Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (452)
  • Open Access

    ARTICLE

    An Advanced Quantum-Resistant Signature Scheme for Cloud Based on Eisenstein Ring

    Faguo Wu1,2, Xiao Zhang1,2, Wang Yao1,2, Zhiming Zheng1,2, Lipeng Xiang3, Wanpeng Li4

    CMC-Computers, Materials & Continua, Vol.56, No.1, pp. 19-34, 2018, DOI:10.3970/cmc.2018.02664

    Abstract Signature, widely used in cloud environment, describes the work as readily identifying its creator. The existing signature schemes in the literature mostly rely on the Hardness assumption which can be easily solved by quantum algorithm. In this paper, we proposed an advanced quantum-resistant signature scheme for Cloud based on Eisenstein Ring (ETRUS) which ensures our signature scheme proceed in a lattice with higher density. We proved that ETRUS highly improve the performance of traditional lattice signature schemes. Moreover, the Norm of polynomials decreases significantly in ETRUS which can effectively reduce the amount of polynomials convolution More >

  • Open Access

    ARTICLE

    Natural Language Semantic Construction Based on Cloud Database

    Suzhen Wang1, Lu Zhang1, Yanpiao Zhang1, Jieli Sun1, Chaoyi Pang2, Gang Tian3, Ning Cao4,*

    CMC-Computers, Materials & Continua, Vol.57, No.3, pp. 603-619, 2018, DOI:10.32604/cmc.2018.03884

    Abstract Natural language semantic construction improves natural language comprehension ability and analytical skills of the machine. It is the basis for realizing the information exchange in the intelligent cloud-computing environment. This paper proposes a natural language semantic construction method based on cloud database, mainly including two parts: natural language cloud database construction and natural language semantic construction. Natural Language cloud database is established on the CloudStack cloud-computing environment, which is composed by corpus, thesaurus, word vector library and ontology knowledge base. In this section, we concentrate on the pretreatment of corpus and the presentation of background… More >

  • Open Access

    ARTICLE

    Dynamic Proofs of Retrievability Based on Partitioning-Based Square Root Oblivious RAM

    Jian Xu1,2,*, Zhihao Jiang1, Andi Wang1, Chen Wang1, Fucai Zhou1

    CMC-Computers, Materials & Continua, Vol.57, No.3, pp. 589-602, 2018, DOI:10.32604/cmc.2018.03820

    Abstract With the development of cloud storage, the problem of efficiently checking and proving data integrity needs more consideration. Therefore, much of growing interest has been pursed in the context of the integrity verification of cloud storage. Provable data possession (PDP) and Proofs of retrievablity (POR) are two kinds of important scheme which can guarantee the data integrity in the cloud storage environments. The main difference between them is that POR schemes store a redundant encoding of the client data on the server so as to she has the ability of retrievablity while PDP does not… More >

  • Open Access

    ARTICLE

    A Method of Identifying Thunderstorm Clouds in Satellite Cloud Image Based on Clustering

    Lili He1,2, Dantong Ouyang1,2, Meng Wang1,2, Hongtao Bai1,2, Qianlong Yang1,2, Yaqing Liu3,4, Yu Jiang1,2,*

    CMC-Computers, Materials & Continua, Vol.57, No.3, pp. 549-570, 2018, DOI:10.32604/cmc.2018.03840

    Abstract In this paper, the clustering analysis is applied to the satellite image segmentation, and a cloud-based thunderstorm cloud recognition method is proposed in combination with the strong cloud computing power. The method firstly adopts the fuzzy C-means clustering (FCM) to obtain the satellite cloud image segmentation. Secondly, in the cloud image, we dispose the ‘high-density connected’ pixels in the same cloud clusters and the ‘low-density connected’ pixels in different cloud clusters. Therefore, we apply the DBSCAN algorithm to the cloud image obtained in the first step to realize cloud cluster knowledge. Finally, using the method More >

  • Open Access

    ARTICLE

    Design of ECC based Secured Cloud Storage Mechanism for Transaction Rich Applications

    V. Gopinath1, R. S. Bhuvaneswaran2

    CMC-Computers, Materials & Continua, Vol.57, No.2, pp. 341-352, 2018, DOI:10.32604/cmc.2018.04006

    Abstract Cloud computing is the highly demanded technology nowadays. Due to the service oriented architecture, seamless accessibility and other advantages of this advent technology, many transaction rich applications are making use of it. At the same time, it is vulnerable to hacks and threats. Hence securing this environment is of at most important and many research works are being reported focusing on it. This paper proposes a safe storage mechanism using Elliptic curve cryptography (ECC) for the Transaction Rich Applications (TRA). With ECC based security scheme, the security level of the protected system will be increased More >

