Multi-file proofs of retrievability for cloud storage auditing

Size: px
Start display at page:

Download "Multi-file proofs of retrievability for cloud storage auditing"

Transcription

1 Mut-fe roofs of retrevabty for coud storage audtg B Wag a ad Xaojg Hog b a No96 West HuaYag Road, Iformato Egeerg Coege of Yagzhou Uversty, Yagzhou Cty, Jagsu Provce, PRCha b No5 South YagZJag Road, Yagzhou Cty, Jagsu Provce, 2250 PR Cha E-ma: jxb76@yeahet a Abstract: Coud storage aows cets to store a arge amout of data wth the he of storage servce rovders (SSPs) Proof-of-retrevabty(POR) rotocos aow oe server to rove to a verfer the avaabty of data stored by some cet Shacham et a reseted POR rotocos based o homomorhc authetcators ad roved securty of ther schemes uder a stroger securty mode, whch requres the exstece of a extractor to retreve the orga fe by recevg the rogram of a successfu rover Whe usg ther POR rotoco wth ubc verfabty to verfy the avaabty of mute fes searatey, the umber of arg oeratos comuted by a verfer s ear wth the umber of fes To mrove the heavy burde o the verfer, we troduce a oto caed mut-roof-of-retrevabty(mpor), aowg oe verfer to verfy the avaabty of mute fes stored by a server oe ass We aso desg a MPOR rotoco wth ubc verfabty by extedg the wor of Shacham et a The advatage of our MPOR scheme s that comutatoa overhead of a verfer our scheme s costat, deedet of the umber of fes Nevertheess, the soudess of our MPOR rotoco s roved uder a reatvey wea securty oto I artcuar, aayss of our MPOR rotoco shows that each fe ca be extracted exected oyoma tme uder certa restrcto o the sze of rocessed fes Keywords: Coud storage; Storage servce rovder; Proof-of-retrevabty; Homomorhc authetcator; Pubc verfabty Itroducto Coud comutg [3] has a dee mact o IT dustry by aowg cets to access hgh-quaty coud based servce ay-as-you-go maer Coud storage systems whch vove devery of data storage as a servce over Iteret are becomg more attractve Amazo S3 [], a we-ow storage servce, aows cets to store arge amouts of data

2 ad access ther stored data from ay ace at ow costs Oe of the major chaeges o coud storage systems s how to effcety verfy whether some remote storage servce rovder(ssp) s fathfuy storg cets data sce the SSP may ot be trusted Cets data may be at the dager of oss ether by data oss cdets or by macous deeto from a SSP who wats to save storage by deetg rarey accessed orto of the stored data There has bee a ot of research focused o roof-of-storage mechasms wthout the eed to dowoad the whoe data for verfcato Ths d of soutos s aso caed storage audtg [9,5,7], aowg cets to verfy through crytograhc meas that ther data o a utrusted SSP are et tact ad ready for retreva f eeded Some cruca system crtera for desgg roof-of-storage systems ca be summarzed as foows [6]: () Comutato ad commucato overhead of roof-of-storage rotocos ad storage overhead o a server shoud be as effcet as ossbe (2) Verfers shoud be stateess wthout the eed to mata states for storage audtg (3) The most mortat securty crtero for roof-of-storage systems requres that a verfer shoud be covced that the fe s actuay stored by a server whe the server ca ass the chec of storage audtg Eary research wors o roof-of-storage systems acs rovabe securty guaratee wthout rovdg forma securty modes ad roofs To formaze the securty crtero for roof-of-storage systems, forma modes ad costructos were frst studed by Naor et a [4] ad Jues et a [2] by usg homomorhc authetcators based o message authetcato code A fe s frst ecoded redudaty ad dvded to message bocs Each boc s authetcated by a MAC tag comuted by the cet The cet the erases the fe ad seds the ecoded fe ad the MAC tags to the server The dea behd ther rotocos s that a verfer oy eed chec a radom subset of the message bocs stored by the server to chec whether the orga fe s correcty stored by the server order to guaratee a effcet storage audt rotoco The egth of the server s resose s mroved wth the he of homomorhc authetcators by aggregatg the authetcato tags of dfferet message bocs Securty for roof-of-storage systems s catured by requrg the exstece of a extractor to retreve the secfed fe by teractg wth a server that ca ass the verfcato of storage audtg Ths securty oto s aso caed roof-of-retrevabty (POR) Ths 2

3 cocet s smar to zero owedge roofs of owedge [5] A weaer oto caed Proof-of-data-ossesso (PDP) [3] ca oy guaratee that a certa ercetage (eg, 99%) of message bocs ca be recovered wth hgh robabty (eg, 099) There are aso some aers [4,7,8] cosderg roof-of-storage systems suortg dyamc oeratos o the stored data I addto, POR rotocos that suort ubc verfabty meas everyoe ca chec whether a cet s data are correcty stored by a server Dgta sgatures ca be used to reace Mac tags to acheve ubc verfabty The NR mode [4] restrcts a checer to access secfc memory ocatos from the rover Shacham et a [6] stregtheed the NR mode by aowg a extractor bac-box access to a rover rogram Aother dstct feature formazed by Shacham et a ther securty mode [6] s that the secfed fe ca be extracted so og as the rover rogram ca correcty aswer ay sma (but o-eggbe) fracto of verfcato queres I addto, Shacham et a [6] desged a homomorhc authetcator based o BLS short sgature [6] to reset a POR rotoco wth ubc verfabty secure the radom orace mode Homomorhc authetcators ca be used to mrove the resose egth from the server by comressg authetcato vaues { σ } of bocs { m } to oe authetcator σ for ther ear combato { vm } We otce that the POR rotoco wth ubc verfabty [6] requres the verfer to comute two arg oeratos to verfy the resose from a server durg oe stace of ther POR rotoco Ths meas f oe wats to verfy the avaabty of fes stored by the server searatey, 2 arg oeratos shoud be comuted by the verfer, whch s a heavy overhead whe a cet has a arge umber of fes stored by that server Motvated by the above dscusso, we am to desg a mut-roof-of-retrevabty (MPOR) rotoco wth ubc verfabty I other words, our MPOR rotoco aows oe verfer to verfy the avaabty of fes stored by the server oe ass, whe the comutatoa overhead s deedet of the arameter The dea behd our costructo s to further comress the homomorhc authetcators from dfferet fes to reduce the comutato ad commucato overhead The ey ot of our wor s to choose a roer securty mode for MPOR rotoco ad rove the securty of our costructo uder t Soudess of MPOR rotocos s defed a 3

4 reatvey wea maer comared wth that of POR rotocos I the mut-fe settg, oe vocato of the extractor agorthm ca oy guaratee that at east oe fe amog those fes ca be recovered The reaso s that the extracted owedge s ow dstrbuted over these fes radomy Hece we caot guaratee that a the fes ca be extracted by the extractor a at oce the mut-fe settg O the other had, our aayss shows that each fe ca be extracted exected oyoma tme uder the assumto that each fe s sze s of the same magtude (eg, dgta mages, offce documets) So we defe soudess for MPOR rotocos by requrg the exstece of a extractor to retreve each fe exected oyoma tme The rest of ths aer s orgazed as foows At frst, we descrbe the otatos used ths aer ad bear mags secto 2 Sytax of MPOR schemes s troduced secto 3 We aso defe correctess, soudess for MPOR rotocos The soudess for MPOR rotocos s reatvey wea the sese that t oy requres each fe to be extracted exected oyoma tme uder the assumto that each fe s sze s of the same magtude I the foowg, we desg a MPOR rotoco wth ubc verfabty by extedg the wor [6] ad rove our MPOR scheme meet the requremet of soudess defed ths aer Fay, we evauate erformace of our MPOR rotoco to show that the cost of a verfer s greaty reduced comared wth that of the orga POR rotoco [6] whe verfyg mute fes stored by a server 2 Premares 2 Notato We use the otato x S to mea the eemet x s chose wth uform R robabty from the set S If A s a agorthm, the O( ) y A x (, ) meas that A has ut x,, access to a orace O, ad the outut of A s assged to y Let [ ] {,, } 22 Bear arg Gve a securty arameter, a effcet agorthm PG ( ) oututs ( e, G, GT, g, ), where G s a cycc grou of a rme order geerated by 4

