دانلود و نمایش مقالات مرتبط با یکپارچگی اطلاعات::صفحه 1
دانلود بهترین مقالات isi همراه با ترجمه فارسی 2

با سلام خدمت کاربران در صورتی که با خطای سیستم پرداخت بانکی مواجه شدید از طریق کارت به کارت (6037997535328901 بانک ملی ناصر خنجری ) مقاله خود را دریافت کنید (تا مشکل رفع گردد). 

نتیجه جستجو - یکپارچگی اطلاعات

تعداد مقالات یافته شده: 3
ردیف عنوان نوع
1 Auditing Big Data Storage in Cloud Computing Using Divide and Conquer Tables
حسابرسی ذخیره سازی داده های بزرگ در محاسبات ابری با استفاده از تقسیم و تسخیر جداول-2018
Cloud computing has arisen as the mainstream platform of utility computing paradigm that offers reliable and robust infrastructure for storing data remotely, and provides on demand applications and services. Currently, establishments that produce huge volume of sensitive data, leverage data outsourcing to reduce the burden of local data storage and maintenance. The outsourced data, however, in the cloud are not always trustworthy because of the inadequacy of physical control over the data for data owners. To better streamline this issue, scientists have now focused on relieving the security threats by designing remote data checking (RDC) techniques. However, the majority of these techniques are inapplicable to big data storage due to incurring huge computation cost on the user and cloud sides. Such schemes in existence suffer from data dynamicity problem from two sides. First, they are only applicable for static archive data and are not subject to audit the dynamic outsourced data. Second, although, some of the existence methods are able to support dynamic data update, increasing the number of update operations impose high computation and communication cost on the auditor due to maintenance of data structure, i.e., merkle hash tree. This paper presents an efficient RDC method on the basis of algebraic properties of the outsourced files in cloud computing, which inflicts the least computation and communication cost. The main contribution of this paper is to present a new data structure, called Divide and Conquer Table (D&CT), which proficiently supports dynamic data for normal file sizes. Moreover, this data structure empowers our method to be applicable for large-scale data storage with minimum computation cost. The one-way analysis of variance shows that there are significant differences between the proposed method and the existing methods in terms of the computation and communication cost on the auditor and cloud.
Index Terms: Cloud computing, algebraic signature, remote data checking, dynamic data update, data integrity, big data storage
مقاله انگلیسی
2 SecSVA: Secure Storage, Verification, and Auditing of Big Data in the Cloud Environment
SecSVA: ذخیره سازی امن، تایید و حسابرسی داده های بزرگ در محیط ابر-2018
With the widespread popularity of Internet-enabled devices, there is an exponential increase in the information sharing among different geographically located smart devices. These smart devices may be heterogeneous in nature and may use different communication protocols for information sharing among themselves. Moreover, the data shared may also change with respect to various Vs (volume, velocity, variety, and value) to categorize it as big data. However, as these devices communicate with each other using an open channel, the Internet, there is a higher chance of information leakage during communication. Most of the existing solutions reported in the literature ignore these facts. Keeping focus on these points, in this article, we propose secure storage, verification, and auditing (SecSVA) of big data in cloud environment. SecSVA includes the following modules: an attribute-based secure data deduplication framework for data storage on the cloud, Kerberos-based identity verification and authentication, and Merkle hash-tree-based trusted third-party auditing on cloud. From the analysis, it is clear that SecSVA can provide secure third party auditing with integrity preservation across multiple domains in the cloud environment.
Keywords: Big Data, cloud computing, data integrity, security of data, storage management,trees (mathematics)
مقاله انگلیسی
3 Data Security and Privacy preservation in Cloud Storage Environments based on Cryptographic Mechanisms
امنیت داده ها و حفظ حریم خصوصی در محیط ذخیره سازی ابر مبتنی بر مکانیزم های رمزنگاری-2017
Recent technological advances have sparked the popularity and success o cloud. This new paradigm is gaining an expanding interest, since it provide cost efficient architectures that support the transmission, storage, and in tensive computing of data. However, these promising storage services bring many challenging design issues, considerably due to both loss of data contro and abstract nature of clouds. The objective of this survey is to provide a consistent view about both data security concerns and privacy issues tha are faced by clients in cloud storage environments. This survey brings a critical comparative analysis of cryptographic defense mechanisms, and be yond this, it explores research directions and technology trends to addres the protection of outsourced data in cloud infrastructures.
Key words: cloud data storage | security requirements, privacy | data confidentiality | data integrity | Proof of Data Possession | Proof of Retrievability |cryptographic cloud trends
مقاله انگلیسی
rss مقالات ترجمه شده rss مقالات انگلیسی rss کتاب های انگلیسی rss مقالات آموزشی
logo-samandehi
بازدید امروز: 6392 :::::::: بازدید دیروز: 0 :::::::: بازدید کل: 6392 :::::::: افراد آنلاین: 62