Nowadays, large scale data-centers have been built around the world, and cloud computing is becoming more and more popular. With the help of cloud computing, users can access their data and obtain different services a...
详细信息
ISBN:
(纸本)9781479944002
Nowadays, large scale data-centers have been built around the world, and cloud computing is becoming more and more popular. With the help of cloud computing, users can access their data and obtain different services anywhere and anytime. However, many people and companies still hesitate to use cloud based services because of the information security problem. If the problem cannot be solved properly, the "clouds" may become a threat to the whole world. Although cryptography is an important technology for solving the problem, it also reveals the existence of secret information and may attract pin-point attacks. In this study, we propose a new type of steganography, in which secret is embedded as hidden information into a virtual but natural image synthesized through image morphing. The basic idea is to make the existence and the meaning of the information unaware, and to make it extremely difficult for unauthorized persons and groups to read or even to find the information. Initial analyses show that the proposed technology is secure, and can be a very promising technique for protecting secret information in cloud computing environments.
For digital forensics in the era of cloud computing, it is crucial that forensic artifacts are seized from a cloud infrastructure and analyzed in a timely manner. Unfortunately, when the forensic artifacts (e.g., the ...
详细信息
ISBN:
(纸本)9781538653982
For digital forensics in the era of cloud computing, it is crucial that forensic artifacts are seized from a cloud infrastructure and analyzed in a timely manner. Unfortunately, when the forensic artifacts (e.g., the filesystem of the suspect's machine) are collected and transmitted from the cloud to the forensic investigator, in the form of a data stream, the metadata that describes the structure or hierarchy of the forensic artifacts might be lost. Even though researchers demonstrated the measures for detecting malicious tampering in the streaming data, an efficient approach is still desired to pinpoint the tampered location in a data hierarchy. In this paper, we present an efficient tamper detection scheme which is capable of pinpointing the location of the tampered data in the data hierarchy quickly, without the aid of metadata. Our scheme can be easily integrated into the existing streaming forensic data transmission schemes. The evaluation demonstrates both the effectiveness and the performance of the proposed scheme.
information on how to present visual content in an ergonomic way is crucial in various fields. The current study examines how the gender, race of a person, and picture-slogan relative location influence subjects' ...
详细信息
ISBN:
(纸本)9783030202279;9783030202262
information on how to present visual content in an ergonomic way is crucial in various fields. The current study examines how the gender, race of a person, and picture-slogan relative location influence subjects' perceived effectiveness about a social advertisement. Relative scores of 45 participants from WroclawUniversity of Science and technology were measured by binary pairwise comparisons and formally analyzed by the loglinear model for frequency data. While making comparisons, subjects' visual activity was recorded by an eyetracking system. Mean fixation durations were comprehensively analyzed in the context of examined factors by a standard, five-way analysis of variance: Picture race (black, yellow, white) x Picture gender (man, woman) x Picture location (left, right) x Stimulus location (left, right) x Subject gender (male, female). Subjective results regarding perceived effectiveness of the advertisement variants were compared with objective fixation durations.
information security is the key to the development of modern Internet technology. The distributed mechanism, decentralized mechanism, password mechanism and scripted mechanism of the Blockchain present a completely ne...
详细信息
ISBN:
(纸本)9781538643013
information security is the key to the development of modern Internet technology. The distributed mechanism, decentralized mechanism, password mechanism and scripted mechanism of the Blockchain present a completely new perspective for the development of Internet information security technology. The Blockchain technology redefines the storage and dissemination methods of the information in the network. Neither participant needs to know each other, and nor does it require third-party certification bodies to participate. It records, transmits and stores transferring activities of the information value by distributed technology, ensures that data is not tampered and forged based on an asymmetric cryptographic algorithm, enables all participants reached a consensus on the status of blockchain data information. And from the current industry research on blockchain technology, it expounds the application of blockchain technology in identity authentication, data protection and network security. The Blockchain technology will be a great driving force in the process of information security technology change, and will have a far-reaching impact on the expansion of information security.