5 g, 2 < < 2 G T s a cycc grou of the same order, ad et e : G G GT be a effcety comutabe bear fucto wth the foowg roertes: a b ab Bear: e( g, g ) e( g, g), for a a, b Z 2 No-degeerate: e( g, g) G T 3 Deftos 3 Sytax of a mut-roof-of-retrevabty scheme A mut-roof-of-retrevabty(mpor) scheme cossts of the foowg agorthms: Kg ( ) : Gve a securty arameter, ths radomzed ey-geerato agorthm oututs a secret/ubc ey ar ( s, ) St( s, M ) : Gve a secret ey s ad a fe M chose by a cet, ths fe-storg agorthm frst ecodes M by ayg a rate- ρ erasure code [2] to obta M such that ay ρ fracto of the ecoded fe M s suffcet to recover the orga fe M Fay t oututs a authetcato tag τ ad some auxary formato aug, ( M,( τ, aug)) St( M, s), where s s the secret ey of the cet M ad aug w be stored o the server sde τ ad aug w be used the foowg MPOR rotoco The rest art of our MPOR scheme cosst of the agorthms P (rover) ad MV (verfer) The foowg otato s used to deote oe teractve executo of our MPOR rotoco betwee the agorthms P ad MV : (,{ } ) (,{, MV P M M },{ aug } ) ( b, ) τ where s the ubc ey of the cet who stores the ecoded fes { M, M } o the server sde Parameter determes the umber of fes that ca be verfed τ smutaeousy {(, )} aug are geerated by the fe-storg agorthm St( ) for { M, M } resectvey The outut of the verfcato agorthm MV s bt b b deotes that the verfer s covced that the orga fes { M } are stored correcty by the rover Correctess of our MPOR scheme requres that a hoest server ca aways covce a 5

6 verfer of vadty of the stored fes That s: τ for ay ( s, ) Kg( ), {( M,(, aug )) St( M, s)} (,{ } ) (,{, MV P M M },{ aug } ) ( b, ) τ, we have 32 Soudess of mut-roof-of-retrevabty rotocos Soudess of MPOR rotocos formay requres that f a rover ca covce a verfer by assg the verfcato, the the orga fes { M } ca ready for retreva f eeded To formaze ths ot, a extracto agorthm s requred to recover the orga fes { M } by teractg wth the successfu rover va the MPOR rotoco The foowg game Ex ( A, ) w gve the forma defto of soudess of MPOR soud, MPOR rotocos Ex ( A, ) soud, MPOR Phase : The chaeger C geerates a eyar (, s) Kg( ) ad rovdes to A Phase 2: The adversary A teracts wth the chaeger by mag queres to a store orace The store query s haded by the orace as foows Store ( M ) // M s a fe chose by A Comute ( M,( τ, aug )) St ( s, M ) ; Retur ( M,( τ, aug )) ; For some fes M, M quered to the store orace who resods {( τ, )} aug resectvey, A maes a query to a MPOR orace, whch s haded as foows MPOR ( τ, τ ) The chaeger C rus a stace of the MPOR rotoco wth A as foows: < C(,{ τ, τ }) A > ( b, ) The chaeger ays the roe of a verfer durg the above executo ad oututs a bt b to deote whether t s covced that the orga fes are beg stored by the adversary correcty Retur b ; 6

7 At the ed of hase 2, A oututs the chaege set T { τ,, τ } cosstg of the tags retured by the store orace for some queres M,, M resectvey Descrto of a rover rogram P s aso rovded by A The rover rogram MPOR queres, e, P s ε -admssbe f t ca covcgy aswer ε fracto of < τ τ > ε Here the Pr[ MV ((,{, }) P ( b, )] robabty s over the cos of the verfer ad the rover Phase 3: We say a MPOR scheme s ε -soud f there exsts a effcet extracto agorthm Extr such that for every adversary A who ays the above game ad oututs the chaege tags { τ,, τ } retured by the store orace for the queres M,, M resectvey ad a ε -admssbe rover rogram P at the ed of hase 2, the,, there exsts a extracto agorthm Extr who recovers the fe M exected oyoma tme by teractg wth P va the MPOR rotoco That s: P ( ) τ τ,, Extr (,{,, }) M occurs exected oyoma tme excet wth eggbe robabty 4 Our mut-roof-of-retrevabty scheme Let (SKg, SSg, SVer) be a dgta sgature scheme Kg ( ) : Geerate a sgg eyar ( ss, s) SKg( ) by the ey geerato agorthm of Choose α R Z ad comute v g α The secret ey s s ( α, ss) The ubc ey s ( v, s ) St( s, M ) : Gve a fe M chose by a cet, ths fe-storg agorthm frst chooses a radom fe-ame f from a arge doma The coso robabty over fe ames s eggbe whe the doma s arge eough I the foowg, ay a erasure code to M to obta M ad st M to message bocs { } m Parse the secret ey of the cet as s ( α, ss) ad c a radom u Z Let τ 0 f u ad 7

8 comute a sgature a authetcato tag σ 0 0 SSg( ss, τ ) by the sgature-roducg agorthm of ad τ 0 0 m τ σ For, t comutes aug ( ( ) α H f u ) The ecoded fe M ad { aug } w be stored o the server sde Oe teractve executo of our MPOR rotoco betwee the agorthms P (rover) ad MV (verfer) ca be descrbed as foows: () Frst, the verfer MV maes a MPOR-query Q to the rover P : Q { P Q,, P Q }, P ( λ Z, f ), Q {( j, v )} wth dstct R j j [ ] ad each coeffcet v Z, where s the ubc ey of the cet, f j R s the fe-ame for a fe M ad s the umber of message bocs of the fe M The sze of each set Q s a fxed system arameter s (2) Havg receved the query Q, the rover agorthm, P( Q,{ M },{ aug } ) resods as foows: Frst t arses { M } as bocs { m }, resectvey I the foowg, comute: µ v jmj, ( j, v j ) Q σ µ ( µ,, µ,, µ ), σ σ v j augj, ( j, v j ) Q λ The rover P seds the resose ( µ, σ ) to the verfer (3) Havg receved the resose ( µ, σ ) MV (,{ τ, τ },( µ, σ )) roceeds as foows:, the verfcato agorthm Frst t arses ( v, s ) ad the authetcato tags τ τ 0 σ 0, If :, the sgature verfcato agorthm SVer( s, τ 0, σ 0 )0, the t oututs b 0 Otherwse, arse τ 0 as f u, ad the vector µ as ( µ,, µ,, µ ) If the foowg equato hods, outut b Otherwse outut b 0 8

