-
81
Adaptive Shrink and Shard Architecture Design for Blockchain Storage Efficiency
Published 2024-01-01“…This research combines a sorting data technique and a proper compression technique to obtain efficient data storage on the blockchain. …”
Get full text
Article -
82
High-performance reconfigurable encryption scheme for distributed storage
Published 2023-10-01“…As the world embraces the digital economy and enters an information society, data has emerged as a critical production factor.The collection, processing, and storage of data have become increasingly prevalent.Distributed storage systems, known for their efficiency, are widely used in various data fields.However, as the scale of data storage continues to expand, distributed storage faces more significant security risks, such as information leakage and data destruction.These challenges drive the need for innovative advancements in big data distributed storage security technology and foster the integration of domestic cryptographic technology with computing storage technology.This work focused on addressing security issues, particularly information leakage, in distributed storage nodes.A dynamic and reconfigurable encryption storage solution was proposed, which considered the requirements for encryption performance and flexibility.A high-performance reconfigurable cryptographic module was designed based on the bio mapping framework.Based on this module, multiple storage pools equipped with different cryptographic algorithms were constructed to facilitate high-performance encryption and decryption operations on hard disk data.The scheme also enabled dynamic switching of cryptographic algorithms within the storage pools.A cryptographic protocol with remote online loading functions for cryptographic algorithms and keys was developed to meet the unified management and convenient security update requirements of reconfigurable cryptographic modules in various storage nodes.Furthermore, the scheme implemented fine-grained data encryption protection and logical security isolation functions based on cryptographic reconstruction technology.Experimental results demonstrate that the performance loss of this scheme for encryption protection and security isolation of stored data is approximately 10%.It provides a technical approach for distributed storage systems to meet the cryptographic application technology requirements outlined in GB/T 39786-2021 “Information Security Technology-Basic Requirements for Cryptography Applications” Level 3 and above in terms of device and computing security, application and data security.…”
Get full text
Article -
83
Blockchain sharding storage scheme based on concatenated coding
Published 2024-07-01“…Traditional blockchain faces the challenge of storage scalability. Existing research has reduced the storage overhead of blockchain based on erasure coding theory, but it brings high computational and communication spending during the decoding and recovery of blocks. …”
Get full text
Article -
84
Computing satellite networks—the novel development of computing-empowered space-air-ground integrated networks
Published 2022-06-01“…Facing the increasing demands for computing ability and network access, the space-air-ground integrated networks in 6G systems is expected to surmount the limits on a single point of computing ability and traditional network transmission through the advantages of network cluster, where the novel space-air-ground integrated networks that deeply integrate cloud, edge, terminal, network, data, and computation is subsequently formed by taking computing ability as the core and network infrastructure as the foundation.Initially, the current situation and development in existing computing force networks and space-air-ground integrated networks (SAGIN) was introduced.Along with the demands for 6G computing-empowered space-air-ground integrated networks, the concept of satellite computing networks was defined and the co-existed system of computing capability and communication networks was further discussed.Then, the space networks, air networks, and ground networks of the layered satellite computing network architecture were discussed.Based on that, its logical network architecture that includes computing resource layer, computing abstract layer, and computing orchestration layer was further introduced.After that, the key technology enablers with respct to computing and storage issue, trusted transmission issue, satellite computing force addressing issue, and high-mobility computing force routing issue was discussed.Finally, the typical applicaiton scenarios of satellite computing networks and envision its future was presented.…”
Get full text
Article -
85
Multi-user collaborative access control scheme in cloud storage
Published 2016-01-01“…CP-ABE was considered as one of most suitable methods of access control in cloud storage. However, it was just fit for reading or modifying different data files respectively. …”
Get full text
Article -
86
Attribute-based bilateral access control scheme for cloud storage
Published 2024-04-01“…Secondly, combining with the batch verification technology, the attribute based bilateral access control scheme was constructed on the composite order groups, which enabled both the data owner and data user to simultaneously define the access policies for each other. …”
Get full text
Article -
87
Defining the sensitivity of cosmic ray muons to groundwater storage changes
Published 2024-11-01“…After correcting these variations for atmospheric effects, we interpret the muon time series in terms of groundwater storage changes. Comparisons with river stream flow, and volumetric soil water content data, show similar variation patterns to the groundwater estimates from our muon measurements. …”
Get full text
Article -
88
Future vehicular fog computing networks
Published 2020-06-01“…Facing the requirements of secure and reliable vehicle driving,internet of vehicles requires high real-time information transmission and processing,high data storage and security using capacity,and high flexibility and inclusiveness of network architecture.The future vehicular fog computing network can reduce the data transmission and processing delay based on the characteristics of fog computing deployed at the edge of the network,can ensure data security based on the characteristics of fog computing black box operation,and can make heterogeneous facilities connect with other devices and make sure resource sharing between vehicle nodes based on the fog computing distributed architecture.The future vehicular fog computing networks were reviewed,the architecture,challenges,and key technologies of vehicle fog computing were introduced,the communication and computing resource sharing and task collaboration in the mobile state,vehicle fog computing security,and vehicle fog computing heterogeneity of facilities were focused on .Finally,a three-level management and control architecture for vehicular fog computing networks were proposed to promote the development of internet of vehicles to on-networking collaborative decision-making and control.…”
Get full text
Article -
89
A Retrieval Optimized Surveillance Video Storage System for Campus Application Scenarios
Published 2018-01-01Get full text
Article -
90
Continuous User Verification in Cloud Storage Services using Deep Learning
