The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Recent work shows that offloading a mobile application from mobile devices to cloud servers can significantly reduce the energy consumption of mobile devices, thus extending the lifetime of mobile devices. However, previous work only considers the energy saving of mobile devices while ignoring the execution delay of mobile applications. To reduce the energy consumption of mobile devices, one may offload...
Nowadays, the Internet of Things (IoT) is receiving more attention in commercial and academic research, especially about its security property. However, current protocols cannot satisfy the requirement of various IoT applications and introduce some problems. There are three typical problems: traditional public key infrastructure (PKI) apply in IoT will incur great overhead, wireless sensor network...
Recently, Online social networks (OSNs) are growing at a phenomenal rate, and OSN service providers need to consider how to place users' data to multiple servers inside a data center. Key-value stores use consistent hashing to efficiently solve the problem of data placement, and turn into a defacto standard. However, random placement manner of hashing cannot preserve social locality, which leads to...
Distributed storage systems introduce redundancy to protect data from node failures. After a storage node fails, the lost data should be regenerated at a replacement storage node as soon as possible to maintain the same level of redundancy. Minimizing such a regeneration time is critical to the reliability of distributed storage systems. Existing work commits to reduce the regeneration time by either...
Cloud storage is an important development trend in information technology. To ensure the integrity of data storage in cloud storing, researchers have present some proof of storage (POS) schemes. In some cases, the ability to check data possession is delegated by data owners. Hence, the delegable provable data possession and proxy provable data possession are proposed. However the existing schemes...
Cloud storage is an important development trend in information technology. Data access control is an effective method to insure data security in cloud storage services. Attribute-based encryption is a promising technique for access control of encrypted data. However, existing data access control schemes for multi-authority cloud storage are not secure due to the possible single point failure of the...
Cloud storage is now an important development trend in information technology. To ensure the integrity of data storage in cloud storing, researchers have present some provable data possession (PDP) schemes. In some cases, the rank of trust for data owner is low. Verifiers are not willing to check data of the owners. Hence, in this paper, we propose the first double delegable PDP scheme, in which both...
The replication mechanism of NoSQL database MongoDB includes Master/Slave structure and Replica Set. Write operation implement on Master, Slaves will send the synchronize data command asynchronously to Master to update its data. Read operation just implement on Master to provide the strong consistency, while read operation implement on Slave to provide the eventual consistency. Replica set is a group...
MongoDB is one of the typical NoSQL database. The database mechanisms of MongoDB about document-oriented storage, GridFS for storing files of any size. The data storage structure of MongoDB is given, which uses BSON as the data storage and network transfer format for documents, simple and fast in query and easy in horizontal scalability with low cost.
In this paper we present a three-tier service architecture to seizure detection and prediction based on cloud computing technology. This architecture is used for outdoor monitoring. We also propose a two-way security mechanism to protect user privacy for epilepsy patients.
Cloud storage is now an important development trend in information technology. However, information security has become an important problem to impede it for commercial application, such as data confidentiality, integrity, and availability. In this paper, we revisit the two private PDP schemes. We show that the property of correctness cannot be achieved when active adversaries are involved in these...
The increasing popularity of cloud computing makes the data owner to outsource sensitive data in encrypted form onto the cloud. To tackle the problem of searching over encrypted cloud data, many keyword-based searchable encryption schemes have been proposed. However, there are few document-based search schemes in this field, which are also important in real applications. In this paper, we use the...
Cloud storage is now an important development trend in information technology. To ensure the integrity of data storage in cloud storing, researchers have present some provable data possession (PDP) schemes. However the schemes can't resist side-channel attacks. Moreover securing cryptographic implementations against side-channel attacks is one of the most important challenges in modern cryptography...
Cloud storage is now an important development trend in information technology. To ensure the integrity of data storage in cloud storing, researchers have present some provable data possession (PDP) schemes. In some cases, the ability to check data possession is delegated by data owners. Hence, the delegable provable data possession and proxy provable data possession are proposed. However the PDP schemes...
Cloud storage is now an important developmenttrend in information technology. However, informationsecurity has become an important problem to impede it forcommercial application, such as data confidentiality, integrity,and availability. In this paper, we revisit the two private PDPschemes. We show that the property of correctness cannot beachieved when active adversaries are involved in these auditingsystems...
Risk monitor is a plant specific real-time analysis tool used to determine the instantaneous risk based on the actual status of the systems and components. And the tool can also be used to optimize the maintenance plan. So how to keep real-time is one of the important problems to be solved. It may be lack of computing resources when there are many users or large-scale maintenance plans because the...
IPTV is an emerging Internet application, and is revolutionizing the entertainment and media industries. In this paper, we examine the current progress in research and development of IPTV systems. We provide an overview of two major IPTV system architectures, namely, the IP multicast architecture and the P2P architecture, and review various challenges, design issues, and interesting research problems...
Several network segments are involved in a large scale IPTV deployment, from the original video content server to the set-top-box (STB). Each network segment could be error-prone. QoS monitoring and troubleshooting are critical to guarantee satisfying user experience. In this paper, we discuss QoS monitoring and troubleshooting in AT&T U-Verse, one of the largest IPTV deployments in the world...
In a service overlay network, the services provided by different service providers might span multiple Internet domains. A service provider failure may cause significant performance deterioration. Thus, it is desirable to provide fault tolerant service composition solutions such that the service composition can be switched to the backup service composition solution in case of a service provider failure...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.