9 v ( j, v j ) Q j λ µ λ e( σ, g) e( ( H ( f j) ) ( u ), v) It s easy to verfy the correctess of our MPOR scheme as foows: σ λ σ ( j, v j ) Q v ( j λ augj ) ( ( H ( f j) u ) ) ( j, v j ) Q mj v j λ α ( H ( f j) j ) ( j, v j ) Q ( H ( f j) j ) ( j, v j ) Q ( H ( f j) j ) ( j, v j ) Q The above resut meas v v v λ α λ α λ α ( u ) ( j, v j ) Q v j mj v j mj ( j, v j ) Q ( u ) ( u µ λ ) v ( j, v j ) Q j λ e( σ, g) e( ( H ( f j) ) α µ λ α ( u ), g) v ( j, v j ) Q α λ α j λ µ λ e( ( H ( f j) ) ( u ), v) Remar: The verfer chooses a MPOR query as: Q { P Q,, P Q }, P ( λ Z, f ), Q {( j, v )} wth dstct dces j [ ] ad each coeffcet λ α R v Z j R Q s a fxed system arameter s such that s < N Let N j The sze of each set A vector otato for the s -eemet set Q {( j, v )} over dces I { j} [ ] s rereseted by a N- eemet vector q ( ) N Z, such that q, ad q, j 0 for a j I, + N j N, where N I + N { j + N : j I } j j v j f j I + N, Gve a s -eemet set I ( I + N ) [ N], the query Q ca be regarded as chose over the dces I [ N] The jot coeffcet vector otato for the query Q s 9

10 a N- eemet vector q v c ( j, v j ) Q j j+ N q q Let c,, cn Reca that the hoest resose ( µ, σ ) µ v jmj ( j, v j ) Q σ µ ( µ,, µ,, µ ), σ σ v j augj, ( j, v j ) Q λ be that caoca bass for ( Z, for the query Q satsfes: We ca vew the message bocs of these fes as a N matrx H : + T H [ h,, h ], h (0,( m,, m ),0 ), where each coum vector h corresods to the message bocs of M resectvey We ca aso equvaety deote µ the resose by a vector q H query Q ) N, where q s the jot coeffcet vector otato for the 5 Securty roofs We rove the securty of our MPOR scheme by a seres of games Game 0 s exacty the same as Ex ( A, ) wth the foowg modfcato soud, MPOR The chaeger tay sets a fag d 0 ad ees a tabe of the store queres made by the adversary ad ts resoses for these queres Based o the tabe ad oe MPOR query Q, the chaeger s abe to determe the determstc verfcato resose ( µ, σ ) retured by the hoest rover agorthm Havg receved the resose ( µ, σ ) retured by the adversary behavg as a rover oe executo of our MPOR rotoco < C(,{ τ, τ }) A > ( b, ), the chaeger sets d f for a executos, the verfcato agorthm MV (,{ τ, τ }, µ, σ ) oututs b Otherwse the chaeger sets d 0 Let ε deote Pr[ d ] Game, 0 The above modfcato Game 0 w ot chage the vew of the adversary 0

11 Game s amost the same as Game 0 The chaeger ees a st of authetcato tags geerated by tsef whe hadg queres to the store orace If ay tag submtted by the adversary ca be verfed as vad but s ot o the st of tags geerated by the chaeger, the chaeger aborts The major modfcatos are rereseted by the foowg boxed statemets Phase : The chaeger C cs a emty st slst ad geerates a eyar (, s) Kg( ), where s ( α, ss), ( v, s ) C rovdes to A The adversary A teracts wth the chaeger by mag queres The store ad MPOR queres are haded as foows Store ( M ) // M s a fe chose by A Comute ( M, τ,{ aug } ) St( s, M ) ; Parse τ as 0 0 τ σ ad slst slst { τ 0 } Retur ( M, τ,{ aug } ) ; MPOR ( τ, τ ) If τ { τ, τ } such that τ τ 0 σ 0 ca be verfed as a vad sgature ad τ 0 slst, the chaeger aborts Otherwse C rus a stace of MPOR rotoco wth A : < C(,{ τ, τ }) A > ( b, ) Retur b ; Fay, A oututs the chaege set T { τ,, τ } cosstg of tags retured by the store orace for some queres M,, M resectvey The descrto of a rover rogram If P s aso rovded by A τ { τ,, τ } such that τ τ σ ca be verfed as a vad sgature ad 0 0 τ 0 slst, the chaeger aborts The other art of Game s et uchaged Cam : ε 0 ε s eggbe uder the assumto that the sgature scheme s exsteta uforgeabe [] uder the chose message attac Proof: It s obvous that Game 0 ad Game roceed detcay uess the evet E ay tag submtted by the adversary ca be verfed as a vad sgature but s ot o the st of

12 authetcato tags geerated by the chaeger occurs Hece ε 0 ε Pr[ E ] But f ths evet haes wth o-eggbe robabty, we ca costruct a adversary B agast the uforgeabty of the sgature scheme B taes a sgg ubc ey s SKg( ) as ut ad s gve access to a sgg orace SSgss ( ) B cs a radom α ad sets the secret ey s ( α, ), the α ubc ey ( v g, s) It s cear that B s abe to smuates the vew of A Game erfecty wth the he the sgg orace If the evet E haes, B smy oututs the tag submtted by A as ts forgery agast the sgature scheme Game 2 s amost the same as Game The chaeger Game 2 verfes the resose from the adversary durg each executo of our MPOR rotoco a way dfferet from the stadard verfcato agorthm MV ( ) ( µ, σ ) Reca that the chaeger s abe to determe the determstc verfcato resose retured by the hoest rover agorthm P( ) by the modfcato Game, gve the corresodg MPOR query Let ( µ, σ ) 2 be the resose retured by the adversary oe executo of our MPOR rotoco : < MV (,{ τ, τ }) A > ( b, ) The chaeger sets d ad aborts f there s at east oe executo oututs b ad σ σ Cam 2: ε 2 ε s eggbe uder the CDH assumto MV (,{ τ, τ }, µ, σ ) Proof: Game 2 s dstct from Game oy whe the resose from the adversary oe executo of our MPOR rotoco ca ass the verfcato but s ot equa to the correct resose from the hoest rover agorthm Let E 2 deote the evet The adversary oe executo of our MPOR rotoco ca ass the verfcato but σ σ Game 2 s dstct from Game oy whe E 2 haes Hece ε 2 ε Pr[ E2] If Pr[ E 2] s o-eggbe, we ca costruct a smuator that soves the CDH robem the radom orace mode α β The smuator S taes a stace ( g, g, h g ) of the CDH robem as ut ad

13 smuates the evromet of Game 2 for the adversary A as foows S geerates a sgg ey ar by rug ( ss, s) SKg( ) ad sets v g α, whch mcty defes the secret ey s ( α, ss) ad the ubc ey ( v, s ) S rovdes to A To resod each query ssued to the radom orace H ( ), S frst arses t as f ad rograms the resose of H ( ) as we w descrbe ater To resod each query M ssued to the store orace, S frst chooses a radom fe-ame f, ecodes M to obta M ad sts t to bocs { } m S β γ sets u g h, γ, β Z S cs r Z, ad rograms the resose R R of H ( f ) as ( ) r β ( m γ H f m g g h ) At ths ot, S comutes aug,, as foows: m aug ( ( ) α H f u ) (( r ( m g g h m )) ( g h ) m ) β γ β γ α ( g r ) α ( S comutes g α r ) τ accordg to the secfcato of the fe-storg agorthm St( ) va the sgg ey ad returs ( M, τ,{ aug } ) to A S teracts wth A ut the evet E 2 haes Assume that Q { P Q,, P Q}, P ( λ, f ), Q {(, v )} s the MPOR query ssued by the verfer oe executo of our MPOR rotoco for the ecoded fes M M Let the resose retured by the adversary as a rover to ths query be, µ, σ Let ( µ, σ ) be the determstc resose retured by the hoest rover agorthm for the query Q, whch satsfes the foowg: µ ( µ,, µ,, µ ), σ σ λ 3

