-
161
Recursive Delta-Operator-Based Subspace Identification with Fixed Data Size
Published 2023-01-01“…By fading the impact of past data on future data, the amount of data storage can be decreased. …”
Get full text
Article -
162
AONT-and-NTRU-based rekeying scheme for encrypted deduplication
Published 2021-10-01Get full text
Article -
163
A hybrid blockchain-based solution for secure sharing of electronic medical record data
Published 2025-01-01Get full text
Article -
164
Crayfish optimization based pixel selection using block scrambling based encryption for secure cloud computing environment
Published 2025-01-01“…Abstract Cloud Computing (CC) is a fast emerging field that enables consumers to access network resources on-demand. …”
Get full text
Article -
165
CO2 adsorption on microporous metal–organic frameworks unravelled by high-resolution X-ray computed tomography
Published 2025-02-01“…The collected imaging data is used to calculate the effective permeability along the MOF’s particle through numerical simulations. …”
Get full text
Article -
166
High-Performance Computational Early Warning Analysis of Agricultural Economy Relying on Binary Fuzzy Cluster Analysis Algorithm
Published 2021-01-01“…Its functional structure includes management business, innovation business, service business, production business, and operation business functions, in addition to the design of the collection and storage scheme based on Hadoop data warehouse, to achieve accurate matching of information of science and technology agricultural services in the whole agricultural industry chain. …”
Get full text
Article -
167
Penerapan Machine Learning untuk Mengendalikan Parameter Budidaya Tanaman Hidroponik Berbasis Edge dan Cloud Computing
Published 2024-08-01“…In this study, the control of pH and TDS utilizes machine learning with a multiple linear regression method and edge computing and cloud computing technologies. Edge computing allows real-time data processing at the hydroponic system's sensor devices, while cloud computing provides large storage and processing capacities. …”
Get full text
Article -
168
Management of Sensor-Related Data Based on Virtual TEDS in Sensing RFID System
Published 2015-03-01Get full text
Article -
169
The Role of Big Data Analytics in Revolutionizing Diabetes Management and Healthcare Decision-Making
Published 2025-01-01Get full text
Article -
170
Security control scheme for cloud data copy based on differential privacy model
Published 2017-05-01“…In cloud computing environment,adversary may use data deduplication as a side channel to eavesdrop users’ privacy.In order to tackle this serious issue,a secure copy number control scheme was proposed.The highlights of the proposed scheme lie in constructing a hybrid cloud framework.Then file was encrypted for second times by using the privacy protection parameters of differential privacy as well as the key of the file computed by convergent encryption algorithm.After the file is uploaded,each file has only one copy in the server.Meanwhile,compared with the scheme that use setting threshold value to control the number of copies,the proposed scheme can resist against the side channel attack,related files attack,and the specific attack of encryption algorithm and save the network bandwidth and disk storage space.…”
Get full text
Article -
171
Intelligent forecasting and monitoring of air index based on big data and internet of things
Published 2017-11-01“…Air quality forecast has become an urgent need.However,numerical forecast of air quality is a complex systems engineering.The intelligent forecasting of air index was studied from the perspective of big data and intelligent decision making.For the index prediction of air quality,the popular classification algorithm was introduced to realize the intelligent analysis of historical data.To obtain air quality information in real time,a monitoring system based on Internet of Things was established,and intelligent processing of real-time data collected by the classification algorithm was achieved.Due to the large amount of historical air index data and real-time data collected,the technology of cloud computing and big data was introduced to speed up the data processing and improve the storage of data.In addition,the client based on Android was developed to allow users to query the air quality anytime,anywhere.…”
Get full text
Article -
172
Cloud data secure deduplication scheme via role-based symmetric encryption
Published 2018-05-01“…The rapid development of cloud computing and big data technology brings prople to enter the era of big data,more and more enterprises and individuals outsource their data to the cloud service providers.The explosive growth of data and data replicas as well as the increasing management overhead bring a big challenge to the cloud storage space.Meanwhile,some serious issues such as the privacy disclosure,authorized access,secure deduplication,rekeying and permission revocation should also be taken into account.In order to address these problems,a role-based symmetric encryption algorithm was proposed,which established a mapping relation between roles and role keys.Moreover,a secure deduplication scheme was proposed via role-based symmetric encryption to achieve both the privacy protection and the authorized deduplication under the hierarchical architecture in the cloud computing environment.Furthermore,in the proposed scheme,the group key agreement protocol was utilized to achieve rekeying and permission revocation.Finally,the security analysis shows that the proposed role-based symmetric encryption algorithm is provably secure under the standard model,and the deduplication scheme can meet the security requirements.The performance analysis and experimental results indicate that the proposed scheme is effective and efficient.…”
Get full text
Article -
173
Dynamic multi-keyword searchable encryption scheme
Published 2023-04-01“…Users of cloud storage often outsource their data to cloud servers to save local storage resources.However, cloud storage data is out of the user’s physical control, which may lead to malicious theft or disclosure of private data on cloud.At present, dynamic searchable encryption schemes are mostly based on symmetric searchable encryption, which need to establish a secure key sharing channel in advance, and cannot be directly applied to data sharing in cloud storage scenarios.For the secure sharing scenario of multi-party data in cloud storage, a dynamic multi-keyword searchable encryption scheme was proposed.The forward index was constructed by a cuckoo filter to enable data owners to perform documents and index dynamic updates.The conjunctive multi-keywords search was supported by combining bilinear pairing with Lagrangian interpolation polynomials.To reduce the computational overhead in the ciphertext retrieval phase, a combination of inverted index and forward index was constructed to improve the retrieval efficiency of cloud server.This scheme is provably secure with the indistinguishability in adaptively chosen keyword attack under decision linear Diffie-Hellman problem.Simulation experiments were conducted to analyze the execution efficiency of the scheme for keyword search and index update in different datasets.The results show that the scheme effectively avoids the linear correlation between the retrieval time and the number of ciphertexts, and reduces the computational overhead in the update operation with a large amount of data.…”
Get full text
Article -
174
-
175
-
176
Design of Telecom Operators' Network Data Sharing Platform Based on Hadoop+MPP Architecture
Published 2014-04-01“…Based on using distributed computing and distributed storage technology, the telecom operators' network data sharing platform based on Hadoop +MPP architectures was studied. …”
Get full text
Article -
177
The Role of Cognitive Science and Big Data Technology in the Design of Business Information Management Systems
Published 2022-01-01“…With the surge in the amount of data in the internal and external environment, the collection, analysis, processing, and storage of the increasing data sources and data volume, as well as the problems of big data management, are the current situation and dilemmas of data management faced by enterprises today. …”
Get full text
Article -
178
Video Data Integrity Verification Method Based on Full Homomorphic Encryption in Cloud System
Published 2018-01-01“…Cloud computing is a new way of data storage, where users tend to upload video data to cloud servers without redundantly local copies. …”
Get full text
Article -
179
Research on Network Resource Collection and Distribution Strategies in Big Data-Driven Multimedia Teaching
Published 2023-01-01“…The multimedia teaching information data generated in the era of big data are increasing at a huge scale, but the computing environment used before is difficult to meet users’ requirements for data integration. …”
Get full text
Article -
180
A Dynamic Thermal-Allocation Solution to the Complex Economic Benefit for a Data Center
Published 2020-01-01“…Data centers, which provide computing services and gain profits, are indispensable to every city in the information era. …”
Get full text
Article