With the development of The Times, the Internet has become an essential part of people's *** order to meet the needs of the market, it is necessary to continuously optimize and innovate in technology and display v...
详细信息
ISBN:
(纸本)9781665454551
With the development of The Times, the Internet has become an essential part of people's *** order to meet the needs of the market, it is necessary to continuously optimize and innovate in technology and display various advantages in the era of big *** methods such as distributed computing or parallel computing are limited by various conditions and cannot meet specific computing ***, in order to solve this problem, people gradually begin to adopt the computer processing technology of big data based on the background of cloud environment, so as to break these limitations and carry out data calculation more quickly and *** the background of the era of big data, the choice of vigorously promoting the use of advanced computer information processing technology can continue to ensure the security of different types of data storage and application, so that the application value of data information can be presented in an all-round way.
Computation offloading is a critical technology for emerging edge computing and Internet of things (IoT). It is views as a solution of the limited resources of IoT devices by offloading tasks to other devices or serve...
详细信息
ISBN:
(纸本)9781728165448
Computation offloading is a critical technology for emerging edge computing and Internet of things (IoT). It is views as a solution of the limited resources of IoT devices by offloading tasks to other devices or servers. It can brings many benefits, such as prolonging battery life, reducing the latency and improving application performance. In practice, the effect of computation offloading is affected by many factors, which makes many offloading unable to achieve their expected objectives. In this paper, we present a comprehensive survey of computation offloading in edge computing including offloading scenarios, influence factors and offloading strategies. Particularly, we discuss key issues through the offloading process, such as whether, where, what to offload.
The financial industry is becoming more and more dependent on advanced computer technologies in order to maintain competitiveness in a global economy. Fuzzy logic represents an exciting technology with a wide scope fo...
详细信息
ISBN:
(纸本)9781424477159
The financial industry is becoming more and more dependent on advanced computer technologies in order to maintain competitiveness in a global economy. Fuzzy logic represents an exciting technology with a wide scope for potential applications. There is a growing interest both in the field of fuzzy logic computing and in the financial world in explaining the use of fuzzy logic to forecast the future changes in prices of stocks, exchange rates, commodities, and other financial time series. Fuzzy algorithms are intensively used for the identification of dynamic models, combining both numerical and heuristic knowledge. Fuzzy logic provides a remarkably simple way to draw definite conclusions from vague, ambiguous or imprecise information. In this paper, we are investigating the ability of Fuzzy logic (FL) to tackle the financial time series forecasting problems. Experimental results on set of applications indicated that fuzzy logic can effectively solve these types of problems. In order to examine the effectiveness of fuzzy logic applied to forecasting, the comparison with Artificial Neural Networks (ANNs) is performed.
The Internet of Things (IoT) opens opportunities for wearable devices, home appliances, and software to share and communicate information on the Internet. Given that the shared data contains a large amount of private ...
详细信息
ISBN:
(纸本)9781479968336
The Internet of Things (IoT) opens opportunities for wearable devices, home appliances, and software to share and communicate information on the Internet. Given that the shared data contains a large amount of private information, preserving information security on the shared data is an important issue that cannot be neglected. In this paper, we begin with general information security background of IoT and continue on with information security related challenges that IoT will encountered. Finally, we will also point out research directions that could be the future work for the solutions to the security challenges that IoT encounters.
Cloud computing is now leading-edge Internet technology and virtualization technology is one of the important part of cloud computing system. Virtualization, in computing, refers to the act of creating a virtual (rath...
详细信息
ISBN:
(纸本)9781479972081
Cloud computing is now leading-edge Internet technology and virtualization technology is one of the important part of cloud computing system. Virtualization, in computing, refers to the act of creating a virtual (rather than actual) version of something, including but not limited to a virtual computer hardware platform, operating system (OS), storage device, or computer network resources. Docker is a new type of virtualization technology. In this paper, through an application instance, we will describe docker's applications and advantages in the cloud computing.
With the increase of the number of frequency terminals, the electromagnetic spectrum resource becomes particularly important. The traditional electromagnetic spectrum monitoring system is faced with the problems of in...
详细信息
暂无评论