-
21
Key point of NFV hardware resource pool planning and construction
Published 2018-06-01Subjects: Get full text
Article -
22
Biotechnological tools boost the functional diversity of DNA-based data storage systems
Published 2025-01-01Get full text
Article -
23
Honest Computing: achieving demonstrable data lineage and provenance for driving data and process-sensitive policies
Published 2024-01-01“…It enables privacy and confidentiality of data and code by design and default. We also introduce a reference framework to achieve demonstrable data lineage and provenance, contrasting it with Secure Computing, a related but differently orientated form of computing. …”
Get full text
Article -
24
Development of a Medical Information System with Data Storage and Intelligent Image Analysis
Published 2024-03-01“…The relevance of the development of medical information systems for otolaryngology with artificial intelligence is substantiated, the process of developing an effective storage of medical data, taking into account their heterogeneity, is described. …”
Get full text
Article -
25
Data Temperature Informed Streaming for Optimising Large-Scale Multi-Tiered Storage
Published 2024-06-01Get full text
Article -
26
Data management based on blockchain and edge computing for Internet of things
Published 2020-06-01“…The popularity of smart devices has driven the development of the application of Internet of things (IoT) technology,and the resulting massive amount of IoT data has brought challenges to traditional centralized data management methods,such as performance,privacy,and security.Therefore,a data management framework of IoT based on blockchain and edge computing was proposed to support the distributed IoT data management.The distributed storage and access control could be provided by the framework for the IoT data.At the same time,a set of the built-in encryption scheme was designed to protect the data security and privacy and safeguard the data ownership.By introducing edge computing,the scalability bottleneck of the blockchain the system was relieved.The processes of data storage and data access based on this framework were given,and the algorithm of the system implementation based on the smart contract technology was explained in detail.Experiments show that the IoT data management system based on this framework outperforms the traditional cloud-based data management systems.…”
Get full text
Article -
27
New method for file deduplication in cloud storage
Published 2017-03-01“…Deduplication is widely used in cloud storage service to save bandwidth and storage resources,however,the security of client deduplication still flaws in an external attack to access a user’s private data.Xu-CDE,a deduplication solution of encrypting data for multi-client was first proposed,which could protect the privacy of data from the external attackers and honest but curious server,with favorable theoretical meaning and representativeness.However,in Xu-CDE,the user ownership authentication credentials were lack of instantaneity protection,which could not resist replay attack.As an improvement to the flaw,the protocol MRN-CDE (MLE based and random number modified client-side deduplication of encrypted data in cloud storage) was proposed,adding random number in order to ensure the instantaneity of the authentication credentials,and using the algorithm of MLE-K<sub>P</sub>to extract key from original file to replace the file itself as an encryption key.As a consequence,the new protocol improved security while significantly reduced the amount of computation.After the safety analysis and the actual tests,results show that based on Xu-CDE,the proposed protocol MRN-CDE has stronger security of ownership,and improves time efficiency.Specially,the new protocol works better on large files in cloud with a certain value.…”
Get full text
Article -
28
Application of Internet of Things in the Health Sector: Toward Minimizing Energy Consumption
Published 2022-12-01Subjects: Get full text
Article -
29
Lightweight privacy protection data auditing scheme for regenerating-coding-based distributed storage
Published 2021-07-01“…To reduce the security implementation cost of the outsourcing data audit mechanism for the regenerating-coding-based distributed storage systems, an orthogonal algebraic coding method was put forward to construct a lightweight privacy-preserving audit scheme based on linear homomorphic authentication.The homomorphic authentication tags were generated with the orthogonalization between the file encoded data and the private secret key vector, and the privacy protection of the auditing response message was achieved by using the random masking that was constructed by randomizing the orthogonal basis vectors of the specific sub-vector of the user’s secret key.The work realized the effective integration of algebraic coding, privacy protection, and security auditing.Theoretical analysis shows that the proposed scheme can realize the information-theoretic security in the regenerating-coding-based storage applications.Compared with the existing works, the proposed scheme is of low computational complexity and communication overhead, and better performance advantages.…”
Get full text
Article -
30
Data comparable encryption scheme based on cloud computing in Internet of things
Published 2018-04-01“…The previously proposed short comparable encryption (SCE) scheme can infer the plaintext relationship by comparing the ciphertexts relationship as well as ensuring data security in Internet of things.Unfortunately,it will incur high storage and computational burden during the process of comparing ciphertexts and generating tokens.To this end,an efficient short comparable encryption scheme called SCESW was proposed,which was utilizing the sliding window method with the same size window.Formal security analysis shows that the scheme can guarantee weak indistinguishability in standard model as well as data security and integrity.The experimental results demonstrate that the storage of the SCESW scheme is <inline-formula><math xmlns="http://www.w3.org/1998/Math/MathML"> <mfrac> <mn>1</mn> <mi>t</mi> </mfrac> <mo stretchy="false">(</mo><mi>t</mi><mi>></mi><mn>1</mn><mo stretchy="false">)</mo></math></inline-formula> times shorter than that of the SCE scheme and the efficiency of the SCESW scheme is superior to that of the SCE scheme.…”
