دانلود و نمایش مقالات مرتبط با Integrity verification::صفحه 1
بلافاصله پس از پرداخت دانلود کنید

با سلام خدمت کاربران در صورتی که با خطای سیستم پرداخت بانکی مواجه شدید از طریق کارت به کارت (6037997535328901 بانک ملی ناصر خنجری ) مقاله خود را دریافت کنید (تا مشکل رفع گردد). 

نتیجه جستجو - Integrity verification

تعداد مقالات یافته شده: 7
ردیف عنوان نوع
1 DOPIV: Post-Quantum Secure Identity-Based Data Outsourcing with Public Integrity Verification in Cloud Storage
DOPIV: برون سپاری داده مبتنی بر هویت امن پس از کوانتومی با تأیید صحت عمومی در فضای ذخیره سازی ابری-2022
Public verification enables cloud users to employ a third party auditor (TPA) to check the data integrity. However, recent breakthrough results on quantum computers indicate that applying quantum computers in clouds would be realized. A majority of existing public verification schemes are based on conventional hardness assumptions, which are vulnerable to adversaries equipped with quantum computers in the near future. Moreover, new security issues need to be solved when an original data owner is restricted or cannot access the remote cloud server flexibly. In this paper, we propose an efficient identity-based data outsourcing with public integrity verification scheme (DOPIV) in cloud storage. DOPIV is designed on lattice-based cryptography, which achieves post-quantum security. DOPIV enables an original data owner to delegate a proxy to generate the signatures of data and outsource them to the cloud server. Any TPA can perform data integrity verification efficiently on behalf of the original data owner, without retrieving the entire data set. Additionally, DOPIV possesses the advantages of being identity-based systems, avoiding complex certificate management procedures. We provide security proofs of DOPIV in the random oracle model, and conduct a comprehensive performance evaluation to show that DOPIV is more practical in post-quantum secure cloud storage systems.
Index Terms: Cloud storage | public verification | lattice-based cryptography | identity-based data outsourcing | post-quantum security
مقاله انگلیسی
2 Approaches for preserving content integrity of sensitive online Arabic content: A survey and research challenges
رویکردهای حفظ تمامیت محتوا از محتوای حساس آنلاین عربی: بررسی و چالش های تحقیقاتی-2019
Trends in Internet usage and accessing online content in different languages and formats are proliferating at a considerable speed. There is a vast amount of digital online content available in different formats that are sensitive in nature with respect to writing styles and arrangement of diacritics. However, research done in the area aimed at identifying the necessary techniques suitable for preserving content integrity of sensitive digital online content is limited. So, it is a challenge to determine the techniques most suitable for dif- ferent formats such as image or binary. Hence, preserving and verifying sensitive content constitutes an emerging problem and calls for timely solutions. The digital Holy Qur’an in Arabic, constitutes, one case of such sensitive content. Due to the different characteristics of the Arabic letters like diacritics (punctuation symbols), kashidas (extended letters) and other symbols, it is very easy to alter the original meaning of the text by simply chang- ing the arrangement of diacritics. This article surveys the different approaches that are presently employed in the process of preserving and verifying the content integrity of sen- sitive online content. We present the state-of-the-art in content integrity verification and address the existing challenges in preserving the integrity of sensitive texts using the Dig- ital Qur’an as a case study. The proposed taxonomy provides an effective classification and analysis of existing related schemes and their limitations. The paper discusses the recom- mendations of the expected efficiency of such approaches when applied for use in digital content integrity. Some of the main findings suggest unified approaches of watermarking and string matching approaches can be used to preserve content integrity of any sensitive digital content.
