaches of processing sensor data cannot be applied. …”
    Get full text
    Article
  18. 38

    Geometric Data Perturbation-Based Personal Health Record Transactions in Cloud Computing by S. Balasubramaniam, V. Kavitha

    Published 2015-01-01
    “…We propose that personal health record transactions be managed using geometric data perturbation in cloud computing. In our proposed scheme, the personal health record database is perturbed using geometric data perturbation and outsourced to the Amazon EC2 cloud.…”
    Get full text
    Article
  19. 39

    QoE-Driven Big Data Management in Pervasive Edge Computing Environment by Qianyu Meng, Kun Wang, Xiaoming He, Minyi Guo

    Published 2018-09-01
    “…Therefore, enhancing the QoE has become a major challenge in high-dimensional big data in the pervasive edge computing environment. …”
    Get full text
    Article
  20. 40

    Proof of storage with corruption identification and recovery for dynamic group users by Tao JIANG, Hang XU, Liangmin WANG, Jianfeng MA

    Published 2022-10-01
    “…The outsourced storage mode of cloud computing leads to the separation of data ownership and management rights of data owners, which changes the data storage network model and security model.To effectively deal with the software and hardware failures of the cloud server and the potential dishonest service provider and also ensure the availability of the data owners’ data, the design of secure and efficient data availability and recoverability auditing scheme has both theoretical and practical importance in solving the concern of users and ensuring the security of cloud data.However, most of the existing studies were designed for the security and efficiency of data integrity or recoverability schemes, without considering the fast identification and reliable recovery of damaged data under dynamic group users.Thus, to quickly identify and recover damaged data, a publicly verifiable proof of storage scheme was proposed for dynamic group cloud users.The designed scheme enabled a trusted third-party auditor to efficiently identify the damaged files through a challenge-response protocol and allowed the cloud storage server to effectively recover them when the degree of data damage is less than an error correction ability threshold.The scheme combined association calculation and accumulation calculation, which effectively reduced the number of calculations for the identification of damaged data.By combining erasure coding and shared coding technology, the scheme achieved effective recovery of damaged data of dynamic group users.At the same time, the scheme also supported dynamic user revocation, which ensured the integrity audit and reliable recovery of the collective data after user revocation.The network model and threat model of the designed scheme were defined and the security of the scheme under the corresponding security model was proved.Through the prototype implementation of the scheme in the real environment and the modular performance analysis, it is proved that the proposed scheme can effectively identify the damaged data and reliably recover the cloud data when the data is damaged.Besides, compared with other schemes, it is also proved that the proposed scheme has less computational overhead in identifying and recovering damaged data.…”
    Get full text
    Article