14 µ v jmj ( j, v j ) Q σ v j augj, ( j, v j ) Q v ( j, v j ) Q j λ µ λ e( σ, g) e( ( H ( f j) ) ( u ), v) Whe E 2 haes, µ, σ ca aso ass the verfcato ad the foowg hod: µ ( µ,, µ,, µ ) ( v j λ µ λ e σ, g) e( ( H ( f j) ) ( u ), v) ( j, v j ) Q Let σ σ σ, µ µ µ, If, µ µ, t foows that σ σ accordg to the verfcato equato Cosequety, 0 hods for at east oe osto by the assumto σ σ We derve the foowg by dvso: ( µ λ e σ σ, g) e(( ( u β γ µ λ ), v) e(( (( g h ) ), v) Rearragg terms yeds β λ µ γ λ µ e(( σ σ ) v, g) (, ) e h v α β As v g, h g, we see that the souto g αβ to the CDH robem ca be wrtte µ β λ µ γ λ µ as (( σ σ ) v ) uess γ λ µ s equa to zero µ For ay fxed sequece { } that s ot a zero, the robabty that γ λ µ 0 s sce each γ chose by the smuator s uformy dstrbuted over γ Z ad hdde from the adversary s vew sce u g β γ h reveas o formato of Hece the success robabty of S sovg the CDH robem s at east Pr[ E ] 2 The chaeger Game 3 verfes the resose from the adversary durg each executo of our MPOR rotoco a way dfferet from Game 2 Gve a MPOR query Q, et ( µ, σ ) be the determstc resose retured by the hoest rover agorthm for the query 4

15 Q ad ( µ, σ ) be the resose retured by the adversary oe executo of our MPOR rotoco The chaeger arses µ as ( µ,, µ,, µ ) ad aborts f µ µ, where µ v m, j j ( j, v j ) Q Cam 3: ε3 ε 2 s eggbe uder the dscrete ogarthm assumto, Proof: Game 3 s dstct from Game 2 oy whe the resose from the adversary oe of the MPOR rotoco executos may cause the chaeger to abort as secfed Let E 3 deote the evet The adversary behavg as a rover oe executo of our MPOR rotoco ca ass the verfcato as secfed but, µ v jmj, ( j, v j ) Q Game 3 s dstct from Game 2 oy whe E 3 haes Hece ε 3 ε 2 Pr[ E3] If Pr[ E 3] s o-eggbe, we ca costruct a smuator that soves the dscrete ogarthm robem The smuator S taes a stace ( g, h g β ) of the dscrete ogarthm robem as ut ad smuates the evromet of Game 3 for the adversary A as foows S geerates a sgg eyar ( ss, s) SKg( ) ad cs α R Z Let v g α, whch defes the secret ey s ( α, ss) ad the ubc ey ( v, s ) S rovdes to A To resod each query M ssued to the store orace, S frst chooses a radom fe-ame f from a arge doma, ecodes M to obta M ad sts t to β γ bocs { m } S sets u g h, γ, β R Z S teracts wth the adversary ut the evet E 3 haes Assume Q { P Q,, P Q}, P ( λ, f ), Q {(, v )} s the MPOR 5 query ssued by the verfer oe executo of our MPOR rotoco for the fes M M The resose retured by the adversary to ths query s ( µ, σ ) Let ( µ, σ ) determstc resose retured by the hoest rover agorthm for the query Q, be the

16 Accordg to the roof Game 2, we ow that σ σ excet wth eggbe robabty eg( λ ) Uder ths assumto, we derve the foowg accordg to the verfcato equato: v ( j, v j ) Q j λ µ λ e( σ, g) e( ( H ( f j) ) ( u ), v) ( v j λ µ λ e σ, g) e( ( H ( f j) ) ( u ), v) ( j, v j ) Q We cocude µ λ µ λ u u ( ) ( ) by tag σ σ, whch meas µ λ β γ µ λ u g h ( ) (( ) ) Let µ µ µ, µ 0 hods for at east oe osto by the assumto, µ v jmj, ( j, v j ) Q If γ λ µ 0 mod because we have h g βλ µ ( ) γ λ µ, the dscrete ogarthm β ( ) mod β λ µ γ λ µ µ Smary, for ay fxed sequece { } that s ot a zero we ca argue that the robabty that γ λ µ s equa to zero s Hece the success robabty of S sovg the dscrete ogarthm robem s at east Pr[ E3] eg( λ) Resose of the adversary Game 3 s forced to be the same as that outut by the hoest rover agorthm of our MPOR rotoco A we-behaved rover rogram P causes the verfcato agorthm MV ( ) to accet each executo of MPOR rotoco by resodg wth ( µ, σ ) comuted by the hoest rover agorthm Cams -3 show that ay adversary that ws the game Ex ( A, ) s we-behaved excet wth soud, MPOR eggbe robabty I the foowg, we show that extracto w succeed by teractg 6

17 wth a we-behaved rover rogram Defto : Gve a MPOR query Q as ut, a ote rover rogram P oututs ether the correct resose comuted by the hoest rover agorthm or a seca symbo If P oututs the correct resose wth robabty at east ε, the we ca P a ε -ote rover rogram A ε -we-behaved rover rogram P ca be trasformed to ε -ote rover rogram P P ( ) wth bac box access to P Havg receved a MPOR query Q from a verfer, P ays the roe of verfer to teract wth from P by forwardg the query Q to µ σ P, P oututs (, ) µ σ P Havg receved the resose (, ) f ad oy f the verfcato agorthm MV (,{ τ, τ },( µ, σ )) oututs ; otherwse P oututs P rovdes P wth fresh radomess ad rewds t for each teracto As P s ε -we-behaved rover rogram, P s ε -ote Note that the tags { τ, τ } that are resoses to the store queres ca he P to verfy the correctess of ( µ, σ ) Let N For a subsace Ψ of ( Z )N retured by P, deote the dmeso of Ψ by dm Ψ Let FreeΨ be the dces of the caoca bass vectors { c } ( Z ) N Ψ I other words, FreeΨ { [ N]: c Ψ} cuded Lemma [ 6, Cam 46]: For a subsace Ψ of ( Z, ad et I be a s- eemet subset of [ N ] If ts coeffcet vector q Ψ ) N I FreeΨ, the a radom MPOR query Q over dces I wth occurs wth robabty at most ( ) Lemma 2 [6, Cam 47]: Let #(Free Ψ ) m For a radom s- eemet subset I of [ N ], the robabty that I FreeΨ s at most s s m ( N s + ) Theorem : Suose that P s a ε - ote rover rogram ad et 7

18 s ( ρ N) ω + ( N s + ) s If ε > ω, for each fe M,, the exected tme to 2 N 2 2 recover at east ρ fracto of t s O(( + ε N ) ρ t ) ε ω +, where t s the umber of MPOR queres ssued to the rover rogram by the extractor durg oe roud of teracto Proof: The t MPOR query-resose ars durg oe roud of teracto wth the rover rogram P cotrbute the foowg to the extractor s owedge of the ecoded fes M,, M : () () ( t) ( t) q H µ,, q H µ H s the matrx costructed from the ecoded fes M,, M, whch s descrbed at the ed of Secto 4 We rewrte the above as V H W where V s the t N matrx ( ) whose row vectors are the t coeffcet vectors { } of the MPOR queres ad W s q t the t matrx whose row vectors are t corresodg MPOR resoses ( ) { µ } t The matrx V ca be reduced to a matrx G U V the row-reduced echeo form, where U s a t t matrx wth ozero determat comuted by ayg Gaussa emato to V The extractor s owedge durg the above teracto ca be rereseted by the matrxs G, U, V, W, where the matrx G the row-reduced echeo form The subsace geerated by the matrx G s deoted by Ψ The extractor s owedge sace s tay emty The extractor reeats the foowg behavor ut Free Ψ ρn The extractor chooses a radom MPOR query Q over the dces I [ N] wth coeffcet vector q by ts radom cos ad rus the ε - ote P o Q P aswers the correct resose µ q Ψ : q H wth robabty ε We cosder the foowg three tyes: For queres of ths tye, the extractor exteds ts owedge as foows: It adds the row vector q to the curret matrx V, obtag / V ad adds the resose vector µ to the exstg matrx W, obtag / W It aso comutes / / / G U V the row-reduced echeo form / / / / G, U, V, W rereset the udate of the extractor s 8

