In the modern world, data exchange security is a major concern. Users upload files to the data sharing system that have been encrypted using a private key. Because it makes it more difficult for the data owner to keep...
详细信息
In the modern world, data exchange security is a major concern. Users upload files to the data sharing system that have been encrypted using a private key. Because it makes it more difficult for the data owner to keep the information secure in the event that a user spills critical information, this feature is especially important for any system that distributes large volumes of data. This paper gives a practical and efficient implementation of the approach, exemplifies its security, and offers an implementation to highlight its use. For data owners, distributing data on servers or the cloud poses a number of challenges. There are several approaches of dealing with these problems. The shared key of the data owner must be managed using these techniques. The goal of this work is to showcase the reliable authority. The purpose of this work is to demonstrate the reliable source for user authentication when accessing cloud data. The SHA algorithm is used by the trusted authority to generate the key, which is accessible to both the owner and the user. The data owner transmits an encrypted file to the trusted authority module via the AES technology. The trusted authority module then computes the hash value using the MD-5 algorithm. In order to perform dynamic operations and identify the system cheater (owner or CSP), it maintains a key in its database. A file for cloud storage is provided to the CSP module via a reliable source. A file for cloud storage is provided to the CSP module via a reliable source. Evidence is presented that the generated key sets. It is shown that the created key sets have various beneficial properties that prevent other network nodes from attempting to collude and compromise the confidentiality of communication sessions.
The emergence of mobile terminals capable of utilizing multiple communication media presents an opportunity to enhance segmented file download methods by aggregating their bandwidth. Previous research has shown the po...
详细信息
The development of intelligent logistics increasingly leads the evolution of future supply chain technology. As an innovative technology in the field of logistics, Unmanned Aerial Vehicles (UAVs) provide efficient, fa...
详细信息
ISBN:
(纸本)9798350304367;9798350304374
The development of intelligent logistics increasingly leads the evolution of future supply chain technology. As an innovative technology in the field of logistics, Unmanned Aerial Vehicles (UAVs) provide efficient, fast and flexible solutions for transportation and delivery. However, the application of UAVs needs to ensure effective identity authentication and the security of the delivery process. Because biometric data (such as fingerprints, facial recognition, iris scans) is highly sensitive personal information. Once stolen or abused, it may lead to serious personal privacy disclosure problems. In this paper, we use differential privacy and diffusion models to implement secure face recognition and identity authentication in edge computing environments for address the privacy issues in UAV delivery. The UAVs collect the user's biometric data through edge computing nodes during delivery, and uses a diffusion model for secure transmission to protect user privacy. The edge computing node at the receiving end performs face recognition and authentication to ensure that only legitimate users can accept the delivery. Our study not only improves the accuracy of user identity authentication, but also protects the privacy of users.
In era of modern world and technology where everything is digitalized. Cloud computing emerged as one of the fastest growing parts of digital industry. With the Succor of cloud computing models, business accomplishes ...
详细信息
Domestic travel has been revitalized following the shift of new coronavirus infection to category 5 infection. This has led to an increase in international visitors, but they are concentrated in major inbound cities s...
详细信息
aid vector machines (SVMs) have become increasingly famous as computerized clinical photograph diagnosis gear due to their high performance in numerous duties, including binary classification and object segmentation. ...
详细信息
Due to the continuous improvement of traffic analysis technology, traditional covert channels have become insecure and vulnerable to human sabotage. Blockchain technology has the characteristics of immutability and an...
详细信息
ISBN:
(纸本)9798350381993;9798350382006
Due to the continuous improvement of traffic analysis technology, traditional covert channels have become insecure and vulnerable to human sabotage. Blockchain technology has the characteristics of immutability and anonymity, making covert communication more unmonitored and robust. However, it also brings about low communication efficiency. In this article, we adopt the idea of transaction rounds and propose for the first time the construction of HMAC values order (HVO) scheme. Furthermore, we further propose a HMAC values and transaction matrices (HV-TM) scheme to improve communication efficiency. This article is the first to use the gas field to embed data to improve the embedding rate. Use the random numbers generated by the Mersenne Twister algorithm to disrupt the order of addresses to improve the concealment of reused addresses. Experiments have shown that the two schemes have higher communication efficiency and better embedding rate than existing schemes.
Using mobile edge computing (MEC) servers to cache and update video resources can not only save network bandwidth and computing resources, but also adjust the bit rate of video playback according to real-time network ...
详细信息
Geographic information systems(GIS) are now changing from two-dimensional expression to three-dimensional expression, and the geographic data gradually transforms into a more intuitive and more applied method of expre...
详细信息
Inheritance is all inheritance left by an heir in the form of rights, obligations, or assets left by someone after death. This includes everything that can be passed on to heirs, including assets, securities, and othe...
详细信息
暂无评论