Showing 61 - 80 results of 411 for search 'Computer data storage', query time: 0.08s Refine Results
  1. 61
  2. 62

    Multi-version consolidation method for block-level backup data by WANG Shu-peng 1, WU Guang-jun1, WU Zhi-gang3, YUN Xiao-chun1

    Published 2011-01-01
    “…Historical version backup data query efficiency was dependent on the version chain length in a multi-version backup data storage system.A novel block-level backup data multi-version consolidation method was presented for this problem.Any version of a historical full system snapshot could be generated within the incremental backup data version sequence.Theoretical analysis showed that it could increase the target snapshot version query efficiency significantly in the version chain.A variable-length block version merging algorithm was presented to decrease the computing complex-ity in the process of snapshot version merging,according to the block-level backup data distribution features.Finally,the concrete applications and performance analysis for block-level version consolidation method was also introduced.The simulated experiments results expose that the version consolidation method can eliminate redundant version of backup data with the same version chain length,and it can increase full system recovery efficiency than traditional methods sig-nificantly.…”
    Get full text
    Article
  3. 63
  4. 64

    Provable Data Recoverability and Hide-Able Access Pattern Based ORAM by Hongwei Li, Feiyue Ye, Dan Chen

    Published 2013-12-01
    “…With the development and application of cloud computing, more and more customers choose cloud storage as the storage medium, therefore, data integrity and privacy become a major problem that the customers concern. …”
    Get full text
    Article
  5. 65

    Interconnection technology for data center of telecom operator by Lili TANG, Ning ZHANG

    Published 2015-12-01
    “…With the continuous development of cloud computing and big data,service requirement to compute and storage challenges the scale of single data center.Building a data center interconnection network has become a must to achieve the data center scale up and service deployment flexibility.By constructing data center interconnection network,telecom operators can further integrate IT resource as“cloud”,in order to increase the resource utility and fasten new telecom service deployment efficiency,so to enhance the core business competitiveness.The representative solution of data center interconnection and the technology characteristic was analyzed.Combined with the requests of telecom resource integration,several data center interconnection technologies and their deployment in telecom carrier cloud network constructions were analyzed.…”
    Get full text
    Article
  6. 66

    Key-exposure resilient integrity auditing scheme with encrypted data deduplication by Xiangsong ZHANG, Chen LI, Zhenhua LIU

    Published 2019-04-01
    “…For the problems of key-exposure,encrypted data duplication and integrity auditing in cloud data storage,a public auditing scheme was proposed to support key update and encrypted data deduplication.Utilizing Bloom filters,the proposed scheme could achieve client-side deduplication,and guaranteed that the key exposure in one time period didn’t effect the users’ private key in other time periods.The proposed scheme could solve the conflict between key-exposure resilient and encrypted data deduplication in public auditing scheme for the first time.Security analysis indicates that the proposed scheme is strong key-exposure resilient,confidentiality,detectability,and unforgeability of authentication tags and tokens under the computation Diffie-Hellman hardness assumption in the random oracle model.…”
    Get full text
    Article
  7. 67
  8. 68

    Trend of next generation network architecture:computing and networking convergence evolution by Huijuan ·AO, Liang GENG

    Published 2019-09-01
    “…The great development of the industrial internet represented by the industrial internet will promote the transformation of the future network from the information infrastructure with information transmission as the core to the intelligent information infrastructure integrating perception,transmission,storage,computing and processing.Based on the development trend of application,network technologies and cloud computing technologies,the future data network needs to redesign the network architecture,which were proposed from the integration of computing,network and storage to meet the needs of new business and new scenarios in the future.…”
    Get full text
    Article
  9. 69
  10. 70
  11. 71

    Secure sensitive data deduplication schemes based on deterministic/probabilistic proof of file ownership by Yue CHEN, Chao-ling LI, Ju-long LAN, Kai-chun JIN, Zhong-hui WANG

    Published 2015-09-01
    “…To solve the difficult problems of sensitive data deduplication in cloud storage,such as detection and PoW (proofs of ownership) of the duplicated ciphertext,the attacks aiming at data sensitivity,etc,a Merkle hash tree based scheme called MHT-Dedup and a homomorphic MAC based scheme called hMAC-Dedup were proposed.Both schemes provided PoW of the ciphertext file to find duplicated files on cross-user file level and check the hash of block plaintext to find duplicated blocks on local block-level,which avoided the security flaws of the hash-as-a-proof method in the cross-user file-level client-side duplication detection.MHT-Dedup provided the deterministic PoW of file with an authen-ticating binary tree generated from the tags of encrypted blocks,which had lower computing and transferring cost,and hMAC-Dedup provided the probabilistic PoW of file by verifying some sampled blocks and their homomorphic MAC tags,which had lower additional storage cost.Analyses and comparisons show that proposed schemes are preferable in many as-pects such as supporting secure two-level client-side sensitive data deduplication and resisting to brute force attack to blocks.…”
    Get full text
    Article
  12. 72

