A Study on Secure Data Storage Strategy in Cloud Computing
|
|
|
- Alberta Kennedy
- 9 years ago
- Views:
Transcription
1 Journal of Convergence Informaton Technology Volume 5, Number 7, Setember 00 A Study on Secure Data Storage Strategy n Cloud Comutng Danwe Chen, Yanjun He, Frst Author College of Comuter Technology, Nanjng Unversty of Posts and Telecommuncatons, [email protected] *,Corresondng Author College of Comuter Technology, Nanjng Unversty of Posts and Telecommuncatons,[email protected] do: 0.456/jct.vol5.ssue7.3 Abstract Based on fundamental theores of equatons n algebra, n congruence surlus rncle n elementary number theory, and the Abhshe s onlne data storage algorthm, we roose a secure data storage strategy n cloud comutng. The strategy slts data d nto sectons usng the data slttng algorthm, ensures hgh data securty by smlfyng equaton solutons, and at the same tme, guarantees hghly relable data usng the coeffcents generated by the slttng algorthm. Keywords: Cloud comutng, Data arttonng, Dstrbuted storage, Securty strategy. Introducton Cloud comutng manly rovdes three nds of servces: IaaS (Infrastructure as a Servce), PaaS (Platform as a Servce) and SaaS (Software as a Servce) []. The major dfference between servce based on cloud comutng and tradtonal servce s that user data s stored not n the local server, but n the dstrbuted storage system of the servce suler. In many cases, however, users (esecally busness users) have hgh demands regardng data securty and relablty. Generally, n tradtonal data rotecton methods, lantext data s stored after encryton. In ractcal alcatons, symmetrc encryton algorthms, such as DES and AES, are usually adoted because of ther effcency. Although data stored n the cloud server are encryted, encryton algorthm rovdes relatvely lower securty. Therefore, encryted data are very lely to be vulnerable to attacs [] and busness nterests become comromsed once the server s nvaded. In ths aer, we roose a secure data storage strategy caable of addressng the shortcomngs of tradtonal data rotecton methods and mrovng securty and relablty n cloud comutng.. Data securty storage strateges Secure data storage n cloud comutng s realzed on the bass of a dstrbuted system. After reachng the cloud, data can be randomly stored n any one or more servers. Accordng to characterstcs of the storage mode, each server n the dstrbuted system can be abstracted as a storage node. Suose there are m servers n the system, wrtten as: S{ s, s,.., s m }. Suose the lantext data set s d. The equatons based on the slttng algorthm s aled to data set d to generate (<m) data, wrtten as:{ d, d,.., d } Partton(d) n whch Partton() s the data slttng algorthm llustrated n detal n Secton 3 of ths aer. The generated data blocs are then slt, and servers are randomly chosen out of m servers, whch can be exressed as the followng formula:{ d, d,.., d }ma(s), where S{ s, s,.., s m }. The data restoraton rocess can be exressed as d d d d mod, where s a large rme number. The core of the secure storage strategy s ts data slttng algorthm, whch s an extenson of fundamental theores of equatons n algebra, n congruence surlus rncle n elementary number theory[3], ey sharng of Shamr[4] and onlne data storage algorthm of Abhshe[5,6], through whch data slttng storage s realzed. The safety of the strategy manly deends on two asects. Frst, s the dffculty of decodng the data slttng algorthm. The second, s that because storage servers are randomly chosen after data slttng, encryted data cannot be comletely obtaned by attacng one or more servers, mang decodng even more dffcult. 75
2 A Study on Secure Data Storage Strategy n Cloud Comutng Danwe Chen, Yanjun He In addton, the strategy has nherent advantages n ts fault tolerance comared wth tradtonal data rotecton methods. In cloud comutng, no assumtons on the robustness of any node n the dstrbuted system can be made. Varous unexected factors can all result n temorary naccessblty of some nodes or ermanent naccessblty of data. In such a case, tradtonal data rotecton means are often owerless. The secure strategy roosed n ths aer ensures that data can be restored even when some nodes fal, whch consderably mroves system relablty. 3. Core algorthm of the secure strategy 3. Data slttng algorthm In crytograhy, t s much more convenence for constructng an somorhc quotent rng as a comlex feld than algebrac oeraton when wth the same structure [7]. We construct an somorhc quotent rng wth the same structure as comlex feld Ζ (where s a large rme number), and a congruence equaton exressed as: x + a x + d 0 mod () where d Ζ s the data to be slt, 0 a -, and 0 d - (Note: d here can be -d). Accordng to the fundamental rncle of equatons n algebra, Equaton () and{ r,... } C (C has roots. These roots are exressed as: x + a x + d 0 mod s a set of comlex numbers),the Equaton () can be rewrtten as: ( x r ) 0 mod () where r -. These r are data blocs generated after the slttng. Equatons () and () show that d s ndeendent of varable x. Therefore, the followng can be generated: d mod (3) r 3. Hgh effcency of the algorthm Hgh effcency of the algorthm s llustrated through two asects: data slttng and storage rocess and data restoraton rocess. In the data slttng and storage rocess, slttng algorthm aled to data set d generates blocs of data r,.... Then, these data blocs are stored n a randomly chosen server. In addton, coeffcent a s stored as bacu nformaton. The rocess manly ncludes the followng oeratons:. - numbers r,... are randomly chosen wthn the fnte feld Ζ.. r d ( r r r ) mod s calculated. 