A SECURE CLOUD ARCHITECTURE FOR PUBLIC AUDITING BY USING SHARED MECHANISM
|
|
|
- Horace Stephens
- 9 years ago
- Views:
Transcription
1 A SECURE CLOUD ARCHITECTURE FOR PUBLIC AUDITING BY USING SHARED MECHANISM Pavalka Mudabona 1, Bhaluda Raveendanadh Sngh 2, Akuthota Mahesh 3 1 Pusung M.Tech (CSE), 2 Pncpal, 3 Assstant Pofesso(CSE), Vsvesvaaya College of Engneeng and Technology (VCET), M.P Patelguda, Ibahmpatnam (M), Ranga Reddy, (Inda) ABSTRACT Cloud computng s an ognal egsteng model that empowes helpful and on demand access to a common pool of confguable fgung assets. Evaluatng admnstatons ae pofoundly key to vefy that the nfomaton s accuately facltated n the cloud. In ths pape, we exploe the dynamc opponent assaults n thee evaluatng nstuments fo shaed nfomaton n the cloud, ncludng two chaacte potecton savng nspectng systems called Outa and Knox, and an appopated stockplng tustwothness nspectng system. We demonstate that these plans get to be shaky when dynamc foes ae ncluded n the dstbuted stoage. In patcula, a dynamc enemy can subjectvely modfy the cloud nfomaton wthout beng dstngushed by the evaluato n the confmaton stage. We lkewse popose an answe fo cue the shotcomng wthout elnqushng any attactve elements of these components. 1. INTRODUCTION Numeous pattens ae openng up the peod of cloud fgung, whch s an Intenet-based advancement and utlzaton of PC nnovaton. The ntense pocessos, togethe wth the Softwae as a Sevce fgung stuctual plannng, that ae tansmttng, nfomaton stockplng nto pools of fgung admnstaton on colossal scale. Movng nfomaton nto the cloud offes awesome pesuades to clents snce they don't have to stess ove the complextes of dect equpment and pogammng admnstaton. The ponee of dstbuted computng mechants, Amazon Smple Stoage Sevce (S3) and Amazon Elastc Cloud (EC2) ae both suely undestood samples. The expandng system tansfe speed and dependable yet adaptable system assocatons make t even concevable that clents can now subscbe supeb admnstatons fom nfomaton and pogammng that dwell exclusvely on emote nfomaton centes. Whle these web based onlne admnstatons do gve ggantc measue of stoage oom and adaptable egsteng assets, the movement to dstbuted stoage s wpng out oblgaton of neghbohood machnes fo nfomaton upkeep n the meantme. Fom one pespectve, n spte of the fact that the cloud foundatons ae a geat deal all the moe effectve and sold than ndvdualzed computng gadgets, cetan degee nteo and oute danges fo nfomaton upghtness happens. Case n pont, to buld the net evenue CSP may ease as often as possble got to nfomaton wthout beng dentfed n a oppotune desgn. Thus, CSP may even endeavo to stow away nfomaton msfotune occuences n ode to keep up notoety. In ths manne, albet outsoucng nfomaton nto the cloud s fnancally appealng fo the expense 19 P a g e
2 and many-sded qualty of long haul extensve scale stockplng of nfomaton tustwothness and accessblty may delay ts wde selecton by both undetakng and ndvdual cloud clents. Keepng n mnd the end goal to accomplsh the cetfcatons of cloud nfomaton espectablty and accessblty and authoze the natue of dstbuted stoage admnstaton, poductve outnes that empowe on-nteest nfomaton accuacy check fo sake of cloud clents need to outlne. The clent dd not have physcal owneshp of nfomaton n the cloud pecludes the dect adopton of conventonal cyptogaphc pmtves fo the eason fo nfomaton upghtness assuance. Hencefoth, the check of dstbuted stoage accuacy must be dected wthout unequvocal nfomaton of the ente nfomaton ecods. In the mean tme, dstbuted stoage s not only an outsde nfomaton dstbuton cente. The nfomaton put away need not be gotten to but athe lkewse be egulaly edesgned by the clents, ncludng some of the opeatons lke supplement, ease,upgade, affx Thus, t s addtonally basc to suppot the ncopoaton of ths element hghlght nto the dstbuted stoage accuacy declaaton, whch bngs a testng outlne fo the famewok. Last yet not the mnmum, the oganzaton of cloud egsteng s contolled by seve fams unnng n a synchonous, chpped n, and dssemnated way. Cloud stoage, a vtal admnstaton of dstbuted computng, pemts clents to move nfomaton fom the neghbohood stockplng famewoks to the cloud and appecate the on-nteest excellent cloud admnstatons. It offes extaodnay comfot to clents snce they ty not to need to thnk about the complextes of dect equpment and pogammng admnstatons. Futhemoe, wth dstbuted stoage, nfomaton shang s acknowledged pofcently among an expansve numbe of clents n a gatheng and t tuns nto a standad component n most dstbuted stoage offengs, ncludng Dop box and Google Docs. Although dstbuted stoage gves numeous engagng advantages to clents, t moeove pompts vaous secuty ssues towads the outsouced nfomaton. The nfomaton consume on the cloud s effectvely be debased, adjusted o eased because of equpment dsappontment o human slps, n ths manne, ensung the accuacy and espectablty of the nfomaton n the cloud s pofoundly key. To accomplsh ths objectve, two novel methodologes called povable nfomaton possesson (PDP) and vefcatons of etevablty (POR) was poposed. In 2007, Attendees et al. poposed, fo the fst ty-out, the dea of PDP to check the tustwothness of the nfomaton consume at un tusted seves, and exhbted an open evewng plan utlzng RSA-based homomophc dect authentcatos. They