Keywords: Online sensitive content | Quran | Integrity | Watermarking | Cryptography | Steganography
مقاله انگلیسی
3 Blockchain data-based cloud data integrity protection mechanism
مکانیسم حفاظت از داده های ابر مبتنی بر داده بلاکچین -2019
Despite the rapid development of cloud computing for many years, data security and trusted computing are still the main challenges in current cloud computing applications. In order to solve this problem, many scholars have carried out a lot of research on this, and proposed many models including data integrity test and secure multi-party calculation. However, most of these solutions face problems such as excessive computational complexity or lack of scalability. This paper studies the use of blockchain techniques to improve this situation. Blockchain is a decentralized new distributed computing paradigm. Applying blockchain technology to cloud computing, using the security mechanism of the former to improve the performance of the latter’s secure storage and secure computing is a promising research topic. In this paper, the distributed virtual machine agent model is deployed in the cloud by using mobile agent technology. The virtual machine agent enables multi-tenants to cooperate with each other to ensure data trust verification. The tasks of reliable data storage, monitoring and verification are completed by virtual machine agent mechanism. This is also a necessary condition for building a blockchain integrity protection mechanism. The blockchain-based integrity protection framework is built by the virtual machine proxy model, and the unique hash value corresponding to the file generated by the Merkel hash tree is used to monitor the data change by means of the smart contract on the blockchain, and the data is owned in time. The user issues a warning message for data tampering; in addition, a ‘‘block-and-response’’ mode is used to construct a blockchain-based cloud data integrity verification scheme.
Keywords: Blockchain | Cloud data | Integrity verification | Merkel hash tree
مقاله انگلیسی
4 Pipeline-integrity: Scaling the use of authenticated data structures up to the cloud
پایپ لاین-یکپارچگی: مقیاس استفاده از ساختارهای داده معتبر تا ابر-2019
Public cloud storage services are widely adopted for their scalability and low cost. However, delegating the management of the storage has serious implications from the security point of view. We focus on integrity verification of query results based on the use of Authenticated Data Structures (ADS). An ADS enables efficient updates of a cryptographic digest, when data changes, and efficient query verification against this digest. Since, the digest can be updated (and usually signed) exclusively with the intervention of a trusted party, the adoption of this approach is source of a serious performance degradation, in particular when the trusted party is far from the server that stores the ADS. In this paper, we show a protocol for a key–value storage service that provides ADS-enabled integrity-protected queries and updates without impairing scalability, even in the presence of large network latencies between trusted clients and an untrusted server. Our solution complies with the principle of the cloud paradigm in which services should be able to arbitrarily scale with respect to number of clients, requests rates, and data size keeping response time limited. We formally prove that our approach is able to detect server misbehaviour in a setting whose consistency rules are only slightly weaker than those guaranteed by previous results. We provide experimental evidence for the feasibility and scalability of our approach.
Keywords: Authenticated data structures | Scalability | Cloud | Integrity | Pipeline | Fork-linearisability
مقاله انگلیسی
5 External integrity verification for outsourced big data in cloud and IoT: A big picture
راستی آزمایی یکپارچگی خارجی برای داده های بزرگ برون سپاری شده در ابر و اینترنت اشیاء: یک تصویر بزرگ-2015
Article history:Received 29 March 2014 Received in revised form 4 July 2014Accepted 15 August 2014Available online 27 August 2014Keywords:Cloud computing Data security Big dataInternet of Things Integrity verification Public auditingAs cloud computing is being widely adopted for big data processing, data security is becoming one of the major concerns of data owners. Data integrity is an important factor in almost any data and computation related context. It is not only one of the qualities of service, but also an important part of data security and privacy. With the proliferation of cloud computing and the increasing needs in analytics for big data such as data generated by the Internet of Things, verification of data integrity becomes increasingly important, especially on outsourced data. Therefore, research topics on external data integrity verification have attracted tremendous research interest in recent years. Among all the metrics, efficiency and security are two of the most concerned measurements. In this paper, we will bring forth a big picture through providing an analysis on authenticator-based data integrity verification techniques on cloud and Internet of Things data. We will analyze multiple aspects of the research problem. First, we illustrate the research problem by summarizing research motivations and methodologies. Second, we summarize and compare current achievements of several of the representative approaches. Finally, we introduce our view for possible future developments.© 2014 Elsevier B.V. All rights reserved.
