The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Path ORAM (Oblivious RAM) is a recently proposed ORAM protocol for preventing information leakage from memory access sequences. It receives wide adoption due to its simplicity, practical efficiency and asymptotic efficiency. However, Path ORAM has extremely large memory bandwidth demand, leading to severe memory competition in server settings, e.g., a server may service one application that uses Path...
Energy consumption is an increasingly important issue for profit-driven cloud. Meanwhile, meeting users' expected response time is crucial for the real-time tasks. However, minimizing energy consumption may delay response time during task scheduling. Unfortunately, existing scheduling algorithms remain limit in balancing energy-saving and performance in elastic cloud environment. In view of this challenge,...
With the explosive growth of applications and application traffic, data centers networks are challenged in network utilization and network performance, which is crucial to guarantee the efficiency of computing and storage resources of data center servers. Recently, software defined network has been exploited to manage the network resource in a center controller, which provides opportunities to optimize...
We analysis outsourced server with multi-users and classify the data sharing into two main types. We focus on the data sharing between users in Searchable Encryption and the corresponding security goal. Then we present a general scheme for Searchable Encryption in which the cipher text can be generated from parameter by authorized users. With the concept of homomorphism and one-way function, we construct...
In recent years, mobile Online Social Networks (mOSNs) have gained more and more popularity. Compared with traditional social networks, mOSNs allow user's location to come into play. Thus, location sharing becomes a fundamental component of mOSNs, and many opportunities for location-based services arise which have a high value for the users. At the same time, the need to share location information...
Multi-Key Searchable Encryption (MKSE) is a new application scenario of searchable encryption, in which any user can search over all encrypted documents stored in untrusted server by submitting only one trapdoor. Firstly, we describe a general model of multi-key searchable encryption and introduce its system model and attack model. Secondly, we define its formulized model and the corresponding security...
Device-to-device (D2D) communication is one of the key technologies in Long Term Evolution — Advanced (LTE-A) for improving network capacity and resource utilization. D2D communication can not only effectively reduce traffic loads to the core network but also reduce power consumption of user equipments (UEs), thus making it a desirable candidate for machine-to-machine communication in cellular networks...
Public key timed-release searchable encryption (PKTRSE) can be used to solve the time-dependent cipher text retrieval problem. In one to one PKTRSE, the sender transmits the encrypted message to the server and wants it to be searched and decrypted by the unique appointed receiver after the release time. When such PKTRSE is applied to encrypt a message for multiple recipients with the same release...
Outsourced database has attracted much attention recently due to the emergence of cloud computing. However, a problem need to be further solved is how to encipher data and perform fuzzy query over the encrypted database while keeping the database structure. In this paper we propose a format-preserving fuzzy query mechanism based on format-preserving encryption (FPE), which protects the privacy of...
This paper introduces and explores a new concept of timed-release searchable encryption (TRSE) which can be used to solve the time-sensitive cipher text retrieval problem. In this paper, we preliminarily focus on the PKTRSE which is a kind of public key TRSE. In our PKTRSE model, the sender encrypts a message so that only the intended receiver can search target cipher text containing specified keywords...
This thesis designs a network teaching and leaning Platform based on .NET framework and web technology. The Platform realizes easy communication and interaction between teachers and students under the network teaching and learning environment. In this environment, teachers and students work in collaboration, which helps to promote students' self-learning abilities and collaborative leaning abilities...
We consider how to support a large number of users over a wide-area network whose interests are characterised by range top-k continuous queries. Given an object update, we need to notify users whose top-k results are affected. Simple solutions include using a content-driven network to notify all users whose interest ranges contain the update (ignoring top-k), or using a server to compute only the...
According to the IM system's functional requirements, completed the overall design of IM system server, which has good function of communication and plug-in management. Propose the user login server optimized design, build a complete user login process, and design custom protocol packet structure. As well as design and implement the optimization methods of login server by using software. Finally,...
A complex issue for SOA is the behavior of web services which may require services modeling and check approaches. In this paper, a semantic Web services modeling approach based on dynamic description logic is proposed. The logic describes dynamic aspects such as the states of the world and the changes of the state the services caused. The dynamic aspects are described in ABox. By using the description...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.