• No results found

time-based storage scheme

Improved Data Protection Mechanism for Cloud Storage with the usage of Two Components

Improved Data Protection Mechanism for Cloud Storage with the usage of Two Components

... the scheme is likewise very flexible, it may be truly prolonged to guide more advanced looking ...cloud storage which are not trusted by ...the storage area required turns into much less and more ...

6

Storage Preservation Using Big Data Based Intelligent Compression Scheme

Storage Preservation Using Big Data Based Intelligent Compression Scheme

... that storage has become interesting for full commercial ...and storage space of a single ...sacrifice storage efficiency. In this system, present a scheme that permits a more fine-grained ...

9

Survey on Regenerating Code Based Revocable and Searchable ABE Scheme for Mobile Cloud Storage

Survey on Regenerating Code Based Revocable and Searchable ABE Scheme for Mobile Cloud Storage

... First, identity privacy is the major downfall for the development of cloud computing. Without any security of identity privacy, users may be unwilling to join in cloud computing systems because their real identities ...

5

FUZZY LOGIC BASED VOLTAGE AND FREQUENCY OF A SELF EXCITED INDUCTION GENERATOR 
FOR MICRO HYDRO TURBINES FOR RURAL APPLICATIONS

FUZZY LOGIC BASED VOLTAGE AND FREQUENCY OF A SELF EXCITED INDUCTION GENERATOR FOR MICRO HYDRO TURBINES FOR RURAL APPLICATIONS

... [20] based binary tree Key ...The storage complexity is given by (logτn)+2 keys for a group ...of storage needed bythe individual user is given as (τL+1−1) / τ−1 ...Computation time is ...

10

A Time Controlled Data Destruction Model Adapted for Cloud Storage

A Time Controlled Data Destruction Model Adapted for Cloud Storage

... the time has been limited by the DHT network ...model based on mobile agent, which does not rely on third ...a scheme based on ciphertext sampling is ...

11

Optimal constructions for ID based one way function key
predistribution schemes realizing specified communication graphs

Optimal constructions for ID based one way function key predistribution schemes realizing specified communication graphs

... of time” by a trusted authority, we have a key predistribution scheme, or ...has storage equal to n − 1. The total storage in the trivial scheme is n(n − 1), since each of the n users ...

15

Auditing for Distributed Storage Systems

Auditing for Distributed Storage Systems

... Distributed storage codes have recently received a lot of attention in the ...cloud storage, none of which, however, is customized for coding-based storage or can efficiently support ...

36

Block time step storage scheme for astrophysical N-body simulations

Block time step storage scheme for astrophysical N-body simulations

... The main problem with the snapshot approach is that no information is stored about what happens between snapshots. Interpolating will not always yield useful information if the process of interest occurs on a much ...

12

Secure Data Management Scheme using One-Time Trapdoor on Cloud Storage Environment

Secure Data Management Scheme using One-Time Trapdoor on Cloud Storage Environment

... of storage outsourcing services has allowed many users to store and access data ...data storage outsourcing have attempted to ensure the security of these ...are based on e-mail environments, which ...

16

Secure Data Storage using Decentralized Access Control with Anonymous Authentication Using Cloud

Secure Data Storage using Decentralized Access Control with Anonymous Authentication Using Cloud

... control scheme for secure data storage in clouds that supports anonymous ...proposed scheme, the cloud verifies the authenticity of the series without knowing the user’s identity before storing ...

7

Authentication of Data Storage Using Decentralized Access Control in Clouds

Authentication of Data Storage Using Decentralized Access Control in Clouds

... safe storage, policy based file access control, policy based file assured deletion and policy based renewal of a file stored in a cloud environment, a suitable encryption technique with key ...

6

A Novel Role Based Cross Domain Access Control Scheme for Cloud Storage

A Novel Role Based Cross Domain Access Control Scheme for Cloud Storage

... cloud storage are Authentication, authorization and Access ...control scheme available for cloud ...privileges based on the user ...Role Based Access Control (RBAC). A Novel Role Based ...

5

PICav: Precise, Iterative and Complement-based Cloud Storage Availability Calculation Scheme

PICav: Precise, Iterative and Complement-based Cloud Storage Availability Calculation Scheme

... the storage array, to keep the number of storage nodes constant over ...additional storage service’s availability is lower than that of its ...the storage array. If another storage ...

8

A hybrid cache for a popularity-based cache management scheme for a RAID storage system

A hybrid cache for a popularity-based cache management scheme for a RAID storage system

... SSD write count, SDHM can archive more energy saving for RAID and longer life expectation of SSD cache under web-server based environment. Since in this thesis we only focus on cache hit rate and write size count, ...

56

A Key Policy Attribute based Temporary Keyword Search Scheme for Secure Cloud Storage

A Key Policy Attribute based Temporary Keyword Search Scheme for Secure Cloud Storage

... - based keyword search schemes, the authorized users can generate some search tokens and send them to the cloud for search ...any time and contain the corresponding ...a scheme in which the search ...

6

Tightly  Secure  Signatures   and  Public-Key  Encryption

Tightly Secure Signatures and Public-Key Encryption

... The difficulty in constructing tightly secure schemes. Let us say that a security reduction (in the multi-user setting) is tight if the corresponding reduction loss L is a (preferably small) constant. In particular, the ...

35

Improved Data Integrity Public Auditing for Regenerating Code Based Cloud Storage

Improved Data Integrity Public Auditing for Regenerating Code Based Cloud Storage

... distributed storage systems”:[6] In that case the distributed storage systems applies the overabundance coding techniques to store their ...surviving storage nodes encode data during ...minimum ...

6

SECURE DEDUPLICATION SCHEME FOR CLOUD STORAGE

SECURE DEDUPLICATION SCHEME FOR CLOUD STORAGE

... Ownership, based on the joint use of convergent encryption and the Merkle-based Tree, for improving data security in cloud storage systems, providing dynamic sharing between users and ensuring ...

5

An Accountability Scheme for Cloud Storage Leakage

An Accountability Scheme for Cloud Storage Leakage

... cloud storage server to shift responsibility ...accountability scheme, which is to store the information of cloud storage server on the data and then encrypt it multiple ...cloud storage ...

6

A  Trust Supervision In Unattended Wsn Using Unified Approaches

A Trust Supervision In Unattended Wsn Using Unified Approaches

... UWSNs based on Subjective Logic. Our advanced trust storage scheme, AS, facilitates distributed trust data storage to ensure high reliability of trust ...find storage nodes and to route ...

5

Show all 10000 documents...

Related subjects