با سلام خدمت کاربران در صورتی که با خطای سیستم پرداخت بانکی مواجه شدید از طریق کارت به کارت (6037997535328901 بانک ملی ناصر خنجری ) مقاله خود را دریافت کنید (تا مشکل رفع گردد).
ردیف | عنوان | نوع |
---|---|---|
1 |
Auditing Big Data Storage in Cloud Computing Using Divide and Conquer Tables
حسابرسی ذخیره سازی داده های بزرگ در محاسبات ابری با استفاده از تقسیم و تسخیر جداول-2018 Cloud computing has arisen as the mainstream platform of utility computing paradigm that offers reliable and robust
infrastructure for storing data remotely, and provides on demand applications and services. Currently, establishments that produce
huge volume of sensitive data, leverage data outsourcing to reduce the burden of local data storage and maintenance. The outsourced
data, however, in the cloud are not always trustworthy because of the inadequacy of physical control over the data for data owners. To
better streamline this issue, scientists have now focused on relieving the security threats by designing remote data checking (RDC)
techniques. However, the majority of these techniques are inapplicable to big data storage due to incurring huge computation cost on
the user and cloud sides. Such schemes in existence suffer from data dynamicity problem from two sides. First, they are only
applicable for static archive data and are not subject to audit the dynamic outsourced data. Second, although, some of the existence
methods are able to support dynamic data update, increasing the number of update operations impose high computation and
communication cost on the auditor due to maintenance of data structure, i.e., merkle hash tree. This paper presents an efficient RDC
method on the basis of algebraic properties of the outsourced files in cloud computing, which inflicts the least computation and
communication cost. The main contribution of this paper is to present a new data structure, called Divide and Conquer Table (D&CT),
which proficiently supports dynamic data for normal file sizes. Moreover, this data structure empowers our method to be applicable for
large-scale data storage with minimum computation cost. The one-way analysis of variance shows that there are significant differences
between the proposed method and the existing methods in terms of the computation and communication cost on the auditor and cloud.
Index Terms: Cloud computing, algebraic signature, remote data checking, dynamic data update, data integrity, big data storage |
مقاله انگلیسی |
2 |
SecSVA: Secure Storage, Verification, and Auditing of Big Data in the Cloud Environment
SecSVA: ذخیره سازی امن، تایید و حسابرسی داده های بزرگ در محیط ابر-2018 With the widespread popularity of Internet-enabled devices, there is an exponential increase in the information sharing among different geographically located smart devices. These smart devices may be heterogeneous in nature and may use different communication protocols for information sharing among themselves. Moreover, the data shared may also change with respect to various Vs (volume, velocity, variety, and value) to categorize it as big data. However, as these devices communicate with each other using an open channel, the Internet, there is a higher chance of information leakage during communication. Most of the existing solutions reported in the literature ignore these facts. Keeping focus on these points, in this article, we propose secure storage, verification, and auditing (SecSVA) of big data in cloud environment. SecSVA includes the following modules: an attribute-based secure data deduplication framework for data storage on the cloud, Kerberos-based identity verification and authentication, and Merkle hash-tree-based trusted third-party auditing on cloud. From the analysis, it is clear that SecSVA can provide secure third party auditing with integrity preservation across multiple domains in the cloud environment.
Keywords: Big Data, cloud computing, data integrity, security of data, storage management,trees (mathematics) |
مقاله انگلیسی |
3 |
Data Security and Privacy preservation in Cloud Storage Environments based on Cryptographic Mechanisms
امنیت داده ها و حفظ حریم خصوصی در محیط ذخیره سازی ابر مبتنی بر مکانیزم های رمزنگاری-2017 Recent technological advances have sparked the popularity and success o
cloud. This new paradigm is gaining an expanding interest, since it provide
cost efficient architectures that support the transmission, storage, and in
tensive computing of data. However, these promising storage services bring
many challenging design issues, considerably due to both loss of data contro
and abstract nature of clouds. The objective of this survey is to provide a
consistent view about both data security concerns and privacy issues tha
are faced by clients in cloud storage environments. This survey brings a
critical comparative analysis of cryptographic defense mechanisms, and be
yond this, it explores research directions and technology trends to addres
the protection of outsourced data in cloud infrastructures.
Key words: cloud data storage | security requirements, privacy | data confidentiality | data integrity | Proof of Data Possession | Proof of Retrievability |cryptographic cloud trends |
مقاله انگلیسی |