دانلود و نمایش مقالات مرتبط با Cloud storage::صفحه 1
بلافاصله پس از پرداخت دانلود کنید

با سلام خدمت کاربران در صورتی که با خطای سیستم پرداخت بانکی مواجه شدید از طریق کارت به کارت (6037997535328901 بانک ملی ناصر خنجری ) مقاله خود را دریافت کنید (تا مشکل رفع گردد). 

نتیجه جستجو - Cloud storage

تعداد مقالات یافته شده: 30
ردیف عنوان نوع
1 DOPIV: Post-Quantum Secure Identity-Based Data Outsourcing with Public Integrity Verification in Cloud Storage
DOPIV: برون سپاری داده مبتنی بر هویت امن پس از کوانتومی با تأیید صحت عمومی در فضای ذخیره سازی ابری-2022
Public verification enables cloud users to employ a third party auditor (TPA) to check the data integrity. However, recent breakthrough results on quantum computers indicate that applying quantum computers in clouds would be realized. A majority of existing public verification schemes are based on conventional hardness assumptions, which are vulnerable to adversaries equipped with quantum computers in the near future. Moreover, new security issues need to be solved when an original data owner is restricted or cannot access the remote cloud server flexibly. In this paper, we propose an efficient identity-based data outsourcing with public integrity verification scheme (DOPIV) in cloud storage. DOPIV is designed on lattice-based cryptography, which achieves post-quantum security. DOPIV enables an original data owner to delegate a proxy to generate the signatures of data and outsource them to the cloud server. Any TPA can perform data integrity verification efficiently on behalf of the original data owner, without retrieving the entire data set. Additionally, DOPIV possesses the advantages of being identity-based systems, avoiding complex certificate management procedures. We provide security proofs of DOPIV in the random oracle model, and conduct a comprehensive performance evaluation to show that DOPIV is more practical in post-quantum secure cloud storage systems.
Index Terms: Cloud storage | public verification | lattice-based cryptography | identity-based data outsourcing | post-quantum security
مقاله انگلیسی
2 Lossy Data Compression for IoT Sensors: A Review
فشرده سازی داده های از دست رفته برای حسگرهای اینترنت اشیا: مرور-2022
Internet of Things (IoT) can be considered a suitable platform for industrial applications, enabling large systems that connect a huge number of intelligent sensors and subsequent data collection for analytical applications. This factor is responsible for the substantial increase in the current volume of data generated by IoT devices. The large volume of data generated by IoT sensors can lead to unusual demands on cloud storage and data transmission bandwidths. A suitable approach to address these issues is through data compression approaches. This article presents a systematic review of the literature on lossy data compression algorithms that allows the systems to reduce the data detected by IoT devices. Lossy algorithms have a good compression ratio, preserving data quality and minimizing compression errors. A taxonomy was proposed from the review results, and the main works were classified, analyzed, and discussed.
keywords: فشرده سازی داده ها | اینترنت اشیا IOT | از بین رفتن در فشرده سازی | حسگرها | Data compression | IoT Internet of things | Lossy compression | Sensors
مقاله انگلیسی
3 A real-time tennis level evaluation and strokes classification system based on the Internet of Things
یک سیستم ارزیابی سطح تنیس در زمان واقعی و طبقه بندی ضربه ها بر اساس اینترنت اشیا-2022
In this study a single wearable inertial measurement unit (IMU) and machine learning method- ologies were used to conduct player level evaluation and classification five prototype tennis strokes in real-time. The International Tennis Number (ITN) test was used to verify the accuracy of this IoT system in evaluating participant level. We conducted the ITN test on thirty-six par- ticipants and conducted one-way ANOVA on the ITN test results using IBM SPSS 26. The IMU in this study contained a tri-axis accelerometer (± 16 g) and tri-axis gyroscope (± 2000◦ /s) worn on the participants’ wrist connected to a wireless low-energy Bluetooth smart-phone with data sent to the computer terminal by cloud storage. Data processing including preprocessing, segmenta- tion, feature extraction, dimensionality reduction and classification using Support Vector Ma- chines (SVM), K-nearest neighbor (K-NN) and Naive Bayes (NB) algorithms. One-way ANOVA analysis predicting participants’ ITN level and ITN field test scores yielded p < 0.001 at the three different skill levels tested. SVM (MinMax), SVM (Standardiser) and SVM (MaxAbsScaler) clas- sified unique tennis strokes precision and recall factors at the three different skill levels reliably yielded in f1-scores above 0.90 for serve, forehand and backhand, with f1-scores for forehand and backhand volley scores falling below that. The results of this study suggest using a single six-axial 50 Hz IMU in combination with SVM and SVM + PCA represents a significant step towards a more reliable wearable tennis stroke performance and skill level real-time evaluation and feedback technology.
