Showing 41 - 60 results of 411 for search 'Computer data storage', query time: 0.11s Refine Results
  1. 41
  2. 42

    Agricultural Information Management Data Model Construction Based on Cloud Computing and Semantic Technology by Chunhang Wang, Zhe An

    Published 2022-01-01
    “…The registration rate improves than the traditional method by 12.46% and computational cost by 23.76%. This method has higher accuracy in storage data mining and retrieval for large information management systems and superior performance than the traditional method. …”
    Get full text
    Article
  3. 43

    Data sharing scheme supporting secure outsourced computation in wireless body area network by Wei-wei ZHANG, Yu-zhao ZHANG, Chao HUANG, Ru ZHANG, Yi-xian YANG

    Published 2017-04-01
    “…How to effectively protect the security of data sharing in WBAN was a key problem to be solved urgently.The traditional CP-ABE mechanism had a 〝one to many〝 data security communication function which was suitable for access control in WBAN,but it had high computational complexity and did not support attribute revocation.Fully considering of limitations on computation and storage of sensor nodes and dynamic user attribute in WBAN,a CP-ABE scheme was proposed which was provably secure against CPA under the standard model and supported attributes revocation,outsourced encryption and decryption.Compared with the proposed schemes,the computation burden on senor nodes is greatly reduced and the user's attribution can be revoked immediately and fine grained while meeting the demand of its security in the proposed scheme.…”
    Get full text
    Article
  4. 44

    Time-based and privacy protection revocable and traceable data sharing scheme in cloud computing by Jiawei ZHANG, Jianfeng MA, Zhuo MA, Teng LI

    Published 2021-10-01
    “…General ciphertext-policy attribute-based encryption (CP-ABE) provides fine-grained access control for data sharing in cloud computing, but its plaintext formed access policy may cause leakage of private and sensitive data.And revoking a malicious user by accurately tracing the identity according to a leaked decryption key is a huge challenge.Moreover, most of existing revocable schemes incur long user revocation list and low efficiency.To solve these problems, a time-based and privacy preserving revocable and traceable data sharing scheme was proposed based on CP-ABE to support expressive monotonic and partial hidden access policy, large attribute universe by conceal the attribute values in access policy.Time-limited data access control using hierarchical identity-based encryption was achieved to set key valid period for users.Moreover, with the approaches of white-box tracing and binary tree, efficient user tracing and direct revocation with shorter revocation list was realized together with high efficiency via online/offline and verifiable outsourced decryption techniques.Furthermore, the scheme was secure under decisional q-BDHE assumption.Theoretical analysis and extensive experiments demonstrate its advantageous performance in computational and storage cost.…”
    Get full text
    Article
  5. 45

    Research and application of big data platform technology based on multi-centre collaborative computing by RUAN Yilong, XU Xueling, FA Hu, DONG Silun, JIANG Lei, YANG Lei, YAN Yuanyuan

    Published 2024-05-01
    “…The platform has improved efficiency by 17% in 5G Core capacity scheduling subsystem (5GC) multi-centre big data job development and operation, and has achieved the collaborative scheduling of a total of 42 PB of storage, 84 TB of memory, and 24 984 VCore computing resources, with a daily average of 80 308 times of task scheduling between the front cluster and the core cluster.…”
    Get full text
    Article
  6. 46

    ECMO: An Efficient and Confidential Outsourcing Protocol for Medical Data by Xiangyi Meng, Yuefeng Du, Cong Wang

    Published 2025-01-01
    “…Cloud computing has significantly advanced medical data storage capabilities, enabling healthcare institutions to outsource data management. …”
    Get full text
    Article
  7. 47
  8. 48

    A Verifiable and Secure Industrial IoT Data Deduplication Scheme With Real-Time Data Integrity Checking in Fog-Assisted Cloud Environments by Jakkarin Lapmoon, Somchart Fugkeaw

    Published 2025-01-01
    “…Additionally, we introduced a temporal data removal algorithm to manage outdated IoT data effectively, significantly reducing storage costs in fog computing environments. …”
    Get full text
    Article
  9. 49

    Comprehensive Survey of Big Data Mining Approaches in Cloud Systems by Zainab Salih Ageed, Subhi R. M. Zeebaree, Mohammed Mohammed Sadeeq, Shakir Fattah Kak, Hazha Saeed Yahia, Mayyadah R. Mahmood, Ibrahim Mahmood Ibrahim

    Published 2021-04-01
    “…The effect of computing conventions and algorithms on detailed storage and data communication requirements has been studied. …”
    Get full text
    Article
  10. 50
  11. 51

    A New Solution of Privacy-Preserving Public Auditing Scheme for Cloud Storage Security by Shaohui Wang, Danwei Chen, Zhiwei Wang, Suqin Chang

    Published 2012-09-01
    “…And, enabling public auditability for cloud storage is of critical importance to users with constrained computing resources, who can resort to a third party auditor to check the integrity of outsourced data. …”
    Get full text
    Article
  12. 52

    Comparative Analysis of Nextcloud and Owncloud Performance as Infrastructure as a Service (IaaS) Based Cloud Storage by Prita Haryani, Renna Yanwastika Ariyana, Iqbal Abdul Majid, Fx. Guntur Putra Susanto

    Published 2024-12-01
    “…Physical data storage using flash drives or local computer storage continues to be used for document archiving in database laboratories. …”
    Get full text
    Article
  13. 53

    Analysis and improvement on identity-based cloud data integrity verification scheme by Shaohui WANG, Xiaoxiao PAN, Zhiwei WANG, Fu XIAO, Ruchuan WANG

    Published 2018-11-01
    “…Many individuals or businesses outsource their data to remote cloud.Cloud storage provides users the advantages of economic convenience,but data owners no longer physically control over the stored data,which introduces new security challenges,such as no security guarantees of integrity and privacy.The security of two identity-based cloud data integrity verification schemes by Zhang et al and Xu et al respectively are analysed.It shows that Zhang et al.’s scheme is subjected to secret key recovery attack for the cloud servers can recover user’s private key only utilizing stored data.And Xu et al.’s scheme cannot satisfy security requirements of soundness.Based on Xu et al.'…”
    Get full text
    Article
  14. 54

    Classification auditting scheme for privacy protection of outsourced EHR based on distributed storage by ZHANG Xiaoxu, CHEN Yuchen, HA Guanxiong, JIA Chunfu

    Published 2024-09-01
    “…In order to ensure the secure storage of EHR, an efficient distributed data integrity auditing scheme based on EHR classification was proposed. …”
    Get full text
    Article
  15. 55
  16. 56

    Aggregated privacy-preserving auditing for cloud data integrity by Kai HE, Chuan-he HUANG, Xiao-mao WANG, Jing WANG, Jiao-li SHI

    Published 2015-10-01
    “…To solve the problem of data integrity in cloud storage,an aggregated privacy-preserving auditing scheme was proposed.To preserve data privacy against the auditor,data proof and tag proof were encrypted and combined by using the bilinearity property of the bilinear pairing on the cloud server.Furthermore,an efficient index mechanism was designed to support dynamic auditing,which could ensure that data update operations did not lead to high additional computation or communication cost.Meanwhile,an aggregation method for different proofs was designed to handle multiple auditing requests.Thus the proposed scheme could also support batch auditing for multiple owners and multiple clouds and multiple files.The communication cost of batch auditing was independent of the number of auditing requests.The theoretical analysis and experimental results show that the proposed scheme is provably secure.Compared with existing auditing scheme,the efficacy of the proposed individual auditing and batch auditing improves 21.5% and 31.8% respectively.…”
    Get full text
    Article
  17. 57

    A method to estimate the water storage of on-farm reservoirs by detecting slope gradients based on multi-spectral drone data by Yixuan Wang, Nana Yan, Weiwei Zhu, Zonghan Ma, Bingfang Wu

    Published 2025-02-01
    “…Previous studies have primarily relied on the area-storage model to estimate reservoir water storage using meter-level remotely sensed data, which often falls short of accurately capturing the water storage dynamics of OFRs, especially in small OFRs with steep slopes. …”
    Get full text
    Article
  18. 58

    Blockchain-based and verifiable multidimensional data aggregation and sharing scheme for smart grid by Jianwei CHEN, Shuyu WANG, Meiping ZHANG, Zhenping ZHANG

    Published 2024-01-01
    “…Aiming at the problem that how to support lightweight multi-dimensional data aggregation, achieve double-end integrity verification of multi-dimensional data in the overall process of the system, and deal with the centralization of cloud servers, a blockchain-based and verifiable multidimensional data aggregation and sharing scheme for smart grid was proposed.Firstly, in order to meet the demand for fine-grained analysis of power data in smart grid, privacy-preserving multidimensional data aggregation was achieved by using masked values and Horner’s rule.On this basis, for the data integrity verification problem of the existing data aggregation scheme in the sharing of cloud storage data with the third party, a new signature algorithm was designed by borrowing the RSA-based multiplicative homomorphic commitment scheme and homomorphic hash function homomorphism, which enabled the cloud server to verify the integrity of aggregated data and be used for integrity verification in the data sharing phase, i.e., it achieved double-end verifiability of cloud storage data and was resistant to internal attacks.Meanwhile, an aggregated data sharing architecture based on federated chain multichain was proposed to effectively avoid centralisation problems such as single-machine processing bottleneck and vulnerability to attacks.The theoretical analysis proves the security of the scheme.Performance experiments show that the proposed scheme has lower computation and communication costs compared with existing schemes.…”
    Get full text
    Article
  19. 59

    Data Overlay Mesh in Distributed Clouds Allowing Collaborative Applications by Milos Simic, Jovana Dedeic, Milan Stojkov, Ivan Prokic

    Published 2025-01-01
    “…This architectural decision does not come without additional costs when managing isolation and data privacy between tenants. That is a known challenge in cloud computing that translates to systems closer to the users, namely edge computing and micro clouds. …”
    Get full text
    Article
  20. 60

    Research on incentive mechanism for mobile intelligent edge computing by Shuyun LUO, Yuzhou WEN, Weiqiang XU, Shenghong ZHU

    Published 2019-06-01
    “…As a new architecture,mobile edge computing gives edge users stronger capabilities of computing,storage and communication,but it needs reasonable incentives mechanism to motivate edge users to provide resources.In terms of the three typical scenarios of mobile intelligent edge computing:computation offloading,edge caching and data collection,the incentive mechanism in the above scenarios was studied at first,then the core scientific problems were proposed that need to be solved in the incentive mechanism design of mobile intelligent edge computing from three perspectives of service quality,network quality and data quality.Finally,the technical challenges in the process of solving the above problems were analysed deeply and the corresponding feasible solutions were given.…”
    Get full text
    Article