The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Modern companies can't operate and conduct business without using a developed and stable functioning information system, which includes a network. To monitor network performance characteristics of network traffic are often defined, the values of them determine the performance of the network. Mostly these characteristics values vary slightly within predetermined time intervals. A significant change...
Vehicular network standard demands a short range reliable vehicle-to-vehicle (V2V) communication with high mobility, also increasing amount of downloaded data in short encounters. Satisfying demands of clients with minimum number of transmissions using index coding has proven notable significance in wireless ad-hoc networks. The proper encoding at the server with side information leads to simultaneous...
Recently, as the advances of ICT, many people use a cloud service. Furthermore, searchable encryption schemes begin to be used in the cloud from the security perspective. However, most of these have the risk of frequency analysis. We propose a new method that keep a search keyword secret against frequency analysis by using false positive which is one of the features of Bloom filter. This method makes...
In the era of big data processing, it is desirable to manage large volumes of data with high scalability, confidentiality protection, and flexible types of search queries. In this paper, we propose a design to store encrypted data on a cluster of distributed servers while supporting secure and authorized Boolean queries. In particular, the data owner encrypts the database with encrypted searchable...
P2P media streaming is the most renowned application on the web. In live media streaming nearest neighbor should discover as quick as possible. It is the most time constrained application to find nearest peer over the internet. Scalability, QoS and low latency are the objectives of media streaming. To achieve these objectives a system is needed which speedily and perfectly finds the nearby peer by...
Consumer data, such as documents and photos, are increasingly being stored in the cloud. To ensure confidentiality, the data is encrypted before being outsourced. However, this makes it difficult to search the encrypted data directly. Recent approaches to enable searching of this encrypted data have relied on trapdoors, locally stored indexes, and homomorphic encryption. However, data communication...
Cloud computing is a technology that facilitates numerous configurable resources in which the data is stored and managed in a decentralized manner. However, since the data is out of the owner's control, concerns have arisen regarding data confidentiality. Encryption techniques have previously been proposed to provide users with confidentiality in terms of outsource storage; however, many of these...
In today's world usage of location based services on mobile devices such as smartphones, tablet PCs and laptops has become progressively popular. Even though location based services are proved to be very useful and convenient, they may cause risk to the users' location privacy, because for the retrieval of useful information based on user's location, user has to send his/her present location and the...
The proliferation of cloud computing highlights the importance of techniques that allow both securing sensitive data and flexible data management at the same time. One line of research with this double motivation is the study of Searchable Symmetric Encryption (SSE) that has provided several outstanding results in the recent years. These solutions allow sublinear keyword search in huge databases by...
With the advent of cloud computing more and more IT and business organizations are migrating to cloud for its entrancing features of computing and storage infrastructure. At the same, security, privacy of cloud computing is not at satisfactory level. To make things worse, clouds inherent nature brought new set of security issues. Specially, the cloud storage causes dilemma between two important factors:...
Through the continuous collection and in-depth analysis of the quality monitoring data of colleges and universities, we combine the efficiency processing of big data and data evaluation, monitor the status of higher education normally, and construct a higher education quality monitoring and evaluation platform based on Spark. This platform is teaching centered with schools as its basis, including...
Communication networks can be the targets of organized and distributed attacks such as flooding-type DDOS attack in which malicious users aim to cripple a network server or a network domain. For the attack to have a major effect on the network, malicious users must act in a coordinated and time correlated manner. For instance, the members of the flooding attack increase their message transmission...
As a fundamental cloud service for modern Web applications, the cloud object storage system stores and retrieves millions or even billions of read-heavy data objects. Serving for a massive amount of requests each day makes the response latency be a vital component of user experiences. Due to the lack of suitable understanding on the response latency distribution, current practice is to use overprovision...
One of the major limitations of index based encrypted string search on big dataset is the inherent problem of big index generation, maintenance and update which stops it from being dynamic in a sense that one could not modify data or add or remove keywords. Also for a resource constraint client, to generate an index linear in the size of big dataset is difficult. In this paper, we provide an efficient...
Decentralized coded caching is applicable in scenarios where the server does not have enough knowledge about the entire cache network to perform centralized coordination during prefetching, such as when the server is uninformed of the number of active users and their identities in a wireless or mobile environment. Most of known decentralized strategies use random uncoded prefetching followed by coded...
This paper proposes a secure retrieval scheme based on homomorphic encryption for the server-side structured database. With the advantage of this scheme, ciphertext in server under unreliable storage circumstance can be efficiently retrieved without exposition of plaintext. Users can also have detailed access to their data. In this paper, a data encryption and decryption algorithm based on homomorphic...
The performance of modern data-intensive applications is closely related to the speed of data access. However, a physical database optimization by design is often infeasible, due to the presence of large databases and time-varying workloads. In this paper we introduce a novel methodology for physical database optimization which allows for a quick and dynamic selection of indexes through the analysis...
In public key encryption with keyword search (PEKS) framework, see Figure 1(a), the cloud server stores index Iw and verifies the equivalence whether w = w′ or not on receiving a keyword search request through a trapdoor Tw′. Aside from the traditional secrecy concerns over index, a new threat called inner keyword guessing attack which addressed the secrecy of trapdoors against off-line brute force...
While cloud services are becoming more and more widely used, their security issues are noticed by researchers. Multimedia data, especially images, which usually contain a lot of private information, sometimes are carelessly handled by users and the cloud servers as well. There for, it is necessary to protect those outsourced image data. Although data encryption is useful for storage purposes, data...
Location-based social networks (LBSNs) are attracting significant attentions, which make location-aware applications prosperous. We proposed the Multiple User-defined Spatial Query (MUSQ) in [1]. However, it is impractical that non-expert users provide exact vectors to denote their preferences in MUSQ. In this paper, we design a group users weight matrix generation algorithm to represent users' preferences...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.