با سلام خدمت کاربران در صورتی که با خطای سیستم پرداخت بانکی مواجه شدید از طریق کارت به کارت (6037997535328901 بانک ملی ناصر خنجری ) مقاله خود را دریافت کنید (تا مشکل رفع گردد).
ردیف | عنوان | نوع |
---|---|---|
1 |
DOPIV: Post-Quantum Secure Identity-Based Data Outsourcing with Public Integrity Verification in Cloud Storage
DOPIV: برون سپاری داده مبتنی بر هویت امن پس از کوانتومی با تأیید صحت عمومی در فضای ذخیره سازی ابری-2022 Public verification enables cloud users to employ a third party auditor (TPA) to check the data integrity. However, recent
breakthrough results on quantum computers indicate that applying quantum computers in clouds would be realized. A majority of existing
public verification schemes are based on conventional hardness assumptions, which are vulnerable to adversaries equipped with
quantum computers in the near future. Moreover, new security issues need to be solved when an original data owner is restricted or
cannot access the remote cloud server flexibly. In this paper, we propose an efficient identity-based data outsourcing with public integrity
verification scheme (DOPIV) in cloud storage. DOPIV is designed on lattice-based cryptography, which achieves post-quantum security.
DOPIV enables an original data owner to delegate a proxy to generate the signatures of data and outsource them to the cloud server.
Any TPA can perform data integrity verification efficiently on behalf of the original data owner, without retrieving the entire data set.
Additionally, DOPIV possesses the advantages of being identity-based systems, avoiding complex certificate management procedures.
We provide security proofs of DOPIV in the random oracle model, and conduct a comprehensive performance evaluation to show that
DOPIV is more practical in post-quantum secure cloud storage systems.
Index Terms: Cloud storage | public verification | lattice-based cryptography | identity-based data outsourcing | post-quantum security |
مقاله انگلیسی |
2 |
Approaches for preserving content integrity of sensitive online Arabic content: A survey and research challenges
رویکردهای حفظ تمامیت محتوا از محتوای حساس آنلاین عربی: بررسی و چالش های تحقیقاتی-2019 Trends in Internet usage and accessing online content in different languages and formats are proliferating at a considerable speed. There is a vast amount of digital online content available in different formats that are sensitive in nature with respect to writing styles and arrangement of diacritics. However, research done in the area aimed at identifying the necessary techniques suitable for preserving content integrity of sensitive digital online content is limited. So, it is a challenge to determine the techniques most suitable for dif- ferent formats such as image or binary. Hence, preserving and verifying sensitive content constitutes an emerging problem and calls for timely solutions. The digital Holy Qur’an in Arabic, constitutes, one case of such sensitive content. Due to the different characteristics of the Arabic letters like diacritics (punctuation symbols), kashidas (extended letters) and other symbols, it is very easy to alter the original meaning of the text by simply chang- ing the arrangement of diacritics. This article surveys the different approaches that are presently employed in the process of preserving and verifying the content integrity of sen- sitive online content. We present the state-of-the-art in content integrity verification and address the existing challenges in preserving the integrity of sensitive texts using the Dig- ital Qur’an as a case study. The proposed taxonomy provides an effective classification and analysis of existing related schemes and their limitations. The paper discusses the recom- mendations of the expected efficiency of such approaches when applied for use in digital content integrity. Some of the main findings suggest unified approaches of watermarking and string matching approaches can be used to preserve content integrity of any sensitive digital content. Keywords: Online sensitive content | Quran | Integrity | Watermarking | Cryptography | Steganography |
مقاله انگلیسی |
3 |
Blockchain data-based cloud data integrity protection mechanism
مکانیسم حفاظت از داده های ابر مبتنی بر داده بلاکچین -2019 Despite the rapid development of cloud computing for many years, data security and trusted computing
are still the main challenges in current cloud computing applications. In order to solve this problem,
many scholars have carried out a lot of research on this, and proposed many models including data
integrity test and secure multi-party calculation. However, most of these solutions face problems
such as excessive computational complexity or lack of scalability. This paper studies the use of
