Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (242)
  • Open Access

    ARTICLE

    A Weighted Threshold Secret Sharing Scheme for Remote Sensing Images Based on Chinese Remainder Theorem

    Qi He1, Shui Yu2, Huifang Xu3,*, Jia Liu4, Dongmei Huang5, Guohua Liu6, Fangqin Xu3, Yanling Du1

    CMC-Computers, Materials & Continua, Vol.58, No.2, pp. 349-361, 2019, DOI:10.32604/cmc.2019.03703

    Abstract The recent advances in remote sensing and computer techniques give birth to the explosive growth of remote sensing images. The emergence of cloud storage has brought new opportunities for storage and management of massive remote sensing images with its large storage space, cost savings. However, the openness of cloud brings challenges for image data security. In this paper, we propose a weighted image sharing scheme to ensure the security of remote sensing in cloud environment, which takes the weights of participants (i.e., cloud service providers) into consideration. An extended Mignotte sequence is constructed according to… More >

  • Open Access

    ARTICLE

    WiBPA: An Efficient Data Integrity Auditing Scheme Without Bilinear Pairings

    Chunhua Li1,*, Peng Wang1, Changhong Sun1, Ke Zhou1, Ping Huang2

    CMC-Computers, Materials & Continua, Vol.58, No.2, pp. 319-333, 2019, DOI:10.32604/cmc.2019.03856

    Abstract The security of cloud data has always been a concern. Cloud server provider may maliciously tamper or delete user’s data for their own benefit, so data integrity audit is of great significance to verify whether data is modified or not. Based on the general three-party audit architecture, a dynamic auditing scheme without bilinear pairings is proposed in this paper. It utilizes exponential operation instead of bilinear mapping to verify the validity of evidence. By establishing the mapping relation between logic index and tag index of data block with index transformation table, our scheme can easily More >

  • Open Access

    ARTICLE

    GFCache: A Greedy Failure Cache Considering Failure Recency and Failure Frequency for an Erasure-Coded Storage System

    Mingzhu Deng1, Fang Liu2,*, Ming Zhao3, Zhiguang Chen2, Nong Xiao2,1

    CMC-Computers, Materials & Continua, Vol.58, No.1, pp. 153-167, 2019, DOI:10.32604/cmc.2019.03585

    Abstract In the big data era, data unavailability, either temporary or permanent, becomes a normal occurrence on a daily basis. Unlike the permanent data failure, which is fixed through a background job, temporarily unavailable data is recovered on-the-fly to serve the ongoing read request. However, those newly revived data is discarded after serving the request, due to the assumption that data experiencing temporary failures could come back alive later. Such disposal of failure data prevents the sharing of failure information among clients, and leads to many unnecessary data recovery processes, (e.g. caused by either recurring unavailability… More >

  • Open Access

    ARTICLE

    Blockchain-Based Trusted Electronic Records Preservation in Cloud Storage

    Zhiliang Deng1,2, Yongjun Ren3,4, Yepeng Liu3,4, Xiang Yin5, Zixuan Shen3,4, Hye-Jin Kim6,*

    CMC-Computers, Materials & Continua, Vol.58, No.1, pp. 135-151, 2019, DOI:10.32604/cmc.2019.02967

    Abstract Cloud storage represents the trend of intensive, scale and specialization of information technology, which has changed the technical architecture and implementation method of electronic records management. Moreover, it will provide a convenient way to generate more advanced and efficient management of the electronic data records. However, in cloud storage environment, it is difficult to guarantee the trustworthiness of electronic records, which results in a series of severe challenges to electronic records management. Starting from the definition and specification of electronic records, this paper firstly analyzes the requirements of the trustworthiness in cloud storage during their More >

  • Open Access

    ARTICLE

    ADL-RAID: Energy-Saving Data Layout for Dynamic Loads

    Youxi Wu1,2, Shengyuan Shi1,2, Jingyu Liu1,2,*, Huaizhong Zhu1,2

    Computer Systems Science and Engineering, Vol.33, No.5, pp. 309-316, 2018, DOI:10.32604/csse.2018.33.309

    Abstract With the rapid development of information technology and the explosive growth of data, the scale of storage equipment is growing rapidly. The high energy consumption storage devices have become a serious problem for data centers. For data storage, the model of sequential data access a storage system is commonly used. Aiming at the characteristics of a sequential data storage system, this paper, we propose a structure, named Adapted to Dynamic Load based on Redundant Array Independent Disks (ADL-RAID) which is an effective energy-saving data layout for dynamic loads based on the existing Semi-Redundant Array Independent… More >