keywords: اینترنت اشیا | جمع آوری داده ها | پردازش داده ها | یادگیری ماشین | اپلیکیشن موبایل | تنیس | سنسورهای پوشیدنی | ارتباطات بی سیم | Internet of Things | Data collection | Data processing | Machine learning | Mobile application | Tennis | Wearable sensors | Wireless communication
مقاله انگلیسی
4 Blockchain-based fair payment smart contract for public cloud storage auditing
قرارداد هوشمند پرداخت عادلانه مبتنی بر بلاکچین برای ممیزی ذخیره سازی ابر عمومی-2019
Cloud storage plays an important role in today’s cloud ecosystem. Increasingly clients tend to outsource their data to the cloud. In spite of its copious advantages, integrity has always been a significant issue. The audit method is commonly used to ensure integrity in cloud scenarios. However, traditional auditing schemes expect a third-party auditor (TPA), which is not always available in the real world. Also, the former scheme implies a limited pay- as-you-go service, as it requires the client to pay for the service in advance. In this paper, we aim to address the aforementioned drawback by adopting blockchain to replace TPA and designing a blockchain-based fair payment smart contract for public cloud storage auditing. In our system, data owner and cloud service provider (CSP) will run a blockchain-based smart contract. The contract ensures that the CSP is required to submit data possession proof regularly. The CSP gets paid only if the verification is passed; otherwise, it gets no remuneration but has to pay the penalties. To reduce the number of interactions in the execution of contract, we present the notion of non-interactive public provable data possession and design a blockchain-based smart contract for public cloud storage auditing based on this primitive.
Keywords: Blockchain | Smart contract | Public auditing | Fair payment | Cloud storage
مقاله انگلیسی
5 Efficient, dynamic and identity-based Remote Data Integrity Checking for multiple replicas
یکپارچگی داده های از راه دور کارآمد ، پویا و مبتنی بر هویت بررسی تکرارهای متعدد-2019
Nowadays, cloud storage plays an increasingly important role in our daily life. However, the cloud users do not have the physical possession of their own data anymore. To confirm whether the outsourced files are maintained intact without downloading them entirely, a mechanism namely Remote Data Integrity Checking (RDIC) is invented. Currently, some RDIC schemes allow the data owners with limited computation or communication power to delegate the checking task to a third-party verifier. However, most of these schemes rely on the complicated and resource consuming public key infrastructure (PKI). In this paper, we propose a novel identitybased RDIC scheme, namely Efficient, Dynamic and Identity-based Multiple Replication Provable Data Possession (EDID-MRPDP) without the burden of PKI. We introduce a new construction of Homomorphic Verifiable Tag (HVT) and a novel data structure namely Compressed Authentication Array (CAA), which allow EDID-MRPDP to perform batch verification for multiple data owners and cloud servers simultaneously and efficiently, both from computation and communication aspects. To the best of our knowledge, EDID-MRPDP is the first ID-based RDIC scheme with full dynamic updates and multi-replica batch checking. We provide comprehensive correctness and soundness proofs of EDID-MRPDP. Meanwhile, the detailed performance analyses and simulations show that EDID-MRPDP is practical for large-scale cloud applications.