blockchain techniques to improve this situation. Blockchain is a decentralized new distributed computing
paradigm. Applying blockchain technology to cloud computing, using the security mechanism
of the former to improve the performance of the latter’s secure storage and secure computing is a
promising research topic. In this paper, the distributed virtual machine agent model is deployed in the
cloud by using mobile agent technology. The virtual machine agent enables multi-tenants to cooperate
with each other to ensure data trust verification. The tasks of reliable data storage, monitoring and
verification are completed by virtual machine agent mechanism. This is also a necessary condition
for building a blockchain integrity protection mechanism. The blockchain-based integrity protection
framework is built by the virtual machine proxy model, and the unique hash value corresponding to
the file generated by the Merkel hash tree is used to monitor the data change by means of the smart
contract on the blockchain, and the data is owned in time. The user issues a warning message for data
tampering; in addition, a ‘‘block-and-response’’ mode is used to construct a blockchain-based cloud
data integrity verification scheme. Keywords: Blockchain | Cloud data | Integrity verification | Merkel hash tree |
مقاله انگلیسی |
4 |
Pipeline-integrity: Scaling the use of authenticated data structures up to the cloud
پایپ لاین-یکپارچگی: مقیاس استفاده از ساختارهای داده معتبر تا ابر-2019 Public cloud storage services are widely adopted for their scalability and low cost. However, delegating
the management of the storage has serious implications from the security point of view. We focus
on integrity verification of query results based on the use of Authenticated Data Structures (ADS).
An ADS enables efficient updates of a cryptographic digest, when data changes, and efficient query
verification against this digest. Since, the digest can be updated (and usually signed) exclusively with
the intervention of a trusted party, the adoption of this approach is source of a serious performance
degradation, in particular when the trusted party is far from the server that stores the ADS.
In this paper, we show a protocol for a key–value storage service that provides ADS-enabled
integrity-protected queries and updates without impairing scalability, even in the presence of large
network latencies between trusted clients and an untrusted server. Our solution complies with the
principle of the cloud paradigm in which services should be able to arbitrarily scale with respect to
number of clients, requests rates, and data size keeping response time limited. We formally prove
that our approach is able to detect server misbehaviour in a setting whose consistency rules are only
slightly weaker than those guaranteed by previous results. We provide experimental evidence for the
feasibility and scalability of our approach. Keywords: Authenticated data structures | Scalability | Cloud | Integrity | Pipeline | Fork-linearisability |
مقاله انگلیسی |
5 |
External integrity verification for outsourced big data in cloud and IoT: A big picture
راستی آزمایی یکپارچگی خارجی برای داده های بزرگ برون سپاری شده در ابر و اینترنت اشیاء: یک تصویر بزرگ-2015 Article history:Received 29 March 2014 Received in revised form 4 July 2014Accepted 15 August 2014Available online 27 August 2014Keywords:Cloud computing Data security Big dataInternet of Things Integrity verification Public auditingAs cloud computing is being widely adopted for big data processing, data security is becoming one of the major concerns of data owners. Data integrity is an important factor in almost any data and computation related context. It is not only one of the qualities of service, but also an important part of data security and privacy. With the proliferation of cloud computing and the increasing needs in analytics for big data such as data generated by the Internet of Things, verification of data integrity becomes increasingly important, especially on outsourced data. Therefore, research topics on external data integrity verification have attracted tremendous research interest in recent years. Among all the metrics, efficiency and security are two of the most concerned measurements. In this paper, we will bring forth a big picture through providing an analysis on authenticator-based data integrity verification techniques on cloud and Internet of Things data. We will analyze multiple aspects of the research problem. First, we illustrate the research problem by summarizing research motivations and methodologies. Second, we summarize and compare current achievements of several of the representative approaches. Finally, we introduce our view for possible future developments.© 2014 Elsevier B.V. All rights reserved.
