As the computing power of computers is developed faster and faster nowadays, the traditional cryptosystems are challenged. In this paper, the traditional sticker model is modified to design a new cryptosystem. As a no...
详细信息
In Large Scale database system storage system, Raid 6 is to be used to tolerate failure disks and provide high reliability with the support of different codes. In large system there is no any risk of data loss or disk...
详细信息
In Large Scale database system storage system, Raid 6 is to be used to tolerate failure disks and provide high reliability with the support of different codes. In large system there is no any risk of data loss or disk failure but in case of disaster or suddenly something happened with the risk of data failure Raid can be tolerate more than three disk failure. In this paper we optimize the partial stripe write with the erasure correcting code. Moreover, some erasure correcting can be evaluate or optimize on different codes in Raid, here we focus on partial stripe write where data can be written on disk either fully or partially.
Both mobile and cloud computing are two areas which are rapidly expanding in terms of use case and *** mobile and cloud computing are two areas which are rapidly expanding in terms of use case and functionality. This ...
详细信息
Both mobile and cloud computing are two areas which are rapidly expanding in terms of use case and *** mobile and cloud computing are two areas which are rapidly expanding in terms of use case and functionality. This paper reviews current work in energy consumption of mobile cloud computing and then proposes a system whereby user applications may be profiled for their resource consumption locally and then if augmentation is required, they may negotiate with an external cloud for optimum energy consumption. Such a system is particularly useful for cloudlets which contain constrained resources so may need to choose between a number of clients. Whilst mobile computing enables a variety of feature rich functionality for users in a non-fixed location, cloud computing is revolutionising the way in which computing resources are being provisioned, used and optimised for both service providers and end users. These two fields are being combined in order to provide greater functionality for mobile devices in a number of different ways. Augmentation of mobile resources from the cloud has been shown as one way in which the energy consumption and power of mobile devices may be considerably enhanced. However, due to the resource constrained nature of the devices, in particular their power source and communication interfaces, there is often a fine line where offloading of these resources is economical.
Cloud computing has greatly facilitated large-scale data outsourcing due to its cost efficiency, scalability and many other advantages. Subsequent privacy risks force data owners to encrypt sensitive data, hence makin...
详细信息
ISBN:
(纸本)9781467379533
Cloud computing has greatly facilitated large-scale data outsourcing due to its cost efficiency, scalability and many other advantages. Subsequent privacy risks force data owners to encrypt sensitive data, hence making the outsourced data no longer searchable. Searchable Symmetric Encryption (SSE) is an advanced cryptographic primitive addressing the above issue, which maintains efficient keyword search over encrypted data without disclosing much information to the storage provider. Existing SSE schemes implicitly assume that original user data is centralized, so that a searchable index can be built at once. Nevertheless, especially in cloud computing applications, user-side data centralization is not reasonable, e.g. an enterprise distributes its data in several data centers. In this paper, we propose the notion of Multi-Data-Source SSE (MDS-SSE), which allows each data source to build a local index individually and enables the storage provider to merge all local indexes into a global index afterwards. We propose a novel MDS-SSE scheme, in which an adversary only learns the number of data sources, the number of entire data files, the access pattern and the search pattern, but not any other distribution information such as how data files or search results are distributed over data sources. We offer rigorous security proof of our scheme, and report experimental results to demonstrate the efficiency of our scheme.
Software is a critical issue nowadays. The selection and design suitable technique/process/method for maintenance phase for the same, we required suitable reengineering tool and technique, extractor one of the most im...
详细信息
In the paper, a novel ontology-based recommendation model based on a fuzzy-rough hybrid mechanism is proposed. This model integrates the principles of both content-based and collaborative filtering recommender systems...
详细信息
In the paper, a novel ontology-based recommendation model based on a fuzzy-rough hybrid mechanism is proposed. This model integrates the principles of both content-based and collaborative filtering recommender systems. The proposed model unified user profile/item characteristics profile representations in a concept level space. Hence not only the user preferences and the correlation between items, but also the information of other users with similar preferences can be used for more precise recommendation.
Context-aware computing has proven to be successful in collecting and understanding various sensor data. However, providing an intelligent service by exploiting the collected context data from heterogeneous sensors is...
详细信息
With the development of Internet of things technology and cloud technology, the Internet of things technology has been used in all walks of life, the informatization construction of higher vocational colleges is devel...
详细信息
ISBN:
(纸本)9781467395885
With the development of Internet of things technology and cloud technology, the Internet of things technology has been used in all walks of life, the informatization construction of higher vocational colleges is developing from digital campus to wisdom campus. The article introduces the concept and characteristics of Internet of things, as well as the basic construction of wisdom campus. Combined with the present situation of the construction of campus network in vocational colleges, this paper discusses the application of the Internet of things technology in wisdom campus construction of vocational colleges, and gives the construction and planning of the wisdom campus system.
The modern day approach in boulevard network centers on efficient factor in safe routing. The safe routing must follow up the low risk cities. The troubles in routing are a perennial one confronting people day in and ...
详细信息
The modern day approach in boulevard network centers on efficient factor in safe routing. The safe routing must follow up the low risk cities. The troubles in routing are a perennial one confronting people day in and day out. The common goal of everyone using a boulevard seems to be reaching the desired point through the fastest manner which involves the balancing conundrum of multiple expected and unexpected influencing factors such as time, distance, security and cost. It is universal knowledge that travelling is an almost inherent aspect in everyone's daily routine. With the gigantic and complex road network of a modern city or country, finding a low risk community for traversing the distance is not easy to achieve. This paper follows the code based community for detecting the boulevard network and fuzzy technique for identifying low risk community.
Minimization of energy consumption has always been the predominant factor deciding the acceptability of a routing protocol for wireless ad-hoc networks. In this study we have proposed a novel efficient multicast routi...
详细信息
暂无评论