19 owedge 2 q Ψ but I FreeΨ : 3 I FreeΨ : For queres of tye 2 or 3, the extractor does ot udate ts owedge ad cotue ts curret teracto wth the rover rogram P A query of tye creases dm Ψ by The extractor s teracto wth P s guarateed to termate whe the umber of queres of tye s above ρ N By Lemma, queres of tye 2 mae u at most ( ) sce Pr[ Q s tye 2] Pr[ q Ψ I Free Ψ] Q Q Pr[ q Ψ I Free Ψ] Pr[ I Free Ψ] Pr[ q Ψ I Free Ψ] ( ) Q Q Q Assume #(Free Ψ ) m For a radom s- eemet subset I of [ N ], the robabty that I FreeΨ s at most s s m ( N s + ) by Lemma 2 By the coveto set for the extractor, m ρn, ths quatty s at most ( ) s s ρn ( N s + ) Therefore the fracto of queres of tye 2 or 3 s at most s ( ρ N) ω + ( N s + ) s As P s a ε -ote rover rogram, P s abe to aswer at east ε fracto of the queres Therefore, a radom MPOR query chose by the extractor w be of tye wth robabty at east ε ω To yed ρ N queres of tye, the extractor w carry out O( ρ N ) teractos wth P ths roud ε ω As the matrx G the row-reduced echeo form, t s ossbe to determe whether a query Q s of tye, to whch P has resoded The extractor adds the coeffcet vector q of Q to the curret matrx V ad aes Gaussa emato to V to yed G, whch taes 2 O( N ) tme [8] If the ewy added row s ot a zeros, the q s of tye As Gaussa emato eed oy be aed to at most ε fracto of the queres resoded correcty by P 2 ρn, the rug tme of the extractor ths hase s O(( + ε N ) ) ε ω O the other had, whe ths hase has fshed, the owedge of the extractor cossts 9

20 of the matrxes G, U, V, W such that V H W, G U V G s the row-reduced echeo form The free dmeso of the subsace Ψ saed by G s ρ N by the covetos set for the extractor For each FreeΨ, there must be a row G, say row t, that equas some caoca bass vector c ( Z ) N sce G s the row-reduced echeo form Mutyg both sdes of V H W by U, we obta G H U W We defe a set As the umber of dces G { : Free Ψ, < } for each dex, FreeΨ s ρ N, there exsts at east oe dex such that G s at east ρ by the geohoe rce Reca that H [ h,, h ], + T h (0,( m,, m ),0 ) The er roducts betwee these caoca vectors c, G ad the corresodg coum vector h w recover at east ρ fracto of the ecoded fe M, whch ca extracted from the roduct U W The comutato w taes 2 O( t ) tme [8] I the foowg, we aayze the robabty gve dex, of a evet F G ρ for the At frst, we w aayze the robabty / of a evet G ρ for the gve dex, As metoed above, we assume that each fe s sze s of the same magtude For ease of aayss, we further assume b For stace, these fes of the same magtude ca be redudaty added before ecodg The robabty / N N b b b b ρ ρ( N ) ρn ρb ρ( b b) ρb The robabty b b j b, oy deeds o the vaues of j b j b ρb j ρb ρ ρ ρ,, b ad s deedet of the choce of As Pr[ F,, F ], Pr[ F, F ] F by the uo boud We 20

21 ow that Pr[ F ] Hece the extractor ca recover at east ρ fracto of the ecoded fe M wth robabty at east durg ths hase Ths meas at east ρ fracto of the fe M ca be recovered by rug the extractor agorthm rouds o average, who rewds the ε -ote rover P wth fresh cos before each teracto I cocuso, for each fe M,, the exected tme to recover at east ρ fracto of t s N O ε N ρ t ε ω (( + ) + ) As M s redudaty ecoded by erasure codes [2] such that ay ρ fracto of the M s suffcet to recover the orga fe M The orga fe M s guarateed to be recovered ths case 6 Performace aayss We evauate the erformace of the roosed MPOR rotoco ad that of the POR rotoco [6] terms of the requred commucato ad comutatoa cost to verfy fes stored o the server sde The resut s stated Tabe, 2 Par deotes oe e arg oerato MEx ( G ) deotes oe geera mut-exoetato g g e over a grou G The sze of each set Q s assumed to be a fxed s both schemes For ease of comarso, we assume that there s oy oe sector er each ecoded message boc the POR rotoco [6] The advatage of our MPOR rotocos es the fact that the umber of arg oeratos comuted by the verfer s deedet of the arameter I addto, egth of the resose from a rover s further reduced by aggregatg the resoses from the rover Nevertheess, the soudess of our MPOR rotoco oy satsfes a reatvey wea securty oto uder the assumto that each fe s sze s of the same magtude Oe vocato of the extractor agorthm ca oy guaratee that at east oe fe amog those fes ca be recovered Our aayss shows that each fe ca be extracted exected oyoma tme uder our assumto o the sze of rocessed fes 2

22 7 Cocuso Proof-of-retrevabty rotocos ca he a cet to be assured of the avaabty of fes stored by a server H Shacham et a [6] stregtheed the securty mode for POR rotocos by aowg a extractor bac-box access to a rover rogram I addto, they reseted a POR rotoco wth ubc verfabty based o a homomorhc authetcator derved from BLS short sgature Whe usg ther POR rotoco wth ubc verfabty to verfy the avaabty of mute fes searatey, the umber of arg oeratos comuted by a verfer s ear wth the umber of fes To hade ths ssue, we exted the wor [6] by troducg a ew oto caed mut-roof-of-retrevabty Our MPOR rotoco wth ubc verfabty aows oe verfer to verfy the avaabty of fes stored by a server oe ass, whe the comutatoa overhead of a verfer our MPOR scheme s costat, deedet of the arameter Aayss of our MPOR rotoco shows that each fe ca be extracted exected oyoma tme uder certa restrcto o the sze of rocessed fes Acowedgemet Ths wor s suorted by Natura Scece Foudato of Hgher Educato Isttutos, Jagsu Provce offce of educato, PR Cha (Grat No 0KJD520005) Refereces [] Amazo sme storage servce (Amazo S3), htt://awsamazocom/s3/ [2] AAo ad MLuby, A ear tme erasure-reset code wth ear otma recovery, IEEETraIfTheory,42(6) (996) [3] G Ateese, RBurs, RCurtmoa, JHerrg, OKha, LKsser, ZPeterso ad D Sog, Remote data checg usg rovabe data ossesso, ACM TrasIfSystSecurty, 4(), (20) Artce No2, [4] G Ateese, R D Petro, L V Mac, ad G Tsud, Scaabe ad effcet rovabe data ossesso, Crytoogy eprt Archve, Reort 2008/4, 2008 htt://ertacrorg/2008/4 [5] M Beare ad O Godrech, O defg roofs of owedge, CRYPTO'92, LNCS 740 (993)