3. Coeffcents a s calculated by constructng olynomal (), n whch () s shown n the followng: ( ) ( x r )( x r )...( x r ) mod x + a x + a x ax + a 0 mod From the calculaton rocess above, we can nfer that multlcatons, one modular nverson, and the multlcaton of () olynomal to tmes are needed for the algorthm to generate blocs of data. Therefore, the tme comlexty s O()[8]. For data decodng and restoraton, the user retreves data of each bloc R{ r,... } from relevant servers accordng to the locally-stored data oston ndex, and then obtans the lantext data by calculatng d r r r mod. Clearly, tme comlexty of the decodng rocess, the same as that of the encryton rocess, s O(). Therefore, executon effcency of the algorthm, whether n an encryton or decodng rocess, s rather hgh much hgher than n asymmetrcal encryton algorthm. 76
3 3.3 Securty of the algorthm Journal of Convergence Informaton Technology Volume 5, Number 7, Setember 00 Theorem. If coeffcent a ( -) s randomly chosen and s zero when - coeffcents are dfferent, the robablty of generatng authentc data set d s less than /, even when the roots of the - equatons are nown. Proof: Gven data set d, the coeffcent n Equaton () s chosen wth the followng method to ensure that the equaton has roots: - roots r,... are randomly chosen n fnte feld Ζ. The -th root can be obtaned wth the followng equaton: r d ( r r r ) mod (4) As the roots are randomly dstrbuted n Ζ [9], the robablty of obtanng r wthout nowng d s /. Conversely, the robablty of obtanng d wthout nowng r s also /. The followng exlanaton s resented to dscuss why the coeffcents cannot be zero at the same tme. Suose a 0 a... a 0, Equaton () s converted nto x + d 0 mod (5). Based on n congruence surlus rncle n elementary number theory, we can nfer that, for Equaton (5) to have roots, the necessary condtons are GCD(-,); GCD(d,); and b Ζ. Data set d s the -th ower of b. Usually, ( s+) s chosen, n whch s N. In such a case, there are certan requrements on data set d, as well, whch s unaccetable n ractcal alcaton. Even f d satsfes relevant requrements, the attacer can easly calculate orgnal data set d, by merely determnng the data of one bloc generated by the slttng and the number of blocs. In ths case, securty s rather oor. Therefore, the algorthm requres that the chosen coeffcents cannot be zero at the same tme. Theorem. If the attacer nvades a storage node, steals data bloc r, and wants to restore data set d wth aggressve methods based on r and decode coeffcents of ( ) olynomal n fnte feld Ζ, the requred tme comlexty s Ω( ( ) ).! Proof: Suose the coeffcent set of Equaton () s A{ a 0, a }, n whch 0 a -. Each grou of examles of a values are corresondent to the only seres of solutons of ts root set R{ r,... }, and vce versa. To solve the coeffcents of ( ) olynomal, Equaton (3) can be used. Suose the attacer obtans r ; he needs to randomly choose - numbers (Note: - numbers here can be reeated) from the set S{0,,,,-}. Clearly, tmes of calculatons that the attacer needs can be exressed as the followng formula: + ( + )! ( )(! )! ( + )( + 3 )...( + )( )! ( + )( + 3 )...( + )! ( )! ( )( )! ( )! In ractcal alcaton, >>>>. Such a calculaton amount s far larger than the rocessng ablty of manstream comuters and ensures that t cannot be decoded n current comutng envronments. 4. Relablty of the secure data storage strategy One of the advantages dstngushng the roosed secure strategy from tradtonal data rotecton s that t rovdes hghly relable data rotecton. When slttng lantext data nto data blocs, we obtan data blocs r,... and - coeffcents a of equatons. These coeffcents are stored n the 77
4 A Study on Secure Data Storage Strategy n Cloud Comutng Danwe Chen, Yanjun He server as bacu nformaton [0]. In an actual envronment, one or more of the nodes storng data blocs cannot be accessed because of the roblems of the networ or the server tself. Now data set d cannot be restored wth Equaton (5). In such case, vstng only one of the nodes s needed. Suose the data were retreved from node r.coeffcents a are then retreved from the server of the bacu coeffcent. r and the coeffcents are substtuted nto Equaton (3), and lantext data set d can be obtaned. Therefore, the strategy rovdes a sold method for rotectng the data stored n the dstrbuted system. 5. A comarson between the secure storage strategy and tradtonal data rotecton methods 5. Securty of the analyss strategy of the exerment The securty of data slttng algorthm s related to ey length. Furthermore, t also ncreases exonentally wth the ncrease n the number of data blocs. However, tradtonal data rotecton methods usually adot symmetrcal encryton, such as DES[], the securty of whch merely deends on ey length. For a comuter caable of rocessng one mllon nstructons wthn a second, wth the same ey length, the decodng tme of the slttng encryton method sgnfcantly ncreases wth the ncrease n the number of data blocs, whereas the decodng tme of the symmetrcal encryton algorthm remans almost the same (Fgure ). In ractcal analyss, the ey length of the algorthm s usually determned as 9 bts. The number of data blocs s 6. Its securty s 8 tmes hgher than that of tradtonal methods, and ts relablty s 50 tmes hgher. 