Get full text
Article -
31
Analysis of the Impact of Big Data on E-Commerce in Cloud Computing Environment
Published 2021-01-01“…These two storage mechanisms together constitute a data storage subsystem. …”
Get full text
Article -
32
-
33
An Approach to Data Processing for the Smart District Heating System
Published 2022-06-01Subjects: Get full text
Article -
34
Cloud storage scheme based on closed-box encryption
Published 2017-07-01“…Aiming at protecting the confidentiality of data for cloud storage users,a scheme that encrypt data in cloud service providers was presented.The scheme constructed a closed-box computing environment by virtual machine isolation technique,improved algorithm of RSA to change keys without having to produce large prime numbers,transfer data and keys through SSL and encrypted data in the closed computing environment before storing to the distributed file system.Closed-box computing environment can prevent attacks from cloud administrators and malicious applications in the operating system.It also can guard against data leakage effectively.The result of experiment shows that the confidentiality of data improved and the performance loss is decreased considering to other cloud storage scheme that encrypt data in cloud.…”
Get full text
Article -
35
Optimal dispatch of distributed renewable energy and energy storage systems via optimal configuration of mobile edge computing
Published 2024-12-01“…The lower model ensures the complete accommodation of renewable energy and the optimal economic operation of the whole area through the introduction of electric vehicles (EVs) and secondary operation of energy storage systems under the constraint of MEC server computing delay. …”
Get full text
Article -
36
Study and implementation of electric cloud storage pool’s management system
Published 2018-04-01“…The storage pool is an important part of the resource pool and plays an important role in data storage and data backup.The storage pool has the characteristics of large scale,prominent isomerism,and complex functions.The storage pool management system of the storage pool guarantees the normal work of the storage pool.Based on the design of the storage pool architecture,the functional framework of the storage pool was clarified,and the deployment structure of the storage pool management system and the overall architecture of the storage pool management system was proposed and designed,and the implementation functions and display form of the management system were elaborated in detail.The research and implementation of the storage pool management system not only promoted the construction of the power cloud resource pool,but also provided a good reference for other companies’ cloud computing technology.…”
Get full text
Article -
37
An edge cloud–based body data sensing architecture for artificial intelligence computation
Published 2019-04-01“…As various applications and workloads move to the cloud computing system, traditional approaches of processing sensor data cannot be applied. …”
Get full text
Article -
38
Geometric Data Perturbation-Based Personal Health Record Transactions in Cloud Computing
Published 2015-01-01“…We propose that personal health record transactions be managed using geometric data perturbation in cloud computing. In our proposed scheme, the personal health record database is perturbed using geometric data perturbation and outsourced to the Amazon EC2 cloud.…”
Get full text
Article -
39
QoE-Driven Big Data Management in Pervasive Edge Computing Environment
Published 2018-09-01“…Therefore, enhancing the QoE has become a major challenge in high-dimensional big data in the pervasive edge computing environment. …”
Get full text
Article -
40
Proof of storage with corruption identification and recovery for dynamic group users
Published 2022-10-01“…The outsourced storage mode of cloud computing leads to the separation of data ownership and management rights of data owners, which changes the data storage network model and security model.To effectively deal with the software and hardware failures of the cloud server and the potential dishonest service provider and also ensure the availability of the data owners’ data, the design of secure and efficient data availability and recoverability auditing scheme has both theoretical and practical importance in solving the concern of users and ensuring the security of cloud data.However, most of the existing studies were designed for the security and efficiency of data integrity or recoverability schemes, without considering the fast identification and reliable recovery of damaged data under dynamic group users.Thus, to quickly identify and recover damaged data, a publicly verifiable proof of storage scheme was proposed for dynamic group cloud users.The designed scheme enabled a trusted third-party auditor to efficiently identify the damaged files through a challenge-response protocol and allowed the cloud storage server to effectively recover them when the degree of data damage is less than an error correction ability threshold.The scheme combined association calculation and accumulation calculation, which effectively reduced the number of calculations for the identification of damaged data.By combining erasure coding and shared coding technology, the scheme achieved effective recovery of damaged data of dynamic group users.At the same time, the scheme also supported dynamic user revocation, which ensured the integrity audit and reliable recovery of the collective data after user revocation.The network model and threat model of the designed scheme were defined and the security of the scheme under the corresponding security model was proved.Through the prototype implementation of the scheme in the real environment and the modular performance analysis, it is proved that the proposed scheme can effectively identify the damaged data and reliably recover the cloud data when the data is damaged.Besides, compared with other schemes, it is also proved that the proposed scheme has less computational overhead in identifying and recovering damaged data.…”
Get full text
Article