23 [6] D Boeh, BLy ad H Shacham, Short sgatures from we arg, Joura of Crytoogy, 7(4) (2004) [7] D Cash, A Kucu, ad D Wchs, Dyamc Proofs of Retrevabty va Obvous RAM, Crytoogy eprt Archve, htt://ertacrorg/202/550 [8] H Cohe, A course comutatoa agebrac umber theory, Ber, Srger, 993 [9] Y Deswarte, J-JQusquarter ad A Sadaead H Shacham, Remote tegrty checg, IICIS 2003, IFIP Vo40 (2004) - [0] C C Erway, A Kucu, C Paamathou, ad R Tamassa Dyamc rovabe data ossesso ACM CCS 09, (2009) [] S Godwasser, SMca ad R Rvest, A dgta sgature scheme secure agast adatve chose-message attacs, SIAM Joura of Comutg, 7(2) (988) [2] A Jues ad BKas, PORs: roofs of retrevabty for arge fes, CCS 2007, ACM, (2007) [3] P Me ad T Grace, NIST SD , The NIST defto of coud comutg, NIST seca ubcato, 20 [4] M Naor ad GRothbum, The comexty of oe memory checg, JACM, 56(), (2009) Artce No2 [5] T Schwarz ad E Mer, Store, forget ad chec: Usg agebrac sgatures to chec remotey admstered storage, ICDCS 2006, IEEE, (2004) - [6] H Shacham ad BWaters, Comact roofs of retrevabty, Joura of Crytoogy, ubshed oe [7] MShah, MBaer, JMogu ad RSwamatha, Audtg to ee oe storage servce hoest, Proceedgs of HotOS 2007, ACM, (2007) Artce No [8] Q Wag, C Wag, J L, K Re, ad W Lou, Eabg ubc verfabty ad data dyamcs for storage securty coud comutg, ESORICS 2009, Srger, LNCS 5789, (2009)

24 Scheme POR rotoco [6] Our MPOR rotoco Tabe Comutatoa overhead of a verfer Cost for verfyg fes Parg Exoetato 2 s 2 MEx ( G) 2 s MEx ( G) + MEx ( G) Tabe 2 Legth of the resose from a rover Scheme POR rotoco [6] Our MPOR rotoco Tota bt egth of the resoses from the rover ( Z + G ) ( Z ) + G 24

A Covariance Analysis Model for DDoS Attack Detection*

A Covariance Analysis Model for DDoS Attack Detection* A Covarace Aayss Mode or DDoS Attac Detecto* Shuyua J Deartmet o Comutg HogKog Poytechc Uversty HogKog Cha [email protected] Dae S. Yeug Deartmet o Comutg HogKog Poytechc Uversty HogKog Cha [email protected]

More information

Approximation Algorithms for Scheduling with Rejection on Two Unrelated Parallel Machines

Approximation Algorithms for Scheduling with Rejection on Two Unrelated Parallel Machines (ICS) Iteratoal oural of dvaced Comuter Scece ad lcatos Vol 6 No 05 romato lgorthms for Schedulg wth eecto o wo Urelated Parallel aches Feg Xahao Zhag Zega Ca College of Scece y Uversty y Shadog Cha 76005

More information

Lecture 7. Norms and Condition Numbers

Lecture 7. Norms and Condition Numbers Lecture 7 Norms ad Codto Numbers To dscuss the errors umerca probems vovg vectors, t s usefu to empo orms. Vector Norm O a vector space V, a orm s a fucto from V to the set of o-egatve reas that obes three

More information

The Digital Signature Scheme MQQ-SIG

The Digital Signature Scheme MQQ-SIG The Dgtal Sgature Scheme MQQ-SIG Itellectual Property Statemet ad Techcal Descrpto Frst publshed: 10 October 2010, Last update: 20 December 2010 Dalo Glgorosk 1 ad Rue Stesmo Ødegård 2 ad Rue Erled Jese

More information

Security Analysis of RAPP: An RFID Authentication Protocol based on Permutation

Security Analysis of RAPP: An RFID Authentication Protocol based on Permutation Securty Aalyss of RAPP: A RFID Authetcato Protocol based o Permutato Wag Shao-hu,,, Ha Zhje,, Lu Sujua,, Che Da-we, {College of Computer, Najg Uversty of Posts ad Telecommucatos, Najg 004, Cha Jagsu Hgh

More information

MDM 4U PRACTICE EXAMINATION

MDM 4U PRACTICE EXAMINATION MDM 4U RCTICE EXMINTION Ths s a ractce eam. It does ot cover all the materal ths course ad should ot be the oly revew that you do rearato for your fal eam. Your eam may cota questos that do ot aear o ths

More information

Abraham Zaks. Technion I.I.T. Haifa ISRAEL. and. University of Haifa, Haifa ISRAEL. Abstract

Abraham Zaks. Technion I.I.T. Haifa ISRAEL. and. University of Haifa, Haifa ISRAEL. Abstract Preset Value of Autes Uder Radom Rates of Iterest By Abraham Zas Techo I.I.T. Hafa ISRAEL ad Uversty of Hafa, Hafa ISRAEL Abstract Some attempts were made to evaluate the future value (FV) of the expected

More information

APPENDIX III THE ENVELOPE PROPERTY

APPENDIX III THE ENVELOPE PROPERTY Apped III APPENDIX III THE ENVELOPE PROPERTY Optmzato mposes a very strog structure o the problem cosdered Ths s the reaso why eoclasscal ecoomcs whch assumes optmzg behavour has bee the most successful

More information

ANOVA Notes Page 1. Analysis of Variance for a One-Way Classification of Data

ANOVA Notes Page 1. Analysis of Variance for a One-Way Classification of Data ANOVA Notes Page Aalss of Varace for a Oe-Wa Classfcato of Data Cosder a sgle factor or treatmet doe at levels (e, there are,, 3, dfferet varatos o the prescrbed treatmet) Wth a gve treatmet level there

More information

ADAPTATION OF SHAPIRO-WILK TEST TO THE CASE OF KNOWN MEAN

ADAPTATION OF SHAPIRO-WILK TEST TO THE CASE OF KNOWN MEAN Colloquum Bometrcum 4 ADAPTATION OF SHAPIRO-WILK TEST TO THE CASE OF KNOWN MEAN Zofa Hausz, Joaa Tarasńska Departmet of Appled Mathematcs ad Computer Scece Uversty of Lfe Sceces Lubl Akademcka 3, -95 Lubl

More information

6.7 Network analysis. 6.7.1 Introduction. References - Network analysis. Topological analysis

6.7 Network analysis. 6.7.1 Introduction. References - Network analysis. Topological analysis 6.7 Network aalyss Le data that explctly store topologcal formato are called etwork data. Besdes spatal operatos, several methods of spatal aalyss are applcable to etwork data. Fgure: Network data Refereces

More information

Numerical Methods with MS Excel

Numerical Methods with MS Excel TMME, vol4, o.1, p.84 Numercal Methods wth MS Excel M. El-Gebely & B. Yushau 1 Departmet of Mathematcal Sceces Kg Fahd Uversty of Petroleum & Merals. Dhahra, Saud Araba. Abstract: I ths ote we show how

More information

CSSE463: Image Recognition Day 27

CSSE463: Image Recognition Day 27 CSSE463: Image Recogto Da 27 Ths week Toda: Alcatos of PCA Suda ght: roject las ad relm work due Questos? Prcal Comoets Aalss weght grth c ( )( ) ( )( ( )( ) ) heght sze Gve a set of samles, fd the drecto(s)

More information

An SVR-Based Data Farming Technique for Web Application

An SVR-Based Data Farming Technique for Web Application A SVR-Based Data Farmg Techque for Web Appcato Ja L 1 ad Mjg Peg 2 1 Schoo of Ecoomcs ad Maagemet, Behag Uversty 100083 Bejg, P.R. Cha [email protected] 2 Isttute of Systems Scece ad Techoogy, Wuy Uversty, Jagme

More information

Automated Alignment and Extraction of Bilingual Ontology for Cross-Language Domain-Specific Applications

Automated Alignment and Extraction of Bilingual Ontology for Cross-Language Domain-Specific Applications Automated Agmet ad Extracto of gua Otoogy for Cross-Laguage Doma-Specfc Appcatos Ju-Feg Yeh, Chug-Hse Wu, Mg-Ju Che ad Lag-Chh Yu Departmet of Computer Scece ad Iformato Egeerg Natoa Cheg Kug Uversty,

More information

SHAPIRO-WILK TEST FOR NORMALITY WITH KNOWN MEAN

SHAPIRO-WILK TEST FOR NORMALITY WITH KNOWN MEAN SHAPIRO-WILK TEST FOR NORMALITY WITH KNOWN MEAN Wojcech Zelńsk Departmet of Ecoometrcs ad Statstcs Warsaw Uversty of Lfe Sceces Nowoursyowska 66, -787 Warszawa e-mal: wojtekzelsk@statystykafo Zofa Hausz,

More information

Preprocess a planar map S. Given a query point p, report the face of S containing p. Goal: O(n)-size data structure that enables O(log n) query time.