5. Relablty of the analyss strategy of the exerment The relablty of the secure data storage strategy deends on the bacu data coeffcents. When one or more nodes cannot be accessed, the secure strategy can ensure that the data wll be restored as long as one of the nodes can be accessed. However, tradtonal data storage methods requre all the data n the nodes to be retreved. Thus, the more blocs the data are slt nto, the oorer the relablty of tradtonal data storage. Fgure shows that the rato of the relablty of the slttng storage strategy to that of tradtonal data rotecton methods ncreases exonentally, wth the ncrease n the number of data slttng blocs. Therefore, the secure storage strategy has tremendous advantages n terms of relablty. Fgure. Comarson between decodng tme of slttng encryton and that of encryton decodng. Fgure. Analyss of the relablty of slttng storage. 78
5 Journal of Convergence Informaton Technology Volume 5, Number 7, Setember Concluson Based on relevant rncles n algebra and elementary number theory, ey sharng of Shamr and onlne data storage algorthm of Abhshe, ths aer rooses a secure data storage strategy alcable to the dstrbuted system n cloud comutng, whch successfully solves varous data securty roblems encountered by servce modes based on cloud comutng. In terms of data securty, the strategy enhances the decodng dffculty tenfold wth the ncreased number of data blocs. In addton, ts fault tolerance s hgher than that of the sngle-node storage method by hundreds of tmes. The secure strategy, however, also has ts shortcomngs, such as much data redundancy. These shortcomngs can be taen as mrovement drectons of subsequent research. 7. Reference [] J.Rttnghouse,J.Ransome, Cloud Comutng: Imlementaton, Management, and Securty, 009. [] Prasanta GogoB, Borah,D K Bhattacharyya, Anomaly Detecton Analyss of Intruson Data usng Suervsed & Unsuervsed Aroach, Journal of AICIT, AICIT, vol.5, no.,.95-, 00. [3] K.q. FENG Number Theory and Crytograhy, Scence Press, Chna, 007. [4] A.Shamr How to Share a Secret[J]. Communcatons of the ACM, vol.,no.,.6-63, 979. [5] M.H. Dehord, S. Mashhad, New effcent and ractcal verfable mult-secret sharng schemes, Informaton Scences, vol.9, no.6 74, 008. [6] A.Parah, S. Ka. Onlne data storage usng mlct securty, Informaton Scences, vol.79, no , 009. [7] T. Moon, Error Correcton Codng: Mathematcal Methods and Algorthms, Wley, USA, 005. [8] A. Aho,J. Hocroft, J. Ullman, The Desgn and Analyss of Comuter Algorthms, Addson- Wesley, USA,974. [9] S. Ka, A cubc ublc-ey transformaton,crcuts, Systems and Sgnal Processng, vol.6, , 007. [0] Anests A. Totss, K-grd: A Structure for Storage and Retreval of Affectve Knowledge, Journal of AICIT, AICIT, vol. 4, no.,.6-30, 009. [] Bruce Schneer, Aled Crytograhy, John Wley & Sons, USA,
A Structure Preserving Database Encryption Scheme
A Structure Preservng Database Encryton Scheme Yuval Elovc, Ronen Wasenberg, Erez Shmuel, Ehud Gudes Ben-Guron Unversty of the Negev, Faculty of Engneerng, Deartment of Informaton Systems Engneerng, Postfach
Inter-domain Alliance Authentication Protocol Based on Blind Signature
Internatonal Journal of Securty Its Alcatons Vol9 No2 (205) 97-206 htt://ddoorg/04257/sa205929 Inter-doman Allance Authentcaton Protocol Based on Blnd Sgnature Zhang Je Zhang Q-kun Gan Yong Yn Yfeng Tan
A Secure Password-Authenticated Key Agreement Using Smart Cards
A Secure Password-Authentcated Key Agreement Usng Smart Cards Ka Chan 1, Wen-Chung Kuo 2 and Jn-Chou Cheng 3 1 Department of Computer and Informaton Scence, R.O.C. Mltary Academy, Kaohsung 83059, Tawan,
BERNSTEIN POLYNOMIALS
On-Lne Geometrc Modelng Notes BERNSTEIN POLYNOMIALS Kenneth I. Joy Vsualzaton and Graphcs Research Group Department of Computer Scence Unversty of Calforna, Davs Overvew Polynomals are ncredbly useful
Can Auto Liability Insurance Purchases Signal Risk Attitude?
Internatonal Journal of Busness and Economcs, 2011, Vol. 10, No. 2, 159-164 Can Auto Lablty Insurance Purchases Sgnal Rsk Atttude? Chu-Shu L Department of Internatonal Busness, Asa Unversty, Tawan Sheng-Chang
RESEARCH ON DUAL-SHAKER SINE VIBRATION CONTROL. Yaoqi FENG 1, Hanping QIU 1. China Academy of Space Technology (CAST) yaoqi.feng@yahoo.
ICSV4 Carns Australa 9- July, 007 RESEARCH ON DUAL-SHAKER SINE VIBRATION CONTROL Yaoq FENG, Hanpng QIU Dynamc Test Laboratory, BISEE Chna Academy of Space Technology (CAST) [email protected] Abstract
The Development of Web Log Mining Based on Improve-K-Means Clustering Analysis
The Development of Web Log Mnng Based on Improve-K-Means Clusterng Analyss TngZhong Wang * College of Informaton Technology, Luoyang Normal Unversty, Luoyang, 471022, Chna [email protected] Abstract.
Module 2 LOSSLESS IMAGE COMPRESSION SYSTEMS. Version 2 ECE IIT, Kharagpur
Module LOSSLESS IMAGE COMPRESSION SYSTEMS Lesson 3 Lossless Compresson: Huffman Codng Instructonal Objectves At the end of ths lesson, the students should be able to:. Defne and measure source entropy..
