Dangerous substances are extremely chemically unstable during storage, and their hazardous properties, such as being flammable, combustible, and corrosive, have stringent storage environment requirements. To strengthe...
详细信息
In order to improve the security of power operation data, a risk management method for multi scenario data is proposed. Based on blockchain technology, a power operation datastorage model was constructed, and a data ...
详细信息
Three-dimensional chips require more complex test structures in different test phases, and the test datastorage and test power consumption will be greatly increased, so the test cost will be more expensive. To addres...
详细信息
With the evolution of data-driven autonomous driving technology, transferring driving responsibility from humans to machines is now feasible. Addressing the long-tail distribution problem in autonomous driving data is...
详细信息
The Supervisory Control and data Acquisition (SCADA) system of the energy storage system is the main target of cyber attacks, and its failure and its interaction with the physical system are the difficulties in the re...
详细信息
Currently, massive graph data, including social networks and biological proteins, is extensively utilized and contains a substantial amount of sensitive information. As cloud computing advances, graph data owners are ...
详细信息
ISBN:
(纸本)9798350368567;9798350368550
Currently, massive graph data, including social networks and biological proteins, is extensively utilized and contains a substantial amount of sensitive information. As cloud computing advances, graph data owners are increasingly inclined to outsource their large-scale graph data to cloud servers for diverse graph data query services. However, the seemingly limitless storage and computing capabilities present both opportunities and privacy challenges that are difficult to address. Recent research has proposed various schemes for querying outsourced graph data in an encrypted state. Unfortunately, many of these schemes fail to guarantee the correctness of query results under malicious models and may inadvertently disclose sensitive information within the graph data. Constrained shortest path (CSP) queries aim to find the shortest path between two vertices while adhering to specific threshold constraints. In this work, we propose a robust verifiable query scheme called VPCS that ensures privacy-preserving CSP queries on encrypted graphs. Our scheme achieves accurate and verifiable results while protecting the privacy of critical graph data information, with the exception of the number of vertices. Extensive experiments using real-world data sets validate the effectiveness of our scheme.
Cloud provides its users with different services. Every day during cloud computing, a great deal of data is generated. The data should be saved on the cloud servers properly. If this data is missing from the server, a...
详细信息
Cloud storage service enables users not only to save their local datastorage costs but also to access their outsourced data at any time and anywhere. Traditionally, a data owner outsources the encrypted data to the c...
详细信息
data security is an essential part of network security. datastorage, use, and transmission can easily lead to information leakage and other problems without adequate security protection. With the development of big d...
详细信息
With the continuous development of water transportation in China, ships entering and leaving the ports have become increasingly significantly. The Automatic Identification System (AIS) provides powerful data support f...
详细信息
暂无评论