Published 2025-01-01“… Cloud storage services have become a new paradigm for storing data user over the Internet. …”
Get full text
Article -
91
Hadoop-Based Painting Resource Storage and Retrieval Platform Construction and Testing
Published 2021-01-01“…This paper adopts Hadoop as the platform and MapReduce as the computing framework and uses Hadoop Distributed Filesystem (HDFS) distributed file system to store massive log data, which solves the storage problem of massive data. …”
Get full text
Article -
92
Key storage management scheme based on keyed hash tree with state
Published 2018-05-01“…To solve the problem of massive keys storage caused by multi-source data encryption in ciphertext retrieval system,a key storage scheme based on keyed hash tree with state was proposed.The scheme computes encryption key according to the root key and key derivation tree,and just needs to store the root key and the tree structure,which greatly reduces the key storage costs.In addition,the scheme manages key revocation according to the revocation state value,thereby solving the problem of key revocation and structure update.Strict security analysis shows that the partial data key disclosure does not leak the data confidentiality of remaining data,and the performance analysis using real-world dataset shows that the proposed key storage management scheme is acceptable in ciphertext retrieval system.…”
Get full text
Article -
93
Critical Length and Collapse of Interlayer in Rock Salt Natural Gas Storage
Published 2018-01-01“…The existence of an interlayer has a significant effect on the stability of a rock salt gas storage cavity; therefore, an uncontrollable collapse of the interlayer would cause a series of issues. …”
Get full text
Article -
94
A generative adversarial network for multiple reads reconstruction in DNA storage
Published 2024-12-01Get full text
Article -
95
Individual health passport storage, sharing and verification scheme based on blockchain
Published 2024-04-01“…This integration aimed to streamline blockchain storage, alleviating the storage load while guaranteeing the dependable archiving and secure dissemination of user-sensitive data. …”
Get full text
Article -
96
Design and performance analysis of portable solar powered cooler for vaccine storage
Published 2024-11-01“…In response to this challenge, the present study introduces a novel design of a portable, locally‐made solar‐powered cooler optimized for longer storage periods. The cooler's performance in terms of temperature distribution, airflow dynamics, and the coefficient of performance (COP) is meticulously examined through computational fluid dynamics (CFD) simulations. …”
Get full text
Article -
97
Remote Satellites Computing transmission and Key Technologies
Published 2022-06-01“…The diversity of remote sensing data and the increase of acquisition ability make the amount of data generated on the satellite increase geometrically.This situation puts tremendous pressure on the remote satellite data transmission system.This makes the remote satellite data transmission system unable to meet the needs of real-time transmission and becomes the bottleneck of remote sensing data application.The research on massive remote satellite data transmission systems and technology is one of the frontier fi elds of international satellite information network science and technology.Focused on the critical problems of remote satellite real-time data transmission bottleneck, remote sensing data transmission timeliness, remote sensing load utilization, and onboard storage, combined with the traditional satellite data transmission system with onboard intelligent processing, a new remote satellite computing transmission framework was proposed, and its key technologies were analyzed.…”
Get full text
Article -
98
Academic connotation and research trends of privacy computing
Published 2022-12-01“…The authors of this paper first proposed the concept, definition and academic connotation of privacy computing, and formed a relatively mature theoretical and technical system accordingly.In order to continuously promote the academic research and industrial application of privacy computing, the academic connotation of privacy computing was elaborated, including how to understand the full-life cycle, extended control, privacy quantification and mapping, desensitization effect evaluation.Besides, the necessity of iterative on-demand desensitization and the motivation to study the language of privacy computing were presented.The role of audit log self-storage in ubiquitous sharing was explained and some distorted academic concepts were also clarified.Moreover, 37 research points in 9 aspects of privacy computing and 40 research points in 8 aspects of data security were given.It helps to better understand the research scope of privacy computing and correctly distinguish between privacy computing and data security.…”
Get full text
Article -
99
Secure deduplication and integrity audit system based on convergent encryption for cloud storage
Published 2017-11-01“…Cloud storage applications quickly become the best choice of the personal user and enterprise storage with its convenience,scalability and other advantages,secure deduplication and integrity auditing are key issues for cloud storage.At first,convergent key encapsulation/decoupling algorithm based on blind signature was set up,which could securely store key and enable it to deduplicate.Besides,a BLS signature algorithm based on convergence key was provided and use TTP to store public key and proxy audit which enables signature and pubic key deduplication and reduces client storage and computing overhead.Finally,cloud-based secure deduplicaion and integrity audit system was designed and implemented.It offered user with data privacy protection,deduplication authentication,audit authentication services and lowered client and cloud computation overhead.…”
Get full text
Article -
100
Attribute-based encryption scheme supporting attribute revocation in cloud storage environment
Published 2019-05-01“…Attribute-based encryption (ABE) scheme is widely used in the cloud storage due to its fine-grained access control.Each attribute in ABE may be shared by multiple users at the same time.Therefore,how to achieve attribute-level user revocation is currently facing an important challenge.Through research,it has been found that some attribute-level user revocation schemes currently can’t resist the collusion attack between the revoked user and the existing user.To solve this problem,an attribute-based encryption scheme that supported the immediate attribute revocation was proposed.The scheme could achieve attribute-level user revocation and could effectively resist collusion attacks between the revoked users and the existing users.At the same time,this scheme outsourced complex decryption calculations to cloud service providers with powerful computing ability,which reduced the computational burden of the data user.The scheme was proved secure based on computational Diffie-Hellman assumption in the standard model.Finally,the functionality and efficiency of the proposed scheme were analyzed and verified.The experimental results show that the proposed scheme can safely implement attribute-level user revocation and has the ability to quickly decrypt,which greatly improves the system efficiency.…”
Get full text
Article