Study on Model of Risks Assessment of Standard Operation in Rural Power Network
Study on Model of Rsks Assessment of Standard Operaton n Rural Power Network Qngj L 1, Tao Yang 2 1 Qngj L, College of Informaton and Electrcal Engneerng, Shenyang Agrculture Unversty, Shenyang 110866,
Analysis and Modeling of Buck Converter in Discontinuous-Output-Inductor-Current Mode Operation *
Energy and Power Engneerng, 3, 5, 85-856 do:.436/ee.3.54b63 Publshed Onlne July 3 (htt://www.scr.org/journal/ee) Analyss and Modelng of Buck Converter n Dscontnuous-Outut-Inductor-Current Mode Oeraton
DEFINING %COMPLETE IN MICROSOFT PROJECT
CelersSystems DEFINING %COMPLETE IN MICROSOFT PROJECT PREPARED BY James E Aksel, PMP, PMI-SP, MVP For Addtonal Informaton about Earned Value Management Systems and reportng, please contact: CelersSystems,
"Research Note" APPLICATION OF CHARGE SIMULATION METHOD TO ELECTRIC FIELD CALCULATION IN THE POWER CABLES *
Iranan Journal of Scence & Technology, Transacton B, Engneerng, ol. 30, No. B6, 789-794 rnted n The Islamc Republc of Iran, 006 Shraz Unversty "Research Note" ALICATION OF CHARGE SIMULATION METHOD TO ELECTRIC
Chosen Public Key and Ciphertext Secure Proxy Re-encryption Schemes
Internatonal Journal of Dgtal ontent Technology and ts Alcatons Volume 4 Number 9 December 00 hosen Publc Key and hertext Secure Proxy Re-encryton Schemes Lmng Fang Wlly Suslo Yongun Ren huneng Ge and
A hybrid global optimization algorithm based on parallel chaos optimization and outlook algorithm
Avalable onlne www.ocpr.com Journal of Chemcal and Pharmaceutcal Research, 2014, 6(7):1884-1889 Research Artcle ISSN : 0975-7384 CODEN(USA) : JCPRC5 A hybrd global optmzaton algorthm based on parallel
Feature selection for intrusion detection. Slobodan Petrović NISlab, Gjøvik University College
Feature selecton for ntruson detecton Slobodan Petrovć NISlab, Gjøvk Unversty College Contents The feature selecton problem Intruson detecton Traffc features relevant for IDS The CFS measure The mrmr measure
The OC Curve of Attribute Acceptance Plans
The OC Curve of Attrbute Acceptance Plans The Operatng Characterstc (OC) curve descrbes the probablty of acceptng a lot as a functon of the lot s qualty. Fgure 1 shows a typcal OC Curve. 10 8 6 4 1 3 4
Improved SVM in Cloud Computing Information Mining
Internatonal Journal of Grd Dstrbuton Computng Vol.8, No.1 (015), pp.33-40 http://dx.do.org/10.1457/jgdc.015.8.1.04 Improved n Cloud Computng Informaton Mnng Lvshuhong (ZhengDe polytechnc college JangSu
An Alternative Way to Measure Private Equity Performance
An Alternatve Way to Measure Prvate Equty Performance Peter Todd Parlux Investment Technology LLC Summary Internal Rate of Return (IRR) s probably the most common way to measure the performance of prvate
A Performance Analysis of View Maintenance Techniques for Data Warehouses
A Performance Analyss of Vew Mantenance Technques for Data Warehouses Xng Wang Dell Computer Corporaton Round Roc, Texas Le Gruenwald The nversty of Olahoma School of Computer Scence orman, OK 739 Guangtao
Monitoring Network Traffic to Detect Stepping-Stone Intrusion
Montorng etork Traffc to Detect Steng-Stone Intruson Janhua Yang, Byong Lee, Stehen S. H. Huang Deartment of Math and Comuter Scence, Bennett College E-mal: {jhyang, blee }@bennett.edu Deartment of Comuter
8.5 UNITARY AND HERMITIAN MATRICES. The conjugate transpose of a complex matrix A, denoted by A*, is given by
6 CHAPTER 8 COMPLEX VECTOR SPACES 5. Fnd the kernel of the lnear transformaton gven n Exercse 5. In Exercses 55 and 56, fnd the mage of v, for the ndcated composton, where and are gven by the followng
Forecasting the Direction and Strength of Stock Market Movement
Forecastng the Drecton and Strength of Stock Market Movement Jngwe Chen Mng Chen Nan Ye [email protected] [email protected] [email protected] Abstract - Stock market s one of the most complcated systems
CHOLESTEROL REFERENCE METHOD LABORATORY NETWORK. Sample Stability Protocol
CHOLESTEROL REFERENCE METHOD LABORATORY NETWORK Sample Stablty Protocol Background The Cholesterol Reference Method Laboratory Network (CRMLN) developed certfcaton protocols for total cholesterol, HDL
How To Calculate The Accountng Perod Of Nequalty
Inequalty and The Accountng Perod Quentn Wodon and Shlomo Ytzha World Ban and Hebrew Unversty September Abstract Income nequalty typcally declnes wth the length of tme taen nto account for measurement.