addtonally potayed a feely notceable plan, whch pemts any outsde to challenge the seve fo nfomaton owneshp. To boost dynamc nfomaton opeatons, Atenese et al. poposed a flexble PDP n lght of hash capacty and symmetc key encypton. Then agan, n ths plan, the quanttes of upgade and test ae estcted and need to be pefxed and squae nseton s not pemtted. In ths manne, Eway et al. ceated two element PDP conventons takng nto account hash tees. Juels et al. poposed a POR model to guaantee both nfomaton owneshp and etevablty. Shockngly, ths nstument avods effectve augmentaton fo upgadng nfomaton. Sachems and Wates potayed two answes fo guaanteeng the upghtness of emote nfomaton. The pncpal plan makes utlzaton of pseudoandom capactes and undepns pvate evaluatng, whle the second one pemts open nspectng and s n lght of BLS shot mak.in vew of the BLS shot mak, Wang et al. ntoduced nfomaton tustwothness checkng ways to deal wth accomplsh open audt ablty, capacty ghtness, secuty potectng, clump examnng, lghtweght, dynamc nfomaton backng and blunde aea and ecovey. Fom 20 P a g e
3 that pont fowad, a few othe evewng components, fo example, have been poposed fo secung the tustwothness of the outsouced nfomaton. The vast majoty of the cuent aangements just concentate on examnng the espectablty of the emote nfomaton. Be that as t may, secuty potectng s pofoundly key amd the nspectng pocess. Wang et al. poposed a potecton savng open examnng nstument, n whch the substance of clents' nfomaton s not unveled to the examne. As of late, Wang et al. watched that potectng chaacte secuty fom the evewe amd the examnng pocedue s lkewse fundamental snce the chaactes of clents may show that a specfc clent n the gatheng o an uncommon pece n the mutual nfomaton s a moe mpotant focus as othes. They lkewse poposed two chaacte potecton savng evewng components, called Outa and Knox, fo secue dstbuted stoage. In Outa, ng maks based homomophc authentcatos ae utlzed such that the nspecto can check the tustwothness of the shaed nfomaton fo a gatheng of clents wthout ecoveng the whole nfomaton, whle the pesonalty of the clent on evey pece on the common nfomaton s kept secet fom the evaluato. A downsde of Outa s that the extent of the maks and audtng vefcatons ae dectly expandng wth the quantty of the clents n a gatheng. In addton, when anothe clent s added to the gatheng, evey one of the maks has to be eceated. Knox utlzed gatheng mak based homomophc authentcatos to take cae of the ssue, futhemoe abbevated the extent of authentcatos also, the evewng evdences whle savng the popetes of chaacte potecton savng, open evaluatng and clump examnng. In ths pape, we etun to thee evaluatng nstuments fo secue dstbuted stoage, countng two pesonalty potecton safeguadng components and a conveyed capacty upghtness nspectng nstument. We demonstate that the popety of ghtness can't be accomplshed when dynamc enemes ae ncluded n these nspectng famewoks. All the moe patculaly, a dynamc enemy can self-assetvely alte the cloud nfomaton and poduce a legtmate nspectng eacton to pass the nspecto's confmaton. As a esult, the enemy can tck the nspecto to accept that the nfomaton n the cloud s vey much kept up whle actually the nfomaton has been defled. We addtonally popose an answe fo ntenton the shotcomng n these plans. II. SECURITY DISCUSSIONS ON A DISTRIBUTED STORAGE AUDITING MECHANISM Secuty dscussons on a dstbuted stoage mechansm evew the dstbuted stoage ntegty audtng mechansm n bef detals about ts secuty n the stuaton of actve opposton. Some notatons ae defned n below as follows. F: The nfomaton data fle to be stoed. Hee F can be dvded nto multple pats as a matx equal sze of m data vectos, each vecto consstng the blocks of l blocks. A: Reed Solomon codng pupose.the speadng matx s denoted by A. G: Encoded fle matx s denoted by G, whch contans a set of n=m+k vectos each nclude l blocks. f key (.): The pseudoandom functon (PRF), whch s epesent as f:{0,1}* key GF(2 p ). key (.): The Pseudoandom pemutaton (PRP) whch s defned by : {0,1} log 2(l) key {0,1} log 2(l) Anothe one s : ve : A veson numbe bound wth the ndex fo ndependent ecods blocks, whch ecod the tmes the block has been changed. 21 P a g e
4 s ve j : The seed fo PRF, whch based on the fle name s block ndex j s seve poston j as well as the choce block veson ve. Analyss of the scheme: The man method s composed based on followng thee algothms Fle Dstbuton pepaaton: Let F=(F 1, F 2, F 3, F 4, F 5 F 6, F 7, F m, ) and F =(f 1, f 2, f 3, f 4, f l, ) T, ( 1,2 m). T epesents each F s epesented as a column vecto and epesented by l s denoted data sze of vcto I block, the nfomaton spead matx A, deved fom an m (m+k) vandemonde matx : I q= k pp q.β j Whee β j (j 1,2,3. n) ae the dffeent elements andomly selected fom GF(2 w ) Afte a sequence of elementay ow tansfomatons, the pefeed matx A can be wtten By multplyng F by A, the use can gan encoded fle G=F.A =(G (1), G (2), G (3), G (4), G (5). G (m ), G (m +1),. G (n) ) =(F 1, F 2, F 3, F 4,. F m, G (m +1),. G (n) ) Whee G j (j =(g ) (j 1, g ) (j 2, g ) (j 3 g ) l ) T (j 1,2,3, n). III. TOKEN PRE COMPUTATIONS Fo example use wants to challenge the t seve tmes, fst pevously he wll calculate vefcatons tokens of t fo each token G (j ) (j 1,2,3 n) usng PRF f key (.), a PRP key (.), a challenge of matx s k cal and pemutaton of maste page s K PRP. Fo equest seve j, the clent ceate th token as follow the below steps Geneate a andom value α of GF(2 p () ) by α =fk cal () and pemutaton key s k pp based on K PRP 22 P a g e