  • Open Access

    ARTICLE

    Multi-VMs Intrusion Detection for Cloud Security Using Dempster-shafer Theory

    Chak Fong Cheang1,*, Yiqin Wang1, Zhiping Cai2, Gen Xu1

    CMC-Computers, Materials & Continua, Vol.57, No.2, pp. 297-306, 2018, DOI:10.32604/cmc.2018.03808

    Abstract Cloud computing provides easy and on-demand access to computing resources in a configurable pool. The flexibility of the cloud environment attracts more and more network services to be deployed on the cloud using groups of virtual machines (VMs), instead of being restricted on a single physical server. When more and more network services are deployed on the cloud, the detection of the intrusion likes Distributed Denial-of-Service (DDoS) attack becomes much more challenging than that on the traditional servers because even a single network service now is possibly provided by groups of VMs across the cloud… More >

  • Open Access

    ARTICLE

    Research on Trust Model in Container-Based Cloud Service

    Xiaolan Xie1,2, Tianwei Yuan1,*, Xiao Zhou3, Xiaochun Cheng4

    CMC-Computers, Materials & Continua, Vol.56, No.2, pp. 273-283, 2018, DOI:10.3970/cmc.2018.03587

    Abstract Container virtual technology aims to provide program independence and resource sharing. The container enables flexible cloud service. Compared with traditional virtualization, traditional virtual machines have difficulty in resource and expense requirements. The container technology has the advantages of smaller size, faster migration, lower resource overhead, and higher utilization. Within container-based cloud environment, services can adopt multi-target nodes. This paper reports research results to improve the traditional trust model with consideration of cooperation effects. Cooperation trust means that in a container-based cloud environment, services can be divided into multiple containers for different container nodes. When multiple More >

  • Open Access

    ARTICLE

    A Proxy Re-Encryption with Keyword Search Scheme in Cloud Computing

    Yongli Tang1, Huanhuan Lian1, Zemao Zhao2, Xixi Yan1,*

    CMC-Computers, Materials & Continua, Vol.56, No.2, pp. 339-352, 2018, DOI:10.3970/cmc.2018.02965

    Abstract With the widespread use of cloud computing technology, more and more users and enterprises decide to store their data in a cloud server by outsourcing. However, these huge amounts of data may contain personal privacy, business secrets and other sensitive information of the users and enterprises. Thus, at present, how to protect, retrieve, and legally use the sensitive information while preventing illegal accesses are security challenges of data storage in the cloud environment. A new proxy re-encryption with keyword search scheme is proposed in this paper in order to solve the problem of the low… More >

  • Open Access

    ARTICLE

    On the Privacy-Preserving Outsourcing Scheme of Reversible Data Hiding over Encrypted Image Data in Cloud Computing

    Lizhi Xiong1,*, Yunqing Shi2

    CMC-Computers, Materials & Continua, Vol.55, No.3, pp. 523-539, 2018, DOI:10.3970/cmc.2018.01791

    Abstract Advanced cloud computing technology provides cost saving and flexibility of services for users. With the explosion of multimedia data, more and more data owners would outsource their personal multimedia data on the cloud. In the meantime, some computationally expensive tasks are also undertaken by cloud servers. However, the outsourced multimedia data and its applications may reveal the data owner’s private information because the data owners lose the control of their data. Recently, this thought has aroused new research interest on privacy-preserving reversible data hiding over outsourced multimedia data. In this paper, two reversible data hiding… More >

  • Open Access

    ARTICLE

    Verifiable Diversity Ranking Search Over Encrypted Outsourced Data

    Yuling Liu1,*, Hua Peng1, Jie Wang2

    CMC-Computers, Materials & Continua, Vol.55, No.1, pp. 37-57, 2018, DOI:10.3970/cmc.2018.055.037

    Abstract Data outsourcing has become an important application of cloud computing. Driven by the growing security demands of data outsourcing applications, sensitive data have to be encrypted before outsourcing. Therefore, how to properly encrypt data in a way that the encrypted and remotely stored data can still be queried has become a challenging issue. Searchable encryption scheme is proposed to allow users to search over encrypted data. However, most searchable encryption schemes do not consider search result diversification, resulting in information redundancy. In this paper, a verifiable diversity ranking search scheme over encrypted outsourced data is More >

Displaying 441-450 on page 45 of 452. Per Page