Efficient Project Portfolio as a tool for Enterprise Risk Management
Effcent Proect Portfolo as a tool for Enterprse Rsk Management Valentn O. Nkonov Ural State Techncal Unversty Growth Traectory Consultng Company January 5, 27 Effcent Proect Portfolo as a tool for Enterprse
Calculating the high frequency transmission line parameters of power cables
< ' Calculatng the hgh frequency transmsson lne parameters of power cables Authors: Dr. John Dcknson, Laboratory Servces Manager, N 0 RW E B Communcatons Mr. Peter J. Ncholson, Project Assgnment Manager,
1. Fundamentals of probability theory 2. Emergence of communication traffic 3. Stochastic & Markovian Processes (SP & MP)
6.3 / -- Communcaton Networks II (Görg) SS20 -- www.comnets.un-bremen.de Communcaton Networks II Contents. Fundamentals of probablty theory 2. Emergence of communcaton traffc 3. Stochastc & Markovan Processes
Load Balancing of Parallelized Information Filters
IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, VOL. XXX, NO. XX, XXXXXXX 2001 1 Load Balancng of Parallelzed Informaton Flters Nel C. Rowe, Member, IEEE Comuter Socety, and Amr Zaky, Member, IEEE
Calculation of Sampling Weights
Perre Foy Statstcs Canada 4 Calculaton of Samplng Weghts 4.1 OVERVIEW The basc sample desgn used n TIMSS Populatons 1 and 2 was a two-stage stratfed cluster desgn. 1 The frst stage conssted of a sample
Data Mining from the Information Systems: Performance Indicators at Masaryk University in Brno
Data Mnng from the Informaton Systems: Performance Indcators at Masaryk Unversty n Brno Mkuláš Bek EUA Workshop Strasbourg, 1-2 December 2006 1 Locaton of Brno Brno EUA Workshop Strasbourg, 1-2 December
An Interest-Oriented Network Evolution Mechanism for Online Communities
An Interest-Orented Network Evoluton Mechansm for Onlne Communtes Cahong Sun and Xaopng Yang School of Informaton, Renmn Unversty of Chna, Bejng 100872, P.R. Chna {chsun,yang}@ruc.edu.cn Abstract. Onlne
A New Task Scheduling Algorithm Based on Improved Genetic Algorithm
A New Task Schedulng Algorthm Based on Improved Genetc Algorthm n Cloud Computng Envronment Congcong Xong, Long Feng, Lxan Chen A New Task Schedulng Algorthm Based on Improved Genetc Algorthm n Cloud Computng
Applied Research Laboratory. Decision Theory and Receiver Design
Decson Theor and Recever Desgn Sgnal Detecton and Performance Estmaton Sgnal Processor Decde Sgnal s resent or Sgnal s not resent Nose Nose Sgnal? Problem: How should receved sgnals be rocessed n order
Linear Circuits Analysis. Superposition, Thevenin /Norton Equivalent circuits
Lnear Crcuts Analyss. Superposton, Theenn /Norton Equalent crcuts So far we hae explored tmendependent (resste) elements that are also lnear. A tmendependent elements s one for whch we can plot an / cure.
A DATA MINING APPLICATION IN A STUDENT DATABASE
JOURNAL OF AERONAUTICS AND SPACE TECHNOLOGIES JULY 005 VOLUME NUMBER (53-57) A DATA MINING APPLICATION IN A STUDENT DATABASE Şenol Zafer ERDOĞAN Maltepe Ünversty Faculty of Engneerng Büyükbakkalköy-Istanbul
A Design Method of High-availability and Low-optical-loss Optical Aggregation Network Architecture
A Desgn Method of Hgh-avalablty and Low-optcal-loss Optcal Aggregaton Network Archtecture Takehro Sato, Kuntaka Ashzawa, Kazumasa Tokuhash, Dasuke Ish, Satoru Okamoto and Naoak Yamanaka Dept. of Informaton
AN EFFICIENT GROUP AUTHENTICATION FOR GROUP COMMUNICATIONS
Internatonal Journal of Network Securty & Its Applcatons (IJNSA), Vol.5, No.3, May 2013 AN EFFICIENT GROUP AUTHENTICATION FOR GROUP COMMUNICATIONS Len Harn 1 and Changlu Ln 2 1 Department of Computer Scence
Efficient Computation of Optimal, Physically Valid Motion
Vol. xx No. xx,.1 5, 200x 1 Effcent Comutaton of Otmal, Physcally Vald Moton Anthony C. Fang 1 and Nancy S. Pollard 2 1 Deartment of Comuter Scence, Natonal Unversty of Sngaore 2 Robotcs Insttute, Carnege
Optimal maintenance of a production-inventory system with continuous repair times and idle periods
Proceedngs o the 3 Internatonal Conerence on Aled Mathematcs and Comutatonal Methods Otmal mantenance o a roducton-nventory system wth contnuous rear tmes and dle erods T. D. Dmtrakos* Deartment o Mathematcs
Minimal Coding Network With Combinatorial Structure For Instantaneous Recovery From Edge Failures
Mnmal Codng Network Wth Combnatoral Structure For Instantaneous Recovery From Edge Falures Ashly Joseph 1, Mr.M.Sadsh Sendl 2, Dr.S.Karthk 3 1 Fnal Year ME CSE Student Department of Computer Scence Engneerng
A Dynamic Load Balancing for Massive Multiplayer Online Game Server
A Dynamc Load Balancng for Massve Multplayer Onlne Game Server Jungyoul Lm, Jaeyong Chung, Jnryong Km and Kwanghyun Shm Dgtal Content Research Dvson Electroncs and Telecommuncatons Research Insttute Daejeon,
SIMPLE LINEAR CORRELATION
SIMPLE LINEAR CORRELATION Smple lnear correlaton s a measure of the degree to whch two varables vary together, or a measure of the ntensty of the assocaton between two varables. Correlaton often s abused.
Learning User's Scheduling Criteria in a Personal Calendar Agent!