Keywords: Cloud computing | Data security | Big data | Internet of Things | Integrity verification | Public auditing |
مقاله انگلیسی |
6 |
External integrity verification for outsourced big data in cloud and IoT: A big picture
تایید یکپارچگی خارجی برای اطلاعات بزرگ برون سپاری شده در ابر و IOT: تصویر بزرگ-2015 As cloud computing is being widely adopted for big data processing, data security is becoming one of the
major concerns of data owners. Data integrity is an important factor in almost any data and computation
related context. It is not only one of the qualities of service, but also an important part of data security and
privacy. With the proliferation of cloud computing and the increasing needs in analytics for big data such
as data generated by the Internet of Things, verification of data integrity becomes increasingly important,
especially on outsourced data. Therefore, research topics on external data integrity verification have
attracted tremendous research interest in recent years. Among all the metrics, efficiency and security
are two of the most concerned measurements. In this paper, we will bring forth a big picture through
providing an analysis on authenticator-based data integrity verification techniques on cloud and Internet
of Things data. We will analyze multiple aspects of the research problem. First, we illustrate the research
problem by summarizing research motivations and methodologies. Second, we summarize and compare
current achievements of several of the representative approaches. Finally, we introduce our view for
possible future developments.
Keywords:
Cloud computing
Data security
Big data
Internet of Things
Integrity verification
Public auditing |
مقاله انگلیسی |
7 |
بررسی یکپارچگی خارجی برای داده های بزرگ برون سپاری شده در ابر و اینترنت اشیاء: یک تصویر بزرگ
سال انتشار: 2015 - تعداد صفحات فایل pdf انگلیسی: 10 - تعداد صفحات فایل doc فارسی: 42 همان طور که محساسبات ابری برای فرایند های داده های بزرگ در حال سازگاری هر چه بیشتر می باشد از این رو امنیت داده به یکی از چالش های اصلی صاحبان داده می باشد .یکپارچگی داده یکی فاکتور و شاخص مهم تقریبا در هر داده و محاسبات مربوط به این زمینه می باشد .این خود نه تنها یکی از خدمات کیفی مب شاد بلکه یک بخش مهم امنیت داده همچون داده های تولید شده توسط مسایل مرتبط با اینترنت می باشد بررسی و تایید یکپارچگی داده ها به طرز فزاینده ای مخصوصا در باره داده های برون منبعی امری مهم تلقی می شود.بنا براین موضعات تحقیقاتی بررسی یکپارچگی داده ها به طرز فوق العاده ای سوق و علاقه ی تحقیقاتی را در سالهای اخیر به سمت خود جذب کرده است .در بین همه این معیار ها ، کارآمدی و امنیت دو چالش اصلی در این بررسی می باشند. در این مقاله ما دیدی عظیم را از طریق مهیا سازی تجزیه و تحلیل درباره تکنیک های بررسی یکپارچگی داده های مبتنی بر احراز هویت در داده های ابر و مسایل مرتبط با اینترنت بیان خواهیم کرد.ما جنبه های مختلف مشکلات این حوزه تحقیقاتی را نیز مورد تجزیه و تحلیل قرار می دهیم.اول ما مشکلات تحقیقات را با جمع بندی و خلاصه سازی متودولوزی های تحقیقاتی و انگیزش تحقیقاتی به نمایش می گذاریم .دوم ما دست یافته های فعلی رویکرد های حاکی از این حوزه را جمع بندی کرده و مورد مقایسه قرار می دهیم.در نهایت نیز ما دید خود را برای توسعه های ممکن در پیش رو معرفی خواهیم کرد .
واژه های کلیدی : رایانش ابری | محاسبات ابری | امنیت داده | داده های بزرگ | اینترنت اشیا | بررسی یکپارچگی | حسابرسی عمومی |
مقاله ترجمه شده |