The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
With the advent of cloud computing more and more IT and business organizations are migrating to cloud for its entrancing features of computing and storage infrastructure. At the same, security, privacy of cloud computing is not at satisfactory level. To make things worse, clouds inherent nature brought new set of security issues. Specially, the cloud storage causes dilemma between two important factors:...
Using a broadcast channel to transmit clients' data requests may impose privacy risks. In this paper, we tackle such privacy concerns in the index coding framework. We show how a curious client can infer some information about the requests and side information of other clients by learning the encoding matrix used by the server. We propose an information-theoretic metric to measure the level of privacy...
Decentralized coded caching is studied for a content server with N files, each of size F bits, serving K active users, each equipped with a cache of distinct capacity. It is assumed that the users' caches are filled in advance during the off-peak traffic period without the knowledge of the number of active users, their identities, or the particular demands. User demands are revealed during the peak...
Over recent years, many Private Information Retrieval (PIR) schemes have been designed aiming for computational efficiency and overall real-world practicality. In particular, some preprocessing techniques have been studied to reach those goals. Our main contribution is a new preprocessing technique that reduces overall computation and communication and allows the client and server to share some of...
Commercial web search engines adopt parallel and replicated architecture in order to support high query throughput. In this paper, we investigate the effect of caching on the throughput in such a setting. A simple scheme, called uniform caching, would replicate the cache content to all servers. Unfortunately, it does not exploit the variations among queries, thus wasting memory space on caching the...
With the developing of network and hardware, cloud computing is playing a more important role in business and daily usage. The need of searching cloud data is growing increasingly. And the need to proof the correctness of cloud searching has also grown. Previous work has proposed many useful theories on verifiable computing, such as probabilistically checkable proofs, authHashtable, but an efficient...
Ownership transfer in an RFID inventory system experiences many security and privacy oriented problems. We consider scenarios related to ownership transfer of RFID tags in a large inventory system. In this paper, we propose a new mutual authentication protocol from Ring LPN problem that leverages the reader authentication phase to incorporate Semi-Trusted Parties (STP) seamlessly in RFID ownership...
The Pliable Index Coding problem is a recently proposed new formulation of the Index Coding problem where each client wants any one message that it does not have and the server tries to “satisfy” all the clients using the side information sets of each of the clients by broadcasting coded messages. We present two generalizations of the problem. Firstly, we consider the problem of each client requiring...
In cloud computing environment, cloud clients may view media contents, such as document, music, and/or video, stored in the cloud server storage. To support access to the contents even in offline mode, a content cache scheme in client device is proposed in this paper. In the scheme, content in the cache has its own content properties, and the content is classified into some categories divided by the...
In order to build large-scale RFID applications, it is necessary to establish public RFID service infrastructure, the essential task is to build efficient and secure RFID code resolution network. Aiming at alleviating the problems in load balancing, single node failure tolerance and security of resolution network, based on related standards and research works, a hierarchical P2P based RFID code resolution...
We propose a programmable and scalable traffic management scheme. Programmable traffic management at high-speed routers is difficult because programmability and high-speed packet processing have involved a serious tradeoff. To attain both, the new scheme combines control programs at a control server and simple packet handling functions, such as sampling packet headers and discarding packets, at routers...
Identification of user session boundaries is one of the most important processes in the web usage mining for predictive prefetching of user next request based on their navigation behavior. This paper presents new techniques to identify user session boundaries by considering IPaddress, browsing agent, intersession and intrasession timeouts, immediate link analysis between referred pages and backward...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.