Preprocess a planar map S. Given a query point p, report the face of S containing p. Goal: O(n)-size data structure that enables O(log n) query time. Computatoal Geometry Chapter 6 Pot Locato 1 Problem Defto Preprocess a plaar map S. Gve a query pot p, report the face of S cotag p. S Goal: O()-sze data structure that eables O(log ) query tme. C p E

More information

Public Auditing Based on Homomorphic Hash Function in

Public Auditing Based on Homomorphic Hash Function in Publc Audtg Bsed o Homomorhc Hsh Fucto Secure Cloud Storge Shufe NIU, Cfe Wg, Xo DU Publc Audtg Bsed o Homomorhc Hsh Fucto Secure Cloud Storge Shufe NIU, Cfe Wg, 3 Xo DU, College of Comuter Scece d Egeerg,

More information

A Study of Unrelated Parallel-Machine Scheduling with Deteriorating Maintenance Activities to Minimize the Total Completion Time

A Study of Unrelated Parallel-Machine Scheduling with Deteriorating Maintenance Activities to Minimize the Total Completion Time Joural of Na Ka, Vol. 0, No., pp.5-9 (20) 5 A Study of Urelated Parallel-Mache Schedulg wth Deteroratg Mateace Actvtes to Mze the Total Copleto Te Suh-Jeq Yag, Ja-Yuar Guo, Hs-Tao Lee Departet of Idustral

More information

n. We know that the sum of squares of p independent standard normal variables has a chi square distribution with p degrees of freedom.

n. We know that the sum of squares of p independent standard normal variables has a chi square distribution with p degrees of freedom. UMEÅ UNIVERSITET Matematsk-statstska sttutoe Multvarat dataaalys för tekologer MSTB0 PA TENTAMEN 004-0-9 LÖSNINGSFÖRSLAG TILL TENTAMEN I MATEMATISK STATISTIK Multvarat dataaalys för tekologer B, 5 poäg.

More information

STATISTICAL PROPERTIES OF LEAST SQUARES ESTIMATORS. x, where. = y - ˆ " 1

STATISTICAL PROPERTIES OF LEAST SQUARES ESTIMATORS. x, where. = y - ˆ  1 STATISTICAL PROPERTIES OF LEAST SQUARES ESTIMATORS Recall Assumpto E(Y x) η 0 + η x (lear codtoal mea fucto) Data (x, y ), (x 2, y 2 ),, (x, y ) Least squares estmator ˆ E (Y x) ˆ " 0 + ˆ " x, where ˆ

More information

Green Master based on MapReduce Cluster

Green Master based on MapReduce Cluster Gree Master based o MapReduce Cluster Mg-Zh Wu, Yu-Chag L, We-Tsog Lee, Yu-Su L, Fog-Hao Lu Dept of Electrcal Egeerg Tamkag Uversty, Tawa, ROC Dept of Electrcal Egeerg Tamkag Uversty, Tawa, ROC Dept of

More information

Web Services Wind Tunnel: On Performance Testing Large-scale Stateful Web Services

Web Services Wind Tunnel: On Performance Testing Large-scale Stateful Web Services Web Servces Wd Tuel: O Performace Testg Large-scale Stateful Web Servces Marcelo De Barros, Jg Shau, Che Shag, Keto Gdewall, Hu Sh, Joe Forsma Mcrosoft Cororato {marcelod,shau,cshag,ketog,hush,osehfo}@mcrosoft.com

More information

A Fair Non-repudiation Protocol without TTP on Conic Curve over Ring

A Fair Non-repudiation Protocol without TTP on Conic Curve over Ring Far No-reudato Protocol wthout TTP o Coc Curve over Rg Z L Zhahu, Fa Ka, 3L Hu, Zheg Ya Far No-reudato Protocol wthout TTP o Coc Curve over Rg Z 1 L Zhahu, Fa Ka, 3 L Hu, 4 Zheg Ya 1State Key Laboratory

More information

Report 52 Fixed Maturity EUR Industrial Bond Funds

Report 52 Fixed Maturity EUR Industrial Bond Funds Rep52, Computed & Prted: 17/06/2015 11:53 Report 52 Fxed Maturty EUR Idustral Bod Fuds From Dec 2008 to Dec 2014 31/12/2008 31 December 1999 31/12/2014 Bechmark Noe Defto of the frm ad geeral formato:

More information

IDENTIFICATION OF THE DYNAMICS OF THE GOOGLE S RANKING ALGORITHM. A. Khaki Sedigh, Mehdi Roudaki

IDENTIFICATION OF THE DYNAMICS OF THE GOOGLE S RANKING ALGORITHM. A. Khaki Sedigh, Mehdi Roudaki IDENIFICAION OF HE DYNAMICS OF HE GOOGLE S RANKING ALGORIHM A. Khak Sedgh, Mehd Roudak Cotrol Dvso, Departmet of Electrcal Egeerg, K.N.oos Uversty of echology P. O. Box: 16315-1355, ehra, Ira [email protected],

More information

The simple linear Regression Model

The simple linear Regression Model The smple lear Regresso Model Correlato coeffcet s o-parametrc ad just dcates that two varables are assocated wth oe aother, but t does ot gve a deas of the kd of relatoshp. Regresso models help vestgatg

More information

Efficient Traceback of DoS Attacks using Small Worlds in MANET

Efficient Traceback of DoS Attacks using Small Worlds in MANET Effcet Traceback of DoS Attacks usg Small Worlds MANET Yog Km, Vshal Sakhla, Ahmed Helmy Departmet. of Electrcal Egeerg, Uversty of Souther Calfora, U.S.A {yogkm, sakhla, helmy}@ceg.usc.edu Abstract Moble

More information

Fractal-Structured Karatsuba`s Algorithm for Binary Field Multiplication: FK

Fractal-Structured Karatsuba`s Algorithm for Binary Field Multiplication: FK Fractal-Structured Karatsuba`s Algorthm for Bary Feld Multplcato: FK *The authors are worg at the Isttute of Mathematcs The Academy of Sceces of DPR Korea. **Address : U Jog dstrct Kwahadog Number Pyogyag

More information

Average Price Ratios

Average Price Ratios Average Prce Ratos Morgstar Methodology Paper August 3, 2005 2005 Morgstar, Ic. All rghts reserved. The formato ths documet s the property of Morgstar, Ic. Reproducto or trascrpto by ay meas, whole or

More information

Optimal multi-degree reduction of Bézier curves with constraints of endpoints continuity

Optimal multi-degree reduction of Bézier curves with constraints of endpoints continuity Computer Aded Geometrc Desg 19 (2002 365 377 wwwelsevercom/locate/comad Optmal mult-degree reducto of Bézer curves wth costrats of edpots cotuty Guo-Dog Che, Guo-J Wag State Key Laboratory of CAD&CG, Isttute

More information

10.5 Future Value and Present Value of a General Annuity Due

10.5 Future Value and Present Value of a General Annuity Due Chapter 10 Autes 371 5. Thomas leases a car worth $4,000 at.99% compouded mothly. He agrees to make 36 lease paymets of $330 each at the begg of every moth. What s the buyout prce (resdual value of the