Keywords: Cloud computing | Data security | Big data | Internet of Things | Integrity verification | Public auditing
مقاله انگلیسی
6 External integrity verification for outsourced big data in cloud and IoT: A big picture
تایید یکپارچگی خارجی برای اطلاعات بزرگ برون سپاری شده در ابر و IOT: تصویر بزرگ-2015
As cloud computing is being widely adopted for big data processing, data security is becoming one of the major concerns of data owners. Data integrity is an important factor in almost any data and computation related context. It is not only one of the qualities of service, but also an important part of data security and privacy. With the proliferation of cloud computing and the increasing needs in analytics for big data such as data generated by the Internet of Things, verification of data integrity becomes increasingly important, especially on outsourced data. Therefore, research topics on external data integrity verification have attracted tremendous research interest in recent years. Among all the metrics, efficiency and security are two of the most concerned measurements. In this paper, we will bring forth a big picture through providing an analysis on authenticator-based data integrity verification techniques on cloud and Internet of Things data. We will analyze multiple aspects of the research problem. First, we illustrate the research problem by summarizing research motivations and methodologies. Second, we summarize and compare current achievements of several of the representative approaches. Finally, we introduce our view for possible future developments. Keywords: Cloud computing Data security Big data Internet of Things Integrity verification Public auditing
مقاله انگلیسی
7 بررسی یکپارچگی خارجی برای داده های بزرگ برون سپاری شده در ابر و اینترنت اشیاء: یک تصویر بزرگ
سال انتشار: 2015 - تعداد صفحات فایل pdf انگلیسی: 10 - تعداد صفحات فایل doc فارسی: 42
همان طور که محساسبات ابری برای فرایند های داده های بزرگ در حال سازگاری هر چه بیشتر می باشد از این رو امنیت داده به یکی از چالش های اصلی صاحبان داده می باشد .یکپارچگی داده یکی فاکتور و شاخص مهم تقریبا در هر داده و محاسبات مربوط به این زمینه می باشد .این خود نه تنها یکی از خدمات کیفی مب شاد بلکه یک بخش مهم امنیت داده همچون داده های تولید شده توسط مسایل مرتبط با اینترنت می باشد بررسی و تایید یکپارچگی داده ها به طرز فزاینده ای مخصوصا در باره داده های برون منبعی امری مهم تلقی می شود.بنا براین موضعات تحقیقاتی بررسی یکپارچگی داده ها به طرز فوق العاده ای سوق و علاقه ی تحقیقاتی را در سالهای اخیر به سمت خود جذب کرده است .در بین همه این معیار ها ، کارآمدی و امنیت دو چالش اصلی در این بررسی می باشند. در این مقاله ما دیدی عظیم را از طریق مهیا سازی تجزیه و تحلیل درباره تکنیک های بررسی یکپارچگی داده های مبتنی بر احراز هویت در داده های ابر و مسایل مرتبط با اینترنت بیان خواهیم کرد.ما جنبه های مختلف مشکلات این حوزه تحقیقاتی را نیز مورد تجزیه و تحلیل قرار می دهیم.اول ما مشکلات تحقیقات را با جمع بندی و خلاصه سازی متودولوزی های تحقیقاتی و انگیزش تحقیقاتی به نمایش می گذاریم .دوم ما دست یافته های فعلی رویکرد های حاکی از این حوزه را جمع بندی کرده و مورد مقایسه قرار می دهیم.در نهایت نیز ما دید خود را برای توسعه های ممکن در پیش رو معرفی خواهیم کرد .
واژه های کلیدی : رایانش ابری | محاسبات ابری | امنیت داده | داده های بزرگ | اینترنت اشیا | بررسی یکپارچگی | حسابرسی عمومی
مقاله ترجمه شده
rss مقالات ترجمه شده rss مقالات انگلیسی rss کتاب های انگلیسی rss مقالات آموزشی
logo-samandehi
بازدید امروز: 5614 :::::::: بازدید دیروز: 0 :::::::: بازدید کل: 5614 :::::::: افراد آنلاین: 62