Learnng User's Schedulng Crtera n a Personal Calendar Agent! Shh-ju Ln and Jane Yung-jen Hsu Deartment of Comuter Scence and Informaton Engneerng Natonal Tawan Unversty 1 Sec 4 Roosevelt Road, Tae, 106
Proactive Secret Sharing Or: How to Cope With Perpetual Leakage
Proactve Secret Sharng Or: How to Cope Wth Perpetual Leakage Paper by Amr Herzberg Stanslaw Jareck Hugo Krawczyk Mot Yung Presentaton by Davd Zage What s Secret Sharng Basc Idea ((2, 2)-threshold scheme):
Adaptive Fractal Image Coding in the Frequency Domain
PROCEEDINGS OF INTERNATIONAL WORKSHOP ON IMAGE PROCESSING: THEORY, METHODOLOGY, SYSTEMS AND APPLICATIONS 2-22 JUNE,1994 BUDAPEST,HUNGARY Adaptve Fractal Image Codng n the Frequency Doman K AI UWE BARTHEL
On-Line Fault Detection in Wind Turbine Transmission System using Adaptive Filter and Robust Statistical Features
On-Lne Fault Detecton n Wnd Turbne Transmsson System usng Adaptve Flter and Robust Statstcal Features Ruoyu L Remote Dagnostcs Center SKF USA Inc. 3443 N. Sam Houston Pkwy., Houston TX 77086 Emal: [email protected]
Evaluation of the information servicing in a distributed learning environment by using monitoring and stochastic modeling
MultCraft Internatonal Journal of Engneerng, Scence and Technology Vol, o, 9, -4 ITERATIOAL JOURAL OF EGIEERIG, SCIECE AD TECHOLOGY wwwest-ngcom 9 MultCraft Lmted All rghts reserved Evaluaton of the nformaton
+ + + - - This circuit than can be reduced to a planar circuit
MeshCurrent Method The meshcurrent s analog of the nodeoltage method. We sole for a new set of arables, mesh currents, that automatcally satsfy KCLs. As such, meshcurrent method reduces crcut soluton to
Recurrence. 1 Definitions and main statements
Recurrence 1 Defntons and man statements Let X n, n = 0, 1, 2,... be a MC wth the state space S = (1, 2,...), transton probabltes p j = P {X n+1 = j X n = }, and the transton matrx P = (p j ),j S def.
Real-Time Traffic Signal Intelligent Control with Transit-Priority
738 JOURNAL OF SOFTWARE, VOL. 7, NO. 8, AUGUST 202 Real-Tme Traffc Sgnal Intellgent ontrol wth Transt-Prorty Xanyan Kuang School of vl Engneerng and Transortaton, South hna Unversty of Technology, GuangZhou,
APPLICATION OF PROBE DATA COLLECTED VIA INFRARED BEACONS TO TRAFFIC MANEGEMENT
APPLICATION OF PROBE DATA COLLECTED VIA INFRARED BEACONS TO TRAFFIC MANEGEMENT Toshhko Oda (1), Kochro Iwaoka (2) (1), (2) Infrastructure Systems Busness Unt, Panasonc System Networks Co., Ltd. Saedo-cho
Watermark-based Provable Data Possession for Multimedia File in Cloud Storage
Vol.48 (CIA 014), pp.103-107 http://dx.do.org/10.1457/astl.014.48.18 Watermar-based Provable Data Possesson for Multmeda Fle n Cloud Storage Yongjun Ren 1,, Jang Xu 1,, Jn Wang 1,, Lmng Fang 3, Jeong-U
PERFORMANCE ANALYSIS OF PARALLEL ALGORITHMS
Software Analye PERFORMANCE ANALYSIS OF PARALLEL ALGORIHMS Felcan ALECU PhD, Unverty Lecturer, Economc Informatc Deartment, Academy of Economc Stude, Bucharet, Romana E-mal: [email protected] Abtract:
Adaptive Load Balancing of Parallel Applications with Multi-Agent Reinforcement Learning on Heterogeneous Systems
Adatve Load Balancng of Parallel Alcatons wth Mult-Agent Renforcement Learnng on Heterogeneous Systems Johan PAREN, Kata VERBEECK, Ann NOWE, Krs SEENHAU COMO, VUB Brussels, Belgum Emal: [email protected],
Forecasting the Demand of Emergency Supplies: Based on the CBR Theory and BP Neural Network
700 Proceedngs of the 8th Internatonal Conference on Innovaton & Management Forecastng the Demand of Emergency Supples: Based on the CBR Theory and BP Neural Network Fu Deqang, Lu Yun, L Changbng School
A Secure Nonrepudiable Threshold Proxy Signature Scheme with Known Signers
INFORMATICA, 2000, Vol. 11, No. 2, 137 144 137 2000 Insttute of Mathematcs and Informatcs, Vlnus A Secure Nonrepudable Threshold Proxy Sgnature Scheme wth Known Sgners Mn-Shang HWANG, Iuon-Chang LIN, Erc
Open Access A Load Balancing Strategy with Bandwidth Constraint in Cloud Computing. Jing Deng 1,*, Ping Guo 2, Qi Li 3, Haizhu Chen 1
Send Orders for Reprnts to [email protected] The Open Cybernetcs & Systemcs Journal, 2014, 8, 115-121 115 Open Access A Load Balancng Strategy wth Bandwdth Constrant n Cloud Computng Jng Deng 1,*,
Course outline. Financial Time Series Analysis. Overview. Data analysis. Predictive signal. Trading strategy
Fnancal Tme Seres Analyss Patrck McSharry [email protected] www.mcsharry.net Trnty Term 2014 Mathematcal Insttute Unversty of Oxford Course outlne 1. Data analyss, probablty, correlatons, vsualsaton
A High-confidence Cyber-Physical Alarm System: Design and Implementation
