Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (17)
  • Open Access

    ARTICLE

    Code-Based Preservation Mechanism of Electronic Record in Electronic Record Center of Cloud Storage

    Yan Leng1,2, Yongjun Ren1,2,*, Chengshan Qian3, Jinyue Xia4

    Journal on Big Data, Vol.1, No.1, pp. 39-45, 2019, DOI:10.32604/jbd.2019.05870

    Abstract With the rapid development of E-commerce and E-government, there are so many electronic records have been produced. The increasing number of electronic records brings about storage difficulties, the traditional electronic records center is difficult to cope with the current fast growth requirements of electronic records storage and management. Therefore, it is imperative to use cloud storage technology to build electronic record centers. However, electronic records also have weaknesses in the cloud storage environment, and one of them is that once electronic record owners or managers lose physical control of them, the electronic records are more likely to be tampered with… More >

  • Open Access

    ARTICLE

    Ensuring Readability of Electronic Records Based on Virtualization Technology in Cloud Storage

    Qirun Wang1,2, Fujian Zhu3,4, Yan Leng3,4, Yongjun Ren3,4,*, Jinyue Xia5

    Journal on Internet of Things, Vol.1, No.1, pp. 33-39, 2019, DOI:10.32604/jiot.2019.05898

    Abstract With the rapid development of E-commerce and E-government, there are so many electronic records have been produced. The increasing number of electronic records brings about storage difficulties, the traditional electronic records center is difficult to cope with the current fast growth requirements of electronic records storage and management. Therefore, it is imperative to use cloud storage technology to build electronic record centers. However, electronic records also have weaknesses in the cloud storage environment, and one of them is that once electronic record owners or managers lose physical control of them, the electronic records are more likely to be tampered with… More >

  • Open Access

    ARTICLE

    Fuzzy Search for Multiple Chinese Keywords in Cloud Environment

    Zhongjin Fang1, 2, Jinwei Wang1, *, Baowei Wang1, Jianjun Zhang3, Yunqing Shi4

    CMC-Computers, Materials & Continua, Vol.60, No.1, pp. 351-363, 2019, DOI:10.32604/cmc.2019.07106

    Abstract With the continuous development of cloud computing and big data technology, the use of cloud storage is more and more extensive, and a large amount of data is outsourced for public cloud servers, and the security problems that follow are gradually emerging. It can not only protect the data privacy of users, but also realize efficient retrieval and use of data, which is an urgent problem for cloud storage. Based on the existing fuzzy search and encrypted data fuzzy search schemes, this paper uses the characteristics of fuzzy sounds and polysemy that are unique to Chinese, and realizes the synonym… More >

  • Open Access

    ARTICLE

    WiBPA: An Efficient Data Integrity Auditing Scheme Without Bilinear Pairings

    Chunhua Li1,*, Peng Wang1, Changhong Sun1, Ke Zhou1, Ping Huang2

    CMC-Computers, Materials & Continua, Vol.58, No.2, pp. 319-333, 2019, DOI:10.32604/cmc.2019.03856

    Abstract The security of cloud data has always been a concern. Cloud server provider may maliciously tamper or delete user’s data for their own benefit, so data integrity audit is of great significance to verify whether data is modified or not. Based on the general three-party audit architecture, a dynamic auditing scheme without bilinear pairings is proposed in this paper. It utilizes exponential operation instead of bilinear mapping to verify the validity of evidence. By establishing the mapping relation between logic index and tag index of data block with index transformation table, our scheme can easily support dynamic data operation. By… More >

  • Open Access

    ARTICLE

    Blockchain-Based Trusted Electronic Records Preservation in Cloud Storage

    Zhiliang Deng1,2, Yongjun Ren3,4, Yepeng Liu3,4, Xiang Yin5, Zixuan Shen3,4, Hye-Jin Kim6,*

    CMC-Computers, Materials & Continua, Vol.58, No.1, pp. 135-151, 2019, DOI:10.32604/cmc.2019.02967

    Abstract Cloud storage represents the trend of intensive, scale and specialization of information technology, which has changed the technical architecture and implementation method of electronic records management. Moreover, it will provide a convenient way to generate more advanced and efficient management of the electronic data records. However, in cloud storage environment, it is difficult to guarantee the trustworthiness of electronic records, which results in a series of severe challenges to electronic records management. Starting from the definition and specification of electronic records, this paper firstly analyzes the requirements of the trustworthiness in cloud storage during their long-term preservation according to the… More >

  • Open Access

    ARTICLE

    Dynamic Proofs of Retrievability Based on Partitioning-Based Square Root Oblivious RAM

    Jian Xu1,2,*, Zhihao Jiang1, Andi Wang1, Chen Wang1, Fucai Zhou1

    CMC-Computers, Materials & Continua, Vol.57, No.3, pp. 589-602, 2018, DOI:10.32604/cmc.2018.03820

    Abstract With the development of cloud storage, the problem of efficiently checking and proving data integrity needs more consideration. Therefore, much of growing interest has been pursed in the context of the integrity verification of cloud storage. Provable data possession (PDP) and Proofs of retrievablity (POR) are two kinds of important scheme which can guarantee the data integrity in the cloud storage environments. The main difference between them is that POR schemes store a redundant encoding of the client data on the server so as to she has the ability of retrievablity while PDP does not have. Unfortunately, most of POR… More >

  • Open Access

    ARTICLE

    Design of ECC based Secured Cloud Storage Mechanism for Transaction Rich Applications

    V. Gopinath1, R. S. Bhuvaneswaran2

    CMC-Computers, Materials & Continua, Vol.57, No.2, pp. 341-352, 2018, DOI:10.32604/cmc.2018.04006

    Abstract Cloud computing is the highly demanded technology nowadays. Due to the service oriented architecture, seamless accessibility and other advantages of this advent technology, many transaction rich applications are making use of it. At the same time, it is vulnerable to hacks and threats. Hence securing this environment is of at most important and many research works are being reported focusing on it. This paper proposes a safe storage mechanism using Elliptic curve cryptography (ECC) for the Transaction Rich Applications (TRA). With ECC based security scheme, the security level of the protected system will be increased and it is more suitable… More >

Displaying 11-20 on page 2 of 17. Per Page