Keywords: Cloud storage | Dynamic data update | Identity-based cryptography | Multi-replica | Batch checking | Provable data possession
مقاله انگلیسی
6 Detailed analysis and improvement of an efficient and secure identity-based public auditing for dynamic outsourced data with proxy
تجزیه و تحلیل دقیق و بهبود ممیزی عمومی مبتنی بر هویت کارآمد و ایمن برای داده های برون سپاری پویا با پروکسی-2019
For data owners of restricted cloud access with a delegated proxy, public auditing technology for cloud data integrity, plays critical roles in ensuring powerful productivity that flexible cloud services provide for their business. In order to address the scalability of data owners and storage clouds for secure public auditing, Yu et al. (2017) proposed an Identity-Based Public Auditing for Dynamic Outsourced Data with Proxy Processing (https://doi.org/10.3837/tiis.2017.10.019), which also overcomes complicated public key certificates management issue. In this article, we figure out that this scheme is vulnerable to data loss attack where clouds could pass integrity auditing without original data. Meanwhile, a threat of system security is demonstrated, i.e., any entities are able to recover proxy private keys and impersonate proxy to forge proxy tag, with two arbitrary data tag pairs of same data owner. To enable secure identity-based batch public auditing with proxy processing, we propose an improved scheme without these security flaws and prove its security under CDH hard problem in the random oracle model. With complexity anal- ysis, our scheme shows better efficiency over identity-based proxy-oriented data uploading and remote data integrity checking in public cloud (ID-PUIC) in a single owner effort on a single cloud. Especially, we give the detailed analysis for how efficiently the attacks on Yu et al.’s scheme could be launched with an experiment, and demonstrate complete reduction on probability and time for proving security of our improved scheme. For potential application in big data storage, we first evaluate the error detection probability varying on number of auditing blocks, and then conduct detailed performance analysis by simulating our scheme and ID-PUIC scheme on the different number of data owners and storage clouds, with up to 10 6 data blocks
Keywords: Cloud storage | Proxy | Public data auditing | Identity-based cryptography | Provable security
مقاله انگلیسی
7 VRS-DB: Preserve confidentiality of users data using encryption approach
VRS-DB: اهمیت حفظ محرمانه بودن داده های کاربران با استفاده از روش رمزنگاری-2019
We focus on security and privacy problems within a cloud database framework, which exploits the Database as a Service (DBaaS). In this framework, an information proprietor drives out its information to a cloud database professional company. To o er information security, the Data-Owner (DO) encrypts the delicate information before transmission at the cloud database professional company end. Current encryption ideas, nonetheless, are just halfway homomorphic as in every one of them it was intended to enable one explicit kind of calculation, which had been accomplished on scrambled information.These current plans can’t be coordinated to solution of genuine functional queries that include activities of various types. We propose and evaluate verifiable Reliable Secure-Database (VRS-DB) framework on shared tables along with many primary operations on scrambled information that enables information interoperability, permitting an extensive possibility of SQL queries to be prepared by the Service-provider on encoded data. We show that our security and privacy idea is protected from two forms of threats and are fundamentally proficient.
KEYWORDS: Privacy | Security | Cloud Storage | Encrypted Query | Cryptography | Sensitive Data
مقاله انگلیسی
8 Blockchain-based fair payment smart contract for public cloud storage auditing
قرارداد هوشمند پرداخت عادلانه مبتنی بر بلاکچین برای ممیزی ذخیره سازی ابر عمومی-2019
Cloud storage plays an important role in today’s cloud ecosystem. Increasingly clients tend to outsource their data to the cloud. In spite of its copious advantages, integrity has always been a significant issue. The audit method is commonly used to ensure integrity in cloud scenarios. However, traditional auditing schemes expect a third-party auditor (TPA), which is not always available in the real world. Also, the former scheme implies a limited pay- as-you-go service, as it requires the client to pay for the service in advance. In this paper, we aim to address the aforementioned drawback by adopting blockchain to replace TPA and designing a blockchain-based fair payment smart contract for public cloud storage auditing. In our system, data owner and cloud service provider (CSP) will run a blockchain-based smart contract. The contract ensures that the CSP is required to submit data possession proof regularly. The CSP gets paid only if the verification is passed; otherwise, it gets no remuneration but has to pay the penalties. To reduce the number of interactions in the execution of contract, we present the notion of non-interactive public provable data possession and design a blockchain-based smart contract for public cloud storage auditing based on this primitive..