A Hgh-confdence Cyber-Physcal Alarm System: Desgn and Implementaton Longhua Ma 1,2, Tengka Yuan 1, Feng Xa 3, Mng Xu 1, Jun Yao 1, Meng Shao 4 1 Department of Control Scence and Engneerng, Zhejang Unversty,
Research Article Competition and Integration in Closed-Loop Supply Chain Network with Variational Inequality
Hndaw Publshng Cororaton Mathematcal Problems n Engneerng Volume 2012, Artcle ID 524809, 21 ages do:10.1155/2012/524809 Research Artcle Cometton and Integraton n Closed-Loo Suly Chan Network wth Varatonal
Canon NTSC Help Desk Documentation
Canon NTSC Help Desk Documentaton READ THIS BEFORE PROCEEDING Before revewng ths documentaton, Canon Busness Solutons, Inc. ( CBS ) hereby refers you, the customer or customer s representatve or agent
Research of Network System Reconfigurable Model Based on the Finite State Automation
JOURNAL OF NETWORKS, VOL., NO. 5, MAY 24 237 Research of Network System Reconfgurable Model Based on the Fnte State Automaton Shenghan Zhou and Wenbng Chang School of Relablty and System Engneerng, Behang
An Empirical Study of Search Engine Advertising Effectiveness
An Emprcal Study of Search Engne Advertsng Effectveness Sanjog Msra, Smon School of Busness Unversty of Rochester Edeal Pnker, Smon School of Busness Unversty of Rochester Alan Rmm-Kaufman, Rmm-Kaufman
A Novel Methodology of Working Capital Management for Large. Public Constructions by Using Fuzzy S-curve Regression
Novel Methodology of Workng Captal Management for Large Publc Constructons by Usng Fuzzy S-curve Regresson Cheng-Wu Chen, Morrs H. L. Wang and Tng-Ya Hseh Department of Cvl Engneerng, Natonal Central Unversty,
Extending Probabilistic Dynamic Epistemic Logic
Extendng Probablstc Dynamc Epstemc Logc Joshua Sack May 29, 2008 Probablty Space Defnton A probablty space s a tuple (S, A, µ), where 1 S s a set called the sample space. 2 A P(S) s a σ-algebra: a set
where the coordinates are related to those in the old frame as follows.
Chapter 2 - Cartesan Vectors and Tensors: Ther Algebra Defnton of a vector Examples of vectors Scalar multplcaton Addton of vectors coplanar vectors Unt vectors A bass of non-coplanar vectors Scalar product
A Multi-mode Image Tracking System Based on Distributed Fusion
A Mult-mode Image Tracng System Based on Dstrbuted Fuson Ln zheng Chongzhao Han Dongguang Zuo Hongsen Yan School of Electroncs & nformaton engneerng, X an Jaotong Unversty X an, Shaanx, Chna [email protected]
Using Series to Analyze Financial Situations: Present Value
2.8 Usng Seres to Analyze Fnancal Stuatons: Present Value In the prevous secton, you learned how to calculate the amount, or future value, of an ordnary smple annuty. The amount s the sum of the accumulated
THE DISTRIBUTION OF LOAN PORTFOLIO VALUE * Oldrich Alfons Vasicek
HE DISRIBUION OF LOAN PORFOLIO VALUE * Oldrch Alfons Vascek he amount of captal necessary to support a portfolo of debt securtes depends on the probablty dstrbuton of the portfolo loss. Consder a portfolo
Rate Monotonic (RM) Disadvantages of cyclic. TDDB47 Real Time Systems. Lecture 2: RM & EDF. Priority-based scheduling. States of a process
Dsadvantages of cyclc TDDB47 Real Tme Systems Manual scheduler constructon Cannot deal wth any runtme changes What happens f we add a task to the set? Real-Tme Systems Laboratory Department of Computer
How Sets of Coherent Probabilities May Serve as Models for Degrees of Incoherence
1 st Internatonal Symposum on Imprecse Probabltes and Ther Applcatons, Ghent, Belgum, 29 June 2 July 1999 How Sets of Coherent Probabltes May Serve as Models for Degrees of Incoherence Mar J. Schervsh
Project Networks With Mixed-Time Constraints
Project Networs Wth Mxed-Tme Constrants L Caccetta and B Wattananon Western Australan Centre of Excellence n Industral Optmsaton (WACEIO) Curtn Unversty of Technology GPO Box U1987 Perth Western Australa
IMPACT ANALYSIS OF A CELLULAR PHONE
4 th ASA & μeta Internatonal Conference IMPACT AALYSIS OF A CELLULAR PHOE We Lu, 2 Hongy L Bejng FEAonlne Engneerng Co.,Ltd. Bejng, Chna ABSTRACT Drop test smulaton plays an mportant role n nvestgatng
Data Broadcast on a Multi-System Heterogeneous Overlayed Wireless Network *
JOURNAL OF INFORMATION SCIENCE AND ENGINEERING 24, 819-840 (2008) Data Broadcast on a Mult-System Heterogeneous Overlayed Wreless Network * Department of Computer Scence Natonal Chao Tung Unversty Hsnchu,
Multi-sensor Data Fusion for Cyber Security Situation Awareness
Avalable onlne at www.scencedrect.com Proceda Envronmental Scences 0 (20 ) 029 034 20 3rd Internatonal Conference on Envronmental 3rd Internatonal Conference on Envronmental Scence and Informaton Applcaton
benefit is 2, paid if the policyholder dies within the year, and probability of death within the year is ).