More information

Bayesian Network Representation

Bayesian Network Representation Readgs: K&F 3., 3.2, 3.3, 3.4. Bayesa Network Represetato Lecture 2 Mar 30, 20 CSE 55, Statstcal Methods, Sprg 20 Istructor: Su-I Lee Uversty of Washgto, Seattle Last tme & today Last tme Probablty theory

More information

A DISTRIBUTED REPUTATION BROKER FRAMEWORK FOR WEB SERVICE APPLICATIONS

A DISTRIBUTED REPUTATION BROKER FRAMEWORK FOR WEB SERVICE APPLICATIONS L et al.: A Dstrbuted Reputato Broker Framework for Web Servce Applcatos A DISTRIBUTED REPUTATION BROKER FRAMEWORK FOR WEB SERVICE APPLICATIONS Kwe-Jay L Departmet of Electrcal Egeerg ad Computer Scece

More information

Chapter Eight. f : R R

Chapter Eight. f : R R Chapter Eght f : R R 8. Itroducto We shall ow tur our atteto to the very mportat specal case of fuctos that are real, or scalar, valued. These are sometmes called scalar felds. I the very, but mportat,

More information

Statistical Pattern Recognition (CE-725) Department of Computer Engineering Sharif University of Technology

Statistical Pattern Recognition (CE-725) Department of Computer Engineering Sharif University of Technology I The Name of God, The Compassoate, The ercful Name: Problems' eys Studet ID#:. Statstcal Patter Recogto (CE-725) Departmet of Computer Egeerg Sharf Uversty of Techology Fal Exam Soluto - Sprg 202 (50

More information

Application of GA with SVM for Stock Price Prediction in Financial Market

Application of GA with SVM for Stock Price Prediction in Financial Market Iteratoa Joura of Scece ad Research (IJSR) ISSN (Oe): 39-7064 Impact Factor (0): 3.358 Appcato of GA wth SVM for Stock Prce Predcto Faca Market Om Prakash Jea, Dr. Sudarsa Padhy Departmet of Computer Scece

More information

Randomized Load Balancing by Joining and Splitting Bins

Randomized Load Balancing by Joining and Splitting Bins Radomzed Load Baacg by Jog ad Spttg Bs James Aspes Ytog Y 1 Itoducto Cosde the foowg oad baacg sceao: a ceta amout of wo oad s dstbuted amog a set of maches that may chage ove tme as maches o ad eave the

More information

Chapter 6: Variance, the law of large numbers and the Monte-Carlo method

Chapter 6: Variance, the law of large numbers and the Monte-Carlo method Chapter 6: Variace, the law of large umbers ad the Mote-Carlo method Expected value, variace, ad Chebyshev iequality. If X is a radom variable recall that the expected value of X, E[X] is the average value

More information

Finite Difference Method

Finite Difference Method Fte Dfferece Method MEL 87 Computatoa Heat rasfer --4) Dr. Praba audar Assstat Professor Departmet of Mechaca Egeerg II Deh Dscretzato Methods Requred to covert the geera trasport equato to set of agebrac

More information

Simple Linear Regression

Simple Linear Regression Smple Lear Regresso Regresso equato a equato that descrbes the average relatoshp betwee a respose (depedet) ad a eplaator (depedet) varable. 6 8 Slope-tercept equato for a le m b (,6) slope. (,) 6 6 8

More information

On Error Detection with Block Codes

On Error Detection with Block Codes BULGARIAN ACADEMY OF SCIENCES CYBERNETICS AND INFORMATION TECHNOLOGIES Volume 9, No 3 Sofa 2009 O Error Detecto wth Block Codes Rostza Doduekova Chalmers Uversty of Techology ad the Uversty of Gotheburg,

More information

A Key-Policy Attribute-Based Broadcast Encryption

A Key-Policy Attribute-Based Broadcast Encryption 444 The Iteratoa rab Joura of Iformato Techooy Vo. 0 o. 5 September 0 Key-Pocy ttrbute-base Broacast Ecrypto J Su Yupu Hu a Leyou ha Departmet of ppcato Mathematcs X a Uversty of Techooy Cha Key Lab of

More information

T = 1/freq, T = 2/freq, T = i/freq, T = n (number of cash flows = freq n) are :

T = 1/freq, T = 2/freq, T = i/freq, T = n (number of cash flows = freq n) are : Bullets bods Let s descrbe frst a fxed rate bod wthout amortzg a more geeral way : Let s ote : C the aual fxed rate t s a percetage N the otoal freq ( 2 4 ) the umber of coupo per year R the redempto of

More information

Optimal Packetization Interval for VoIP Applications Over IEEE 802.16 Networks

Optimal Packetization Interval for VoIP Applications Over IEEE 802.16 Networks Optmal Packetzato Iterval for VoIP Applcatos Over IEEE 802.16 Networks Sheha Perera Harsha Srsea Krzysztof Pawlkowsk Departmet of Electrcal & Computer Egeerg Uversty of Caterbury New Zealad [email protected]

More information

Chapter 3. AMORTIZATION OF LOAN. SINKING FUNDS R =

Chapter 3. AMORTIZATION OF LOAN. SINKING FUNDS R = Chapter 3. AMORTIZATION OF LOAN. SINKING FUNDS Objectves of the Topc: Beg able to formalse ad solve practcal ad mathematcal problems, whch the subjects of loa amortsato ad maagemet of cumulatve fuds are

More information

ON SLANT HELICES AND GENERAL HELICES IN EUCLIDEAN n -SPACE. Yusuf YAYLI 1, Evren ZIPLAR 2. [email protected]. evrenziplar@yahoo.

ON SLANT HELICES AND GENERAL HELICES IN EUCLIDEAN n -SPACE. Yusuf YAYLI 1, Evren ZIPLAR 2. yayli@science.ankara.edu.tr. evrenziplar@yahoo. ON SLANT HELICES AND ENERAL HELICES IN EUCLIDEAN -SPACE Yusuf YAYLI Evre ZIPLAR Departmet of Mathematcs Faculty of Scece Uversty of Akara Tadoğa Akara Turkey yayl@sceceakaraedutr Departmet of Mathematcs

More information

Automated Event Registration System in Corporation

Automated Event Registration System in Corporation teratoal Joural of Advaces Computer Scece ad Techology JACST), Vol., No., Pages : 0-0 0) Specal ssue of CACST 0 - Held durg 09-0 May, 0 Malaysa Automated Evet Regstrato System Corporato Zafer Al-Makhadmee

More information

DIGITAL AUDIO WATERMARKING: SURVEY

DIGITAL AUDIO WATERMARKING: SURVEY DIGITAL AUDIO WATERMARKING: SURVEY MIKDAM A. T. ALSALAMI * MARWAN M. AL-AKAIDI ** * Computer Scece Dept. Zara Prvate Uversty / Jorda ** School of Egeerg ad Techology - De Motfort Uversty / UK Abstract:

More information

Load Balancing Control for Parallel Systems

Load Balancing Control for Parallel Systems Proc IEEE Med Symposum o New drectos Cotrol ad Automato, Chaa (Grèce),994, pp66-73 Load Balacg Cotrol for Parallel Systems Jea-Claude Heet LAAS-CNRS, 7 aveue du Coloel Roche, 3077 Toulouse, Frace E-mal

More information

Applications of Support Vector Machine Based on Boolean Kernel to Spam Filtering

Applications of Support Vector Machine Based on Boolean Kernel to Spam Filtering Moder Appled Scece October, 2009 Applcatos of Support Vector Mache Based o Boolea Kerel to Spam Flterg Shugag Lu & Keb Cu School of Computer scece ad techology, North Cha Electrc Power Uversty Hebe 071003,