  • Open Access

    ARTICLE

    Forensic Investigation Through Data Remnants on Hadoop Big Data Storage System

    Myat Nandar Oo1, Sazia Parvin2, Thandar Thein3

    Computer Systems Science and Engineering, Vol.33, No.3, pp. 203-217, 2018, DOI:10.32604/csse.2018.33.203

    Abstract Forensic examiners are in an uninterrupted battle with criminals in the use of Big Data technology. The underlying storage system is the main scene to trace the criminal activities. Big Data Storage System is identified as an emerging challenge to digital forensics. Thus, it requires the development of a sound methodology to investigate Big Data Storage System. Since the use of Hadoop as Big Data Storage System continues to grow rapidly, investigation process model for forensic analysis on Hadoop Storage and attached client devices is compulsory. Moreover, forensic analysis on Hadoop Big Data Storage System More >

  • Open Access

    ARTICLE

    The Data Analyses of a Vertical Storage Tank Using Finite Element SOFT Computing

    Lin Gao, Mingzhen Wang

    Intelligent Automation & Soft Computing, Vol.24, No.3, pp. 643-651, 2018, DOI:10.31209/2018.100000031

    Abstract With the rapid development of the petrochemical industry, the number of largescale oil storage tanks has increased significantly, and many storage tanks are located in potential seismic regions. It is very necessary to analyze seismic response of oil storage tanks since their damage in an earthquake can lead to serious disasters and losses. In this paper, three models of vertical cylindrical oil storage tank in different sizes, which are commonly used in practical engineering are established. The dynamic characteristics, sloshing wave height and hydrodynamic pressure of the oil tank considering the liquid-structure coupling effect are… More >

  • Open Access

    ARTICLE

    Application of Amine-Functionalized Cellulose Foam for CO2 Capture and Storage in the Brewing Industry

    Lars Helmlinger1, Yejun Zhu1, Julia Gensel1, Thomas Neumeyer1, Stefan Thäter2, Franziska Strube2, Christoph Bauer2, Bernd Rosemann2, Volker Altstädt1*

    Journal of Renewable Materials, Vol.6, No.3, pp. 219-225, 2018, DOI:10.7569/JRM.2017.634161

    Abstract Due to a lack of technology, smaller breweries simply dump excess CO2 into the atmosphere, fueling the greenhouse effect and global warming. State-of-the-art CO2 capture technologies using nanofibrillated cellulose are expensive and require laborious freeze-drying. Consequently, there is a high demand for affordable alternatives in order to reduce the environmental impact in this industry sector. This work describes a novel route for a quick and cost-efficient synthesis of amine-functionalized cellulose pellets by a surfactant-assisted steam explosion process. Typical values with this method were porosity of 92% and density of 67 g/cm³. Investigations on polyethylenimine (PEI) More >

  • Open Access

    ARTICLE

    Dynamic Proofs of Retrievability Based on Partitioning-Based Square Root Oblivious RAM

    Jian Xu1,2,*, Zhihao Jiang1, Andi Wang1, Chen Wang1, Fucai Zhou1

    CMC-Computers, Materials & Continua, Vol.57, No.3, pp. 589-602, 2018, DOI:10.32604/cmc.2018.03820

    Abstract With the development of cloud storage, the problem of efficiently checking and proving data integrity needs more consideration. Therefore, much of growing interest has been pursed in the context of the integrity verification of cloud storage. Provable data possession (PDP) and Proofs of retrievablity (POR) are two kinds of important scheme which can guarantee the data integrity in the cloud storage environments. The main difference between them is that POR schemes store a redundant encoding of the client data on the server so as to she has the ability of retrievablity while PDP does not… More >

  • Open Access

    ARTICLE

    Design of ECC based Secured Cloud Storage Mechanism for Transaction Rich Applications

    V. Gopinath1, R. S. Bhuvaneswaran2

    CMC-Computers, Materials & Continua, Vol.57, No.2, pp. 341-352, 2018, DOI:10.32604/cmc.2018.04006

    Abstract Cloud computing is the highly demanded technology nowadays. Due to the service oriented architecture, seamless accessibility and other advantages of this advent technology, many transaction rich applications are making use of it. At the same time, it is vulnerable to hacks and threats. Hence securing this environment is of at most important and many research works are being reported focusing on it. This paper proposes a safe storage mechanism using Elliptic curve cryptography (ECC) for the Transaction Rich Applications (TRA). With ECC based security scheme, the security level of the protected system will be increased More >

Displaying 211-220 on page 22 of 242. Per Page