REVIEW OF RISK MANAGEMENT CONCEPTS LOSS DISTRIBUTIONS AND INSURANCE Loss and nsurance: When someone s subject to the rsk of ncurrng a fnancal loss, the loss s generally modeled usng a random varable or
A Crossplatform ECG Compression Library for Mobile HealthCare Services
A Crossplatform ECG Compresson Lbrary for Moble HealthCare Servces Alexander Borodn, Yulya Zavyalova Department of Computer Scence Petrozavodsk State Unversty Petrozavodsk, Russa {aborod, yzavyalo}@cs.petrsu.ru
Performance Analysis and Coding Strategy of ECOC SVMs
Internatonal Journal of Grd and Dstrbuted Computng Vol.7, No. (04), pp.67-76 http://dx.do.org/0.457/jgdc.04.7..07 Performance Analyss and Codng Strategy of ECOC SVMs Zhgang Yan, and Yuanxuan Yang, School
An Analytical Model for Multi-tier Internet Services and Its Applications
An Analytcal Model for Mult-ter Internet Servces and Its Alcatons Bhuvan Urgaonkar, Govann Pacfc, Prashant Shenoy, Mke Sretzer, and Asser Tantaw Det. of Comuter Scence, Servce Management Mddleware Det.,
Chapter 3: Dual-bandwidth Data Path and BOCP Design
Chater 3: Dual-bandwdth Data Path and BOCP Desgn 3. Introducton The focus of ths thess s on the 4G wreless moble Internet networks to rovde data servces wthn the overlang areas of CDA2000-WLA networks.
Section 5.3 Annuities, Future Value, and Sinking Funds
Secton 5.3 Annutes, Future Value, and Snkng Funds Ordnary Annutes A sequence of equal payments made at equal perods of tme s called an annuty. The tme between payments s the payment perod, and the tme
Cloud-based Social Application Deployment using Local Processing and Global Distribution
Cloud-based Socal Applcaton Deployment usng Local Processng and Global Dstrbuton Zh Wang *, Baochun L, Lfeng Sun *, and Shqang Yang * * Bejng Key Laboratory of Networked Multmeda Department of Computer
Institute of Informatics, Faculty of Business and Management, Brno University of Technology,Czech Republic
Lagrange Multplers as Quanttatve Indcators n Economcs Ivan Mezník Insttute of Informatcs, Faculty of Busness and Management, Brno Unversty of TechnologCzech Republc Abstract The quanttatve role of Lagrange
What is Candidate Sampling
What s Canddate Samplng Say we have a multclass or mult label problem where each tranng example ( x, T ) conssts of a context x a small (mult)set of target classes T out of a large unverse L of possble
Energy-based Design of Steel Structures According to the Predefined Interstory Drift Ratio 1
Dgest 01, December 01, 1573-1593 Energy-based Desgn of Steel Structures Accordng to the Predefned Interstory Drft Rato 1 Onur ERTER* Özgür BOZDAĞ** ustafa DÜZGÜ*** ABSTRACT The methods whch take lace n
7.5. Present Value of an Annuity. Investigate
7.5 Present Value of an Annuty Owen and Anna are approachng retrement and are puttng ther fnances n order. They have worked hard and nvested ther earnngs so that they now have a large amount of money on
Section 5.4 Annuities, Present Value, and Amortization
Secton 5.4 Annutes, Present Value, and Amortzaton Present Value In Secton 5.2, we saw that the present value of A dollars at nterest rate per perod for n perods s the amount that must be deposted today
A NEW ACTIVE QUEUE MANAGEMENT ALGORITHM BASED ON NEURAL NETWORKS PI. M. Yaghoubi Waskasi [email protected]. M. J. Yazdanpanah [email protected].
A NEW ACTIVE QUEUE MANAGEMENT ALGORITHM BASED ON NEURAL NETWORKS M. Yaghoub Waskas [email protected] M. J. Yazdananah [email protected] N. Yazdan [email protected] Control and Intellgent Processng Center
The issue of June, 1925 of Industrial and Engineering Chemistry published a famous paper entitled
Revsta Cêncas & Tecnologa Reflectons on the use of the Mccabe and Thele method GOMES, João Fernando Perera Chemcal Engneerng Department, IST - Insttuto Superor Técnco, Torre Sul, Av. Rovsco Pas, 1, 1049-001
PKIS: practical keyword index search on cloud datacenter
Park et al. EURASIP Journal on Wreless Communcatons and Networkng 20, 20:64 http://jwcn.euraspjournals.com/content/20//64 RESEARCH Open Access PKIS: practcal keyword ndex search on cloud datacenter Hyun-A
Time Value of Money Module
Tme Value of Money Module O BJECTIVES After readng ths Module, you wll be able to: Understand smple nterest and compound nterest. 2 Compute and use the future value of a sngle sum. 3 Compute and use the
JCM_VN_AM003_ver01.0 Sectoral scope: 03
Sectoral scoe: 03 Jont Credtng Mechansm Aroved Methodology VN_AM003 Imrovng the energy effcency of commercal buldngs by utlzaton of hgh effcency equment A. Ttle of the methodology Imrovng the energy effcency
Finite Math Chapter 10: Study Guide and Solution to Problems
Fnte Math Chapter 10: Study Gude and Soluton to Problems Basc Formulas and Concepts 10.1 Interest Basc Concepts Interest A fee a bank pays you for money you depost nto a savngs account. Prncpal P The amount
Optimization Model of Reliable Data Storage in Cloud Environment Using Genetic Algorithm
Internatonal Journal of Grd Dstrbuton Computng, pp.175-190 http://dx.do.org/10.14257/gdc.2014.7.6.14 Optmzaton odel of Relable Data Storage n Cloud Envronment Usng Genetc Algorthm Feng Lu 1,2,3, Hatao