Keywords: Blockchain | Smart contract | Public auditing | Fair payment | Cloud storage
مقاله انگلیسی
9 Pipeline-integrity: Scaling the use of authenticated data structures up to the cloud
پایپ لاین-یکپارچگی: مقیاس استفاده از ساختارهای داده معتبر تا ابر-2019
Public cloud storage services are widely adopted for their scalability and low cost. However, delegating the management of the storage has serious implications from the security point of view. We focus on integrity verification of query results based on the use of Authenticated Data Structures (ADS). An ADS enables efficient updates of a cryptographic digest, when data changes, and efficient query verification against this digest. Since, the digest can be updated (and usually signed) exclusively with the intervention of a trusted party, the adoption of this approach is source of a serious performance degradation, in particular when the trusted party is far from the server that stores the ADS. In this paper, we show a protocol for a key–value storage service that provides ADS-enabled integrity-protected queries and updates without impairing scalability, even in the presence of large network latencies between trusted clients and an untrusted server. Our solution complies with the principle of the cloud paradigm in which services should be able to arbitrarily scale with respect to number of clients, requests rates, and data size keeping response time limited. We formally prove that our approach is able to detect server misbehaviour in a setting whose consistency rules are only slightly weaker than those guaranteed by previous results. We provide experimental evidence for the feasibility and scalability of our approach.
Keywords: Authenticated data structures | Scalability | Cloud | Integrity | Pipeline | Fork-linearisability
مقاله انگلیسی
10 Achieving high performance and privacy-preserving query over encrypted multidimensional big metering data
دستیابی به پرس و جو با حفظ عملکرد بالا و حفظ حریم خصوصی بیش از داده های اندازه گیری بزرگ چند بعدی محصور شده-2018
With the proliferation of smart grids, traditional utilities are struggling to handle the increasing amount of metering data. Outsourcing the metering data to heterogeneous distributed systems has the poten tial to provide efficient data access and processing. In an untrusted heterogeneous distributed system environment, employing data encryption prior to outsourcing can be an effective way to preserve user privacy. However, how to efficiently query encrypted multidimensional metering data stored in an un trusted heterogeneous distributed system environment remains a research challenge. In this paper, we propose a high performance and privacy-preserving query (P2Q) scheme over encrypted multidimen sional big metering data to address this challenge. In the proposed scheme, encrypted metering data are stored in the server of an untrusted heterogeneous distributed system environment. A Locality Sensitive Hashing (LSH) based similarity search approach is then used to realize the similarity query. To demon strate utility of the proposed LSH-based search approach, we implement a prototype using MapReduce for the Hadoop distributed environment. More specifically, for a given query, the proxy server will return K top similar data object identifiers. An enhanced Ciphertext-Policy Attribute-based Encryption (CP-ABE) policy is then used to control access to the search results. Therefore, only the requester with an authorized query attribute can obtain the correct secret keys to retrieve the metering data. We then prove that the P2Q scheme achieves data confidentiality and preserves the data owner’s privacy in a semi-trusted cloud. In addition, our evaluations demonstrate that the P2Q scheme can significantly reduce response time and provide high search efficiency without compromising on search quality (i.e. suitable for multidimensional big data search in heterogeneous distributed system, such as cloud storage system).
Keywords: Smart grid ، High performance ، Privacy preservation ، Similarity query ، Multidimensional big metering data
مقاله انگلیسی
rss مقالات ترجمه شده rss مقالات انگلیسی rss کتاب های انگلیسی rss مقالات آموزشی
logo-samandehi
بازدید امروز: 303 :::::::: بازدید دیروز: 3084 :::::::: بازدید کل: 3387 :::::::: افراد آنلاین: 8