5 Calculate the set of values andomly chosen ndcate {I q 1,2,3. l 1 q } whee I q = () Kpp (q). Fnd the token as v (j ) = q q=1 α *G (j ) [I q ], whee G (j ) (j [I q ]=g ) Iq. IV. CORRECTNESS VERIFICATION The challenge fnd of I th esponse checkng ove the seve act as follows The use evals the α as well as the () I th pemutaton s k pp to each seve The seve stong vecto s G (j) () (j 1,2,3, n) geneate those ows ndcated by ndex k pp combnaton R (j ) = q q=1 α *G (j ) (j [ () Kpp (q)] afte send back R ) =(j 1,2,3, n). nto lne Afte ecevng R (j ) fom all the seve, the use takes away blnd values n R (j ) (j m +1,2,3, n) by R (j ) R (j ) - q=1 f k j (SI q,j ). α q whee I q = Kpp q. The use checks whethe the eceved value secet matx(r (1) (m,.. R ) (m ).P=(R +1), R (n) ) If the above statement challaged passed, else t dsplays among those specfed ows, fle exsts fo fle block coupton. Same as the analyss method of Outa and knox an actve advesay A can be tempoaly change the data block values wthout need of the actual block values, but at the same tme fool the clent use feels the data well adjusted and mantaned by the cloud seve. The bef detals ae shown below as follows. A selected an l n matx Y whose contanng elements ae y () p GF(2 p ),(1 q l,1 j n). A modfes the data block s (G j [ kpp q ]) to (G j [ kpp q ]) + y q fo 1 q. In fnd out audt segment, the use and the seve use executes the pogam tuly the use eveals the α as well () as the I th pemutaton key k pp back to the use, whee to each seve afte seve fnd the esponse R (j ) (j 1,2,3, n). and send t R j = q=1 q *(G j [ kpp (q)]+y q ) = q=1 q *(G j [ kpp q ]) + ( q q=1 *y q ) =R (j ) + ( q q=1 *y q ) A Coss the esponse R j fom the cloud seve to the audto, and modfes R j to R j = R j q=1 ( q *y q ) and fowads R (j ) to the use It s anythng but dffcult to watch that the confmaton wll be effectve. Luckly, vefcaton s assumed n [15]. The pont-to-pont coespondence channels between evey cloud seve and the clent s thought to be confmed and dependable. We contend that ths s vey fundamental. Somethng else, the system mght be fal aganst a dynamc assault as potayed pevously. Amd the executon as a geneal ule, the seve can utlze a potected advanced mak to accomplsh the objectve, as poposed n the past segment. 23 P a g e
6 V. CONCLUSION In ths pape, we etuned to thee nspectng systems fo shaed nfomaton n the cloud, ncludng two pesonalty secuty safeguadng evaluatng nstuments and a dspesed capacty tustwothness evaluatng nstument. We exhbt that f the cloud seve does not valdate ts eacton, a dynamc foe can dspatch an assault to damage the capacty accuacy. In patcula, the enemy can self-assetvely adjust the cloud nfomaton wthout beng dentfed by the evewe n the check stage. It appeas that ths sot of assault was not consdeed n the past poposton, and luckly, the ceatos of specfed that dependable channels between cloud seve and clents ae oblged howeve wth no sold sendng. We poposed utlzng a safe computezed mak plan to settle the ssue wthout gvng up any attactve component of the fst systems. REFERENCES [1]. M. T. Khoshed, A. B. M. Al, S. A. Wasm, A suvey on gaps, theat emedaton challenges and some thoughts fo poactve attack detecton n cloud computng, Futue Geneaton Compute Systems, 28(6)(2012) [2]. Ku Ren, Cong Wang, Qan Wang: Secuty Challenges fo the Publc Cloud. IEEE Intenet Computng 16(1)(2012) [3]. G. Atenese, R. C. Buns, R. Cutmola, J. Heng, L. Kssne, Z. N. J. Peteson, D. X. Song, Povable data possesson at untusted stoes, n: ACM Confeence on Compute and Communcatons Secuty 2007, pp [4]. G. Atenese, R. D. Peto, L. V. Mancn, G. Tsudk. Scalable and effcent povable data possesson, n: Poc. of SecueComm 2008, pp [5]. C. C. Eway, A. Kupcu, C. Papamanthou, R. Tamassa, Dynamc povable data possesson, Poc. of CCS 2009, pp [6]. A. Juels, J. Buton S. Kalsk, PORs: Poofs of etevablty fo lage fles, n: Poc. of CCS 07, pp [7]. H. Shacham, B. Wates, Compact poofs of etevablty, n: Poc. of Asacypt 2008, pp [8]. D. Boneh, B. Lynn, H. Shacham, Shot sgnatues fom the Wel pang, J. Cyptology, 17(4)(2004) [9]. C. Wang, Q. Wang, K. Ren, W. Lou, Pvacy-pesevng publc audtng fo data stoage secuty n cloud computng, n: Poc. of INFOCOM 2010, pp [10]. Q. Wang, C. Wang, K. Ren, W. Lou, J. L, Enablng publc audtablty and data dynamcs fo stoage secuty n cloud computng, IEEE Tans. Paallel Dstb. Syst. 22(5) (2011) [11]. C. Wang, K. Ren, W. Lou, J. L, Towad publcly audtable secue cloud data stoage sevces, IEEE Netwok, 24(4) (2010) [12]. Y. Zhu, H. Hu, G. Ahn, M. Yu, Coopeatve povable data possesson fo ntegty vefcaton n multcloud stoage, IEEE Tans. Paallel Dstb. Syst. [13]. Y. Zhu, H. Wang, Z. Hu, G.-J. Ahn, H. Hu, and S. S. Yau, Dynamc audt sevces fo ntegty vefcaton of outsouced stoages n clouds, n: SAC 2011 pp P a g e
7 [14]. C. Wang, Q. Wang, K. Ren, N. Cao, W. Lou, Towad secue and dependable stoage sevces n cloud computng, IEEE Tans. on Sevces Computng [15]. B. Wang, B. L, H. L, Outa:Pvacy-pesevng publc audtng fo shaed data n the cloud, n: IEEE Intenatonal Confeence on Cloud Computng, 2012, pp [16]. B. Wang, B. L, H. L, Knox: Pvacy-pesevng audtng fo shaed data wth lage goups n the cloud, n: Poc. of ACNS 2012, pp AUTHOR DETAILS Pavalka Mudabona Pusung M-Tech n Vsvesvaaya College of Engneeng and Technology, M.P Patelguda, Ibahmpatnam (M), Ranga Reddy(D), Inda. S D. Bhaluda Raveendanadh Sngh wokng as Assocate Pofesso & Pncpal n Vsvesvaaya College of Engneeng and Technology obtaned M.Tech, Ph.D(CSE)., s a young, decent, dynamc Renowned Educatonst and Emnent Academcan, has oveall 20 yeas of teachng expeence n dffeent capactes. He s a lfe membe of CSI, ISTE and also a membe of IEEE (USA) M. Mahesh Akuthota wokng as Asst. Pofesso (CSE) n Vsvesvaaya College of Engneeng and Technology, M.P Patelguda, Ibahmpatnam (M), Ranga Reddy(D), Inda. 25 P a g e
A Novel Lightweight Algorithm for Secure Network Coding
A Novel Lghtweght Algothm fo Secue Netwok Codng A Novel Lghtweght Algothm fo Secue Netwok Codng State Key Laboatoy of Integated Sevce Netwoks, Xdan Unvesty, X an, Chna, E-mal: {wangxaoxao,wangmeguo}@mal.xdan.edu.cn
Additional File 1 - A model-based circular binary segmentation algorithm for the analysis of array CGH data
1 Addtonal Fle 1 - A model-based ccula bnay segmentaton algothm fo the analyss of aay CGH data Fang-Han Hsu 1, Hung-I H Chen, Mong-Hsun Tsa, Lang-Chuan La 5, Ch-Cheng Huang 1,6, Shh-Hsn Tu 6, Ec Y Chuang*
Bending Stresses for Simple Shapes
-6 Bendng Stesses fo Smple Sapes In bendng, te maxmum stess and amount of deflecton can be calculated n eac of te followng stuatons. Addtonal examples ae avalable n an engneeng andbook. Secton Modulus
Efficient Evolutionary Data Mining Algorithms Applied to the Insurance Fraud Prediction
Intenatonal Jounal of Machne Leanng and Computng, Vol. 2, No. 3, June 202 Effcent Evolutonay Data Mnng Algothms Appled to the Insuance Faud Pedcton Jenn-Long Lu, Chen-Lang Chen, and Hsng-Hu Yang Abstact
(Semi)Parametric Models vs Nonparametric Models
buay, 2003 Pobablty Models (Sem)Paametc Models vs Nonpaametc Models I defne paametc, sempaametc, and nonpaametc models n the two sample settng My defnton of sempaametc models s a lttle stonge than some
A New replenishment Policy in a Two-echelon Inventory System with Stochastic Demand
A ew eplenshment Polcy n a wo-echelon Inventoy System wth Stochastc Demand Rasoul Haj, Mohammadal Payesh eghab 2, Amand Babol 3,2 Industal Engneeng Dept, Shaf Unvesty of echnology, ehan, Ian ([email protected],
An Algorithm For Factoring Integers
An Algothm Fo Factong Integes Yngpu Deng and Yanbn Pan Key Laboatoy of Mathematcs Mechanzaton, Academy of Mathematcs and Systems Scence, Chnese Academy of Scences, Bejng 100190, People s Republc of Chna
AREA COVERAGE SIMULATIONS FOR MILLIMETER POINT-TO-MULTIPOINT SYSTEMS USING STATISTICAL MODEL OF BUILDING BLOCKAGE
Radoengneeng Aea Coveage Smulatons fo Mllmete Pont-to-Multpont Systems Usng Buldng Blockage 43 Vol. 11, No. 4, Decembe AREA COVERAGE SIMULATIONS FOR MILLIMETER POINT-TO-MULTIPOINT SYSTEMS USING STATISTICAL
Joint Virtual Machine and Bandwidth Allocation in Software Defined Network (SDN) and Cloud Computing Environments
IEEE ICC 2014 - Next-Geneaton Netwokng Symposum 1 Jont Vtual Machne and Bandwdth Allocaton n Softwae Defned Netwok (SDN) and Cloud Computng Envonments Jonathan Chase, Rakpong Kaewpuang, Wen Yonggang, and
Gravitation. Definition of Weight Revisited. Newton s Law of Universal Gravitation. Newton s Law of Universal Gravitation. Gravitational Field
Defnton of Weght evsted Gavtaton The weght of an object on o above the eath s the gavtatonal foce that the eath exets on the object. The weght always ponts towad the cente of mass of the eath. On o above
Research on Cloud Computing Load Balancing Based on Virtual Machine Migration
Send Odes fo Repnts to [email protected] 334 The Open Cybenetcs & Systecs Jounal, 205, 9, 334-340 Open Access Reseach on Cloud Coputng Load Balancng Based on Vtual Machne Mgaton Lu Kun,*, Xu Gaochao
Perturbation Theory and Celestial Mechanics
Copyght 004 9 Petubaton Theoy and Celestal Mechancs In ths last chapte we shall sketch some aspects of petubaton theoy and descbe a few of ts applcatons to celestal mechancs. Petubaton theoy s a vey boad
Orbit dynamics and kinematics with full quaternions
bt dynamcs and knematcs wth full quatenons Davde Andes and Enco S. Canuto, Membe, IEEE Abstact Full quatenons consttute a compact notaton fo descbng the genec moton of a body n the space. ne of the most
Prejudice and the Economics of Discrimination
Pelmnay Pejudce and the Economcs of Dscmnaton Kewn Kof Chales Unvesty of Chcago and NB Jonathan Guyan Unvesty of Chcago GSB and NB Novembe 17, 2006 Abstact Ths pape e-examnes the ole of employe pejudce
Electric Potential. otherwise to move the object from initial point i to final point f
PHY2061 Enched Physcs 2 Lectue Notes Electc Potental Electc Potental Dsclame: These lectue notes ae not meant to eplace the couse textbook. The content may be ncomplete. Some topcs may be unclea. These
PCA vs. Varimax rotation
PCA vs. Vamax otaton The goal of the otaton/tansfomaton n PCA s to maxmze the vaance of the new SNP (egensnp), whle mnmzng the vaance aound the egensnp. Theefoe the dffeence between the vaances captued
Keywords: Transportation network, Hazardous materials, Risk index, Routing, Network optimization.
IUST Intenatonal Jounal of Engneeng Scence, Vol. 19, No.3, 2008, Page 57-65 Chemcal & Cvl Engneeng, Specal Issue A ROUTING METHODOLOGY FOR HAARDOUS MATIALS TRANSPORTATION TO REDUCE THE RISK OF ROAD NETWORK
What is Candidate Sampling
What s Canddate Samplng Say we have a multclass or mult label problem where each tranng example ( x, T ) conssts of a context x a small (mult)set of target classes T out of a large unverse L of possble
REAL TIME MONITORING OF DISTRIBUTION NETWORKS USING INTERNET BASED PMU. Akanksha Eknath Pachpinde
REAL TME MONTORNG OF DSTRBUTON NETWORKS USNG NTERNET BASED PMU by Akanksha Eknath Pachpnde A Thess submtted to the Faculty of the Gaduate School of the Unvesty at Buffalo, State Unvesty of New Yok n patal
Converting knowledge Into Practice
Conveting knowledge Into Pactice Boke Nightmae srs Tend Ride By Vladimi Ribakov Ceato of Pips Caie 20 of June 2010 2 0 1 0 C o p y i g h t s V l a d i m i R i b a k o v 1 Disclaime and Risk Wanings Tading
TRUCK ROUTE PLANNING IN NON- STATIONARY STOCHASTIC NETWORKS WITH TIME-WINDOWS AT CUSTOMER LOCATIONS
TRUCK ROUTE PLANNING IN NON- STATIONARY STOCHASTIC NETWORKS WITH TIME-WINDOWS AT CUSTOMER LOCATIONS Hossen Jula α, Maged Dessouky β, and Petos Ioannou γ α School of Scence, Engneeng and Technology, Pennsylvana
An Alternative Way to Measure Private Equity Performance
An Alternatve Way to Measure Prvate Equty Performance Peter Todd Parlux Investment Technology LLC Summary Internal Rate of Return (IRR) s probably the most common way to measure the performance of prvate
A Mathematical Model for Selecting Third-Party Reverse Logistics Providers
A Mathematcal Model fo Selectng Thd-Pat Revese Logstcs Povdes Reza Fazpoo Saen Depatment of Industal Management, Facult of Management and Accountng, Islamc Azad Unvest - Kaaj Banch, Kaaj, Ian, P. O. Box:
How to create a default user profile in Windows 7
AnswesThatWok TM How to ceate a default use pofile in Windows 7 (Win 7) How to ceate a default use pofile in Windows 7 When to use this document Use this document wheneve you want to ceate a default use
LINES ON BRIESKORN-PHAM SURFACES
LIN ON BRIKORN-PHAM URFAC GUANGFNG JIANG, MUTUO OKA, DUC TAI PHO, AND DIRK IRMA Abstact By usng toc modfcatons and a esult of Gonzalez-pnbeg and Lejeune- Jalabet, we answe the followng questons completely
AN IMPLEMENTATION OF BINARY AND FLOATING POINT CHROMOSOME REPRESENTATION IN GENETIC ALGORITHM
AN IMPLEMENTATION OF BINARY AND FLOATING POINT CHROMOSOME REPRESENTATION IN GENETIC ALGORITHM Main Golub Faculty of Electical Engineeing and Computing, Univesity of Zageb Depatment of Electonics, Micoelectonics,
VRT012 User s guide V0.1. Address: Žirmūnų g. 27, Vilnius LT-09105, Phone: (370-5) 2127472, Fax: (370-5) 276 1380, Email: info@teltonika.
VRT012 User s gude V0.1 Thank you for purchasng our product. We hope ths user-frendly devce wll be helpful n realsng your deas and brngng comfort to your lfe. Please take few mnutes to read ths manual
Ensuring Data Storage Security in Cloud Computing
1 Ensurng Data Storage Securty n Cloud Computng Cong Wang,Qan Wang, Ku Ren, and Wenjng Lou Dept of ECE, Illnos Insttute of Technology, Emal: {cwang, qwang, kren}@ecetedu Dept of ECE, Worcester Polytechnc
Ensuring Data Storage Security in Cloud Computing
Ensurng Data Storage Securty n Cloud Computng Cong Wang, Qan Wang, and Ku Ren Department of ECE Illnos Insttute of Technology Emal: {cwang, qwang, kren}@ece.t.edu Wenjng Lou Department of ECE Worcester
PREVENTIVE AND CORRECTIVE SECURITY MARKET MODEL
REVENTIVE AND CORRECTIVE SECURITY MARKET MODEL Al Ahmad-hat Rachd Cheaou and Omd Alzadeh Mousav Ecole olytechnque Fédéale de Lausanne Lausanne Swzeland [email protected] [email protected] [email protected]
Over-encryption: Management of Access Control Evolution on Outsourced Data
Ove-encyption: Management of Access Contol Evolution on Outsouced Data Sabina De Capitani di Vimecati DTI - Univesità di Milano 26013 Cema - Italy [email protected] Stefano Paaboschi DIIMM - Univesità
Statistical modelling of gambling probabilities
Ttle Statstcal modellng of gamblng pobabltes Autho(s) Lo, Su-yan, Vcto.; 老 瑞 欣 Ctaton Issued Date 992 URL http://hdl.handle.net/0722/3525 Rghts The autho etans all popetay ghts, (such as patent ghts) and
Causal, Explanatory Forecasting. Analysis. Regression Analysis. Simple Linear Regression. Which is Independent? Forecasting
Causal, Explanatory Forecastng Assumes cause-and-effect relatonshp between system nputs and ts output Forecastng wth Regresson Analyss Rchard S. Barr Inputs System Cause + Effect Relatonshp The job of
Luby s Alg. for Maximal Independent Sets using Pairwise Independence
Lecture Notes for Randomzed Algorthms Luby s Alg. for Maxmal Independent Sets usng Parwse Independence Last Updated by Erc Vgoda on February, 006 8. Maxmal Independent Sets For a graph G = (V, E), an ndependent
IBM Research Smarter Transportation Analytics
IBM Reseach Smate Tanspotation Analytics Laua Wynte PhD, Senio Reseach Scientist, IBM Watson Reseach Cente [email protected] INSTRUMENTED We now have the ability to measue, sense and see the exact condition
SEVERAL trends are opening up the era of Cloud
IEEE Transactons on Cloud Computng Date of Publcaton: Aprl-June 2012 Volume: 5, Issue: 2 1 Towards Secure and Dependable Storage Servces n Cloud Computng Cong Wang, Student Member, IEEE, Qan Wang, Student
Security of Full-State Keyed Sponge and Duplex: Applications to Authenticated Encryption
Secuty of Full-State Keyed Sponge and uplex: Applcatons to Authentcated Encypton Bat Mennnk 1 Reza Reyhantaba 2 aman Vzá 2 1 ept. Electcal Engneeng, ESAT/COSIC, KU Leuven, and Mnds, Belgum [email protected]
IT09 - Identity Management Policy
IT09 - Identty Management Polcy Introducton 1 The Unersty needs to manage dentty accounts for all users of the Unersty s electronc systems and ensure that users hae an approprate leel of access to these
econstor zbw www.econstor.eu
econsto www.econsto.eu De Open-Access-Publkatonsseve de ZBW Lebnz-Infomatonszentum Wtschaft The Open Access Publcaton Seve of the ZBW Lebnz Infomaton Cente fo Economcs Babazadeh, Reza; Razm, Jafa; Ghods,
Statistical Discrimination or Prejudice? A Large Sample Field Experiment. Michael Ewens, Bryan Tomlin, and Liang Choon Wang.
Statstcal Dscmnaton o Pejudce? A Lage Sample Feld Expement Mchael Ewens, yan Tomln, and Lang Choon ang Abstact A model of acal dscmnaton povdes testable mplcatons fo two featues of statstcal dscmnatos:
I = Prt. = P(1+i) n. A = Pe rt
11 Chapte 6 Matheatcs of Fnance We wll look at the atheatcs of fnance. 6.1 Sple and Copound Inteest We wll look at two ways nteest calculated on oney. If pncpal pesent value) aount P nvested at nteest
Mixed Task Scheduling and Resource Allocation Problems
Task schedulng and esouce allocaton 1 Mxed Task Schedulng and Resouce Allocaton Poblems Mae-José Huguet 1,2 and Pee Lopez 1 1 LAAS-CNRS, 7 av. du Colonel Roche F-31077 Toulouse cedex 4, Fance {huguet,lopez}@laas.f
Watermark-based Provable Data Possession for Multimedia File in Cloud Storage
Vol.48 (CIA 014), pp.103-107 http://dx.do.org/10.1457/astl.014.48.18 Watermar-based Provable Data Possesson for Multmeda Fle n Cloud Storage Yongjun Ren 1,, Jang Xu 1,, Jn Wang 1,, Lmng Fang 3, Jeong-U
How To Use A Network On A Network With A Powerline (Lan) On A Pcode (Lan On Alan) (Lan For Acedo) (Moe) (Omo) On An Ipo) Or Ipo (
Hubs, Bidges, and Switches Used fo extending LANs in tems of geogaphical coveage, numbe of nodes, administation capabilities, etc. Diffe in egads to: m collision domain isolation m laye at which they opeate
How to create RAID 1 mirroring with a hard disk that already has data or an operating system on it
AnswesThatWok TM How to set up a RAID1 mio with a dive which aleady has Windows installed How to ceate RAID 1 mioing with a had disk that aleady has data o an opeating system on it Date Company PC / Seve
Questions & Answers Chapter 10 Software Reliability Prediction, Allocation and Demonstration Testing
M13914 Questions & Answes Chapte 10 Softwae Reliability Pediction, Allocation and Demonstation Testing 1. Homewok: How to deive the fomula of failue ate estimate. λ = χ α,+ t When the failue times follow
Charging the Internet Without Bandwidth Reservation: An Overview and Bibliography of Mathematical Approaches
JOURNAL OF INFORMATION SCIENCE AND ENGINEERING 9, -xxx (2003) Chagng the Intenet Wthout Bandwdth Resevaton: An Ovevew and Bblogaphy of Mathematcal Appoaches IRISA-INRIA Campus Unvestae de Beauleu 35042
How to SYSPREP a Windows 7 Pro corporate PC setup so you can image it for use on future PCs
AnswesThatWok TM How to SYSPREP a Windows 7 Po copoate PC setup so you can image it fo use on futue PCs In a copoate envionment most PCs will usually have identical setups, with the same pogams installed
On the Efficiency of Equilibria in Generalized Second Price Auctions
On the Effcency of Equlba n Genealzed Second Pce Auctons Ioanns Caaganns Panagots Kanellopoulos Chstos Kaklamans Maa Kyopoulou Depatment of Compute Engneeng and Infomatcs Unvesty of Patas and RACTI, Geece
Performance Evaluation Panda for Data Storage and Sharing Services in Cloud Computing
Performance Evaluation Panda for Data Storage and Sharing Services in Cloud Computing Gunnala Ajay Kumar M.Tech Student Department of CSE Global Group Of Institutions Batasingaram, Ranga Reddy (Dist),
HEALTHCARE INTEGRATION BASED ON CLOUD COMPUTING
U.P.B. Sci. Bull., Seies C, Vol. 77, Iss. 2, 2015 ISSN 2286-3540 HEALTHCARE INTEGRATION BASED ON CLOUD COMPUTING Roxana MARCU 1, Dan POPESCU 2, Iulian DANILĂ 3 A high numbe of infomation systems ae available
The Development of Web Log Mining Based on Improve-K-Means Clustering Analysis
The Development of Web Log Mnng Based on Improve-K-Means Clusterng Analyss TngZhong Wang * College of Informaton Technology, Luoyang Normal Unversty, Luoyang, 471022, Chna [email protected] Abstract.
Faithful Comptroller s Handbook
Faithful Comptolle s Handbook Faithful Comptolle s Handbook Selection of Faithful Comptolle The Laws govening the Fouth Degee povide that the faithful comptolle be elected, along with the othe offices
Strength Analysis and Optimization Design about the key parts of the Robot
Intenational Jounal of Reseach in Engineeing and Science (IJRES) ISSN (Online): 2320-9364, ISSN (Pint): 2320-9356 www.ijes.og Volume 3 Issue 3 ǁ Mach 2015 ǁ PP.25-29 Stength Analysis and Optimization Design
How to recover your Exchange 2003/2007 mailboxes and emails if all you have available are your PRIV1.EDB and PRIV1.STM Information Store database
AnswesThatWok TM Recoveing Emails and Mailboxes fom a PRIV1.EDB Exchange 2003 IS database How to ecove you Exchange 2003/2007 mailboxes and emails if all you have available ae you PRIV1.EDB and PRIV1.STM
A Coverage Gap Filling Algorithm in Hybrid Sensor Network
A Coveage Ga Fllng Algothm n Hybd Senso Netwok Tan L, Yang Mnghua, Yu Chongchong, L Xuanya, Cheng Bn A Coveage Ga Fllng Algothm n Hybd Senso Netwok 1 Tan L, 2 Yang Mnghua, 3 Yu Chongchong, 4 L Xuanya,
Simultaneous Detection and Estimation, False Alarm Prediction for a Continuous Family of Signals in Gaussian Noise
Sultaneous Detecton and Estaton, False Ala Pedcton fo a Contnuous Faly of Sgnals n Gaussan Nose D Mchael Mlde, Robet G Lndgen, and Mos M Bean Abstact New pobles ase when the standad theoy of jont detecton
Finite Math Chapter 10: Study Guide and Solution to Problems
Fnte Math Chapter 10: Study Gude and Soluton to Problems Basc Formulas and Concepts 10.1 Interest Basc Concepts Interest A fee a bank pays you for money you depost nto a savngs account. Prncpal P The amount
AN EQUILIBRIUM ANALYSIS OF THE INSURANCE MARKET WITH VERTICAL DIFFERENTIATION
QUIIRIUM YI OF T IUR MRKT WIT VRTI IFFRTITIO Mahto Okua Faculty of conomcs, agasak Unvesty, 4-- Katafuch, agasak, 8508506, Japan [email protected] TRT ach nsuance poduct pe se s dentcal but the nsuance
SEVERAL trends are opening up the era of Cloud
1 Towards Secure and Dependable Storage Servces n Cloud Computng Cong Wang, Student Member, IEEE, Qan Wang, Student Member, IEEE, Ku Ren, Member, IEEE, Nng Cao, Student Member, IEEE, and Wenjng Lou, Senor
Financial Mathemetics
Fnancal Mathemetcs 15 Mathematcs Grade 12 Teacher Gude Fnancal Maths Seres Overvew In ths seres we am to show how Mathematcs can be used to support personal fnancal decsons. In ths seres we jon Tebogo,
A New Estimation Model for Small Organic Software Project
8 03 ACADEMY PUBLISHER A New Estmaton Model o Small Oganc Sotwae Poject Wan-Jang Han, Tan-Bo Lu, and Xao-Yan Zhang School O Sotwae Engneeng, Bejng Unvesty o Posts and Telecommuncaton, Bejng, Chna Emal:
Power Monitoring and Control for Electric Home Appliances Based on Power Line Communication
I²MTC 2008 IEEE Intenational Instumentation and Measuement Technology Confeence Victoia, Vancouve Island, Canada, May 12 15, 2008 Powe Monitoing and Contol fo Electic Home Appliances Based on Powe Line
A PARTICLE-BASED LAGRANGIAN CFD TOOL FOR FREE-SURFACE SIMULATION
C A N A L D E E X P E R I E N C I A S H I D R O D I N Á M I C A S, E L P A R D O Publcacón núm. 194 A PARTICLE-BASED LAGRANGIAN CFD TOOL FOR FREE-SURFACE SIMULATION POR D. MUÑOZ V. GONZÁLEZ M. BLAIN J.
An Efficient Group Key Agreement Protocol for Ad hoc Networks
An Efficient Goup Key Ageement Potocol fo Ad hoc Netwoks Daniel Augot, Raghav haska, Valéie Issany and Daniele Sacchetti INRIA Rocquencout 78153 Le Chesnay Fance {Daniel.Augot, Raghav.haska, Valéie.Issany,
PAS: A Packet Accounting System to Limit the Effects of DoS & DDoS. Debish Fesehaye & Klara Naherstedt University of Illinois-Urbana Champaign
PAS: A Packet Accountng System to Lmt the Effects of DoS & DDoS Debsh Fesehaye & Klara Naherstedt Unversty of Illnos-Urbana Champagn DoS and DDoS DDoS attacks are ncreasng threats to our dgtal world. Exstng
Forecasting the Direction and Strength of Stock Market Movement
Forecastng the Drecton and Strength of Stock Market Movement Jngwe Chen Mng Chen Nan Ye [email protected] [email protected] [email protected] Abstract - Stock market s one of the most complcated systems
An Interest-Oriented Network Evolution Mechanism for Online Communities
An Interest-Orented Network Evoluton Mechansm for Onlne Communtes Cahong Sun and Xaopng Yang School of Informaton, Renmn Unversty of Chna, Bejng 100872, P.R. Chna {chsun,yang}@ruc.edu.cn Abstract. Onlne
The OC Curve of Attribute Acceptance Plans
The OC Curve of Attrbute Acceptance Plans The Operatng Characterstc (OC) curve descrbes the probablty of acceptng a lot as a functon of the lot s qualty. Fgure 1 shows a typcal OC Curve. 10 8 6 4 1 3 4
Modeling and computing constrained
F EAURE A RICLE HE COMPUAION OF CONSRAINED DYNAMICAL SYSEMS: MACHING PHYSICAL MODELING WIH NUMERICAL MEHODS Reseaches have nvestgated modelng and computaton of constaned dynamcal systems, but scentsts
The transport performance evaluation system building of logistics enterprises
Jounal of Industial Engineeing and Management JIEM, 213 6(4): 194-114 Online ISSN: 213-953 Pint ISSN: 213-8423 http://dx.doi.og/1.3926/jiem.784 The tanspot pefomance evaluation system building of logistics
Modeling and Verifying a Price Model for Congestion Control in Computer Networks Using PROMELA/SPIN
Modeling and Veifying a Pice Model fo Congestion Contol in Compute Netwoks Using PROMELA/SPIN Clement Yuen and Wei Tjioe Depatment of Compute Science Univesity of Toonto 1 King s College Road, Toonto,
Cloud Service Reliability: Modeling and Analysis
Cloud Sevice eliability: Modeling and Analysis Yuan-Shun Dai * a c, Bo Yang b, Jack Dongaa a, Gewei Zhang c a Innovative Computing Laboatoy, Depatment of Electical Engineeing & Compute Science, Univesity
Ilona V. Tregub, ScD., Professor
Investment Potfolio Fomation fo the Pension Fund of Russia Ilona V. egub, ScD., Pofesso Mathematical Modeling of Economic Pocesses Depatment he Financial Univesity unde the Govenment of the Russian Fedeation
est using the formula I = Prt, where I is the interest earned, P is the principal, r is the interest rate, and t is the time in years.
9.2 Inteest Objectives 1. Undestand the simple inteest fomula. 2. Use the compound inteest fomula to find futue value. 3. Solve the compound inteest fomula fo diffeent unknowns, such as the pesent value,
Reduced Pattern Training Based on Task Decomposition Using Pattern Distributor
> PNN05-P762 < Reduced Patten Taining Based on Task Decomposition Using Patten Distibuto Sheng-Uei Guan, Chunyu Bao, and TseNgee Neo Abstact Task Decomposition with Patten Distibuto (PD) is a new task
Discussion Papers. Thure Traber Claudia Kemfert
Dscusson Papes Thue Tabe Clauda Kemfet Impacts of the Geman Suppot fo Renewable Enegy on Electcty Pces, Emssons and Pofts: An Analyss Based on a Euopean Electcty Maket Model Beln, July 2007 Opnons expessed
benefit is 2, paid if the policyholder dies within the year, and probability of death within the year is ).
REVIEW OF RISK MANAGEMENT CONCEPTS LOSS DISTRIBUTIONS AND INSURANCE Loss and nsurance: When someone s subject to the rsk of ncurrng a fnancal loss, the loss s generally modeled usng a random varable or
OPINION DYNAMICS AND BOUNDED CONFIDENCE MODELS, ANALYSIS, AND SIMULATION
Jouna of Atfca Socetes and Soca Smuaton (JASSS) vo.5, no. 3, 02 http://jasss.soc.suey.ac.uk/5/3/2.htm OPINION DYNAMICS AND BOUNDED CONFIDENCE MODELS, ANALYSIS, AND SIMULATION Rane Hegsemann Depatment of
FAIR VALUATION OF VARIOUS PARTICIPATION SCHEMES IN LIFE INSURANCE ABSTRACT
FAIR VALUAION OF VARIOUS PARIIPAION SHEMES IN LIFE INSURANE PIERRE DEVOLDER AND INMAULADA DOMÍNGUEZ-FABIÁN BY Insttut des Scences Actuaelles, Unvesté atholque de Louvan, 6 ue des Wallons, 348 Louvan la
Tasmanian Greens MPs Reply to the Electricity Supply Industry Expert Panel: Powering Tasmania s Transition to a 100% Renewable Energy Future
T a s ma n a ng eensmps Repl yt ot hee l ec t c t ys uppl yi ndus t ye x pe tpa nel Powe ngat ans t ont oa1 0 0 %Re ne wabl ee ne gyf ut u e Rel ea s edaugus t2012 Aut ho s edbyn c kmc K m MP, Pa l a menthous
Module 2 LOSSLESS IMAGE COMPRESSION SYSTEMS. Version 2 ECE IIT, Kharagpur
Module LOSSLESS IMAGE COMPRESSION SYSTEMS Lesson 3 Lossless Compresson: Huffman Codng Instructonal Objectves At the end of ths lesson, the students should be able to:. Defne and measure source entropy..
A powerful tool designed to enhance innovation and business performance
A powerful tool desgned to enhance nnovaton and busness performance The LEGO Foundaton has taken over the responsblty for the LEGO SERIOUS PLAY method. Ths change wll help create the platform for the contnued
GMA/FPA SmartBrief. ASTA SmartBrief. The premier source of daily news delivered to the desktops of travel agents and executives.
GMA/FPA SmartBref ASTA SmartBref The premer source of daly news delvered to the desktops of travel agents and executves. GMA/FPA SmartBref 2011 Meda Kt Subscrber Profle Reach Travel Agency Professonals
Office Leasing Guide WHAT YOU NEED TO KNOW BEFORE YOU SIGN. Colliers International Office Leasing Guide P. 1
Office Leasing Guide WHAT YOU NEED TO KNOW BEFORE YOU SIGN Collies Intenational Office Leasing Guide P. 1 THE OFFICE LEASING GUIDE This step-by-step guide has been assembled to eflect Collies Intenational
Multiple-Period Attribution: Residuals and Compounding
Multple-Perod Attrbuton: Resduals and Compoundng Our revewer gave these authors full marks for dealng wth an ssue that performance measurers and vendors often regard as propretary nformaton. In 1994, Dens
DOCTORATE DEGREE PROGRAMS
DOCTORATE DEGREE PROGRAMS Application Fo Admission 2015-2016 5700 College Road, Lisle, Illinois 60532 Enollment Cente Phone: (630) 829-6300 Outside Illinois: (888) 829-6363 FAX: (630) 829-6301 Email: [email protected]
Define What Type of Trader Are you?
Define What Type of Tade Ae you? Boke Nightmae srs Tend Ride By Vladimi Ribakov Ceato of Pips Caie 20 of June 2010 1 Disclaime and Risk Wanings Tading any financial maket involves isk. The content of this
Spirotechnics! September 7, 2011. Amanda Zeringue, Michael Spannuth and Amanda Zeringue Dierential Geometry Project
Spiotechnics! Septembe 7, 2011 Amanda Zeingue, Michael Spannuth and Amanda Zeingue Dieential Geomety Poject 1 The Beginning The geneal consensus of ou goup began with one thought: Spiogaphs ae awesome.
9:6.4 Sample Questions/Requests for Managing Underwriter Candidates
9:6.4 INITIAL PUBLIC OFFERINGS 9:6.4 Sample Questions/Requests fo Managing Undewite Candidates Recent IPO Expeience Please povide a list of all completed o withdawn IPOs in which you fim has paticipated
LIFETIME INCOME OPTIONS
LIFETIME INCOME OPTIONS May 2011 by: Marca S. Wagner, Esq. The Wagner Law Group A Professonal Corporaton 99 Summer Street, 13 th Floor Boston, MA 02110 Tel: (617) 357-5200 Fax: (617) 357-5250 www.ersa-lawyers.com
883 Brochure A5 GENE ss vernis.indd 1-2
ess x a eu / u e a. p o.eu c e / :/ http EURAXESS Reseaches in Motion is the gateway to attactive eseach caees in Euope and to a pool of wold-class eseach talent. By suppoting the mobility of eseaches,
Voltage ( = Electric Potential )
V-1 of 9 Voltage ( = lectic Potential ) An electic chage altes the space aound it. Thoughout the space aound evey chage is a vecto thing called the electic field. Also filling the space aound evey chage