    Adsorption isotherms in roasted specialty coffee (Coffea arabica L.): Dataset and statistical tools for optimizing storage conditions and enhancing shelf lifeMendeley Data by Gentil A. Collazos-Escobar, Andrés F. Bahamón-Monje, Nelson Gutiérrez-Guzmán

    Published 2025-02-01
    “…This work presents a comprehensive dataset of adsorption isotherms and infrared spectral data for roasted specialty coffee (Coffea arabica L.). …”
    Get full text
    Article
  13. 73

    Big Data Technology:Current Applications and Prospects by Jianxin Liao

    Published 2015-07-01
    “…The research includes computer science,information science,management science,psychology,etc.Four key technologies in big data research,data collection,preprocessing and storagedata analysis and mining,data privacy protection,data center system structure were discussed and the hot research topics from domestic and overseas research groups were demonstrated in order to have comprehensive and systematic understanding of big data.The application status of big data was introduced from three perspectives,application platforms,relevant products and standardization.Meanwhile,description of current business in big data and other field was presented.Eventually,the opportunities and challenges in big data research were revealed through big data analysis strategies,privacy protection and data quality,which provide the guideline for future research.…”
    Get full text
    Article
  14. 74

    Integration and Application of Information and Energy Technologies in Computing Power Integrated Energy Systems by ZHANG Tian, GAO Jianwei, LIU Haoyu, LIU Jiangtao, TAN Qinliang

    Published 2025-02-01
    “…The computing power integrated energy system (CPIES), as a new type of energy system framework, realizes the intelligent management of energy production, transmission, storage, consumption, and information processing by integrating computing and energy resources with the acceleration of digital transformation and the popularity of renewable energy. …”
    Get full text
    Article
  15. 75

    TCCL:secure and efficient development of desktop cloud structure by Bin WANG, Wei-min LI, Jin-fang SHENG, Si-nuo XIAO

    Published 2017-10-01
    “…A secure and efficient development of desktop cloud structure:TCCL (transparent computing-based cloud),which was designed under the guidance of transparent computing,was proposed.TCCL applied the method,separating calculation and storage,loading in a block streaming way which was proposed in the transparent computing theory,to the cloud desktop system,and deployed the defense module of security threats under the cloud VM (virtual machine).As a result,the TCCL could improve the security level on the cloud VMs’ system files and data files,and could optimize the cloud virtual machines' storage efficiency.…”
    Get full text
    Article
  16. 76
  17. 77
  18. 78

    Survey of the future network technology and trend by Tao HUANG, Jiang LIU, Shuo WANG, Chen ZHANG, Yunjie LIU

    Published 2021-01-01
    Subjects: “…deterministic network, network computing and storage integration…”
    Get full text
    Article
  19. 79

    An improved Fully Homomorphic Encryption model based on N-Primes by Mohammed Anwar Mohammed, Fadhil Salman Abed

    Published 2019-10-01
    “…The physical distance between the users and providers allows third parties to be capable of accessing the data which threats the privacy of the users. Thus, its security is the main concern when it comes to transform data from a locally owned storage to cloud storage. …”
    Get full text
    Article
  20. 80

    Certificateless public key cryptography based provable data possession scheme in edge environment by Ziyuan WANG, Ruizhong DU

    Published 2022-07-01
    “…In the edge environment, data transmission to the cloud needs to pass through a new entity, the edge node, which makes the data security problem more complicated, the confidentiality and integrity of data are difficult to be guaranteed, and the traditional provable data possession scheme is not suitable for the edge environment with a large number of devices.Based on this, a certificateless public key cryptography based provable data possession scheme was proposed for the edge environment, combining the online/offline signature idea, where the user device only needed to perform light computation when uploading data in the case of semi-trusted edge nodes, leaving the rest of the computation to be performed in the offline phase.The scheme used edge nodes for auditing work while supporting auditing in different storage states, as well as privacy protection and other features.The security analysis shows that the proposed scheme is proven to be secure by being able to effectively combat three types of adversary attacks under a stochastic prediction model.Experimental comparisons with other schemes show that the proposed scheme has lowest time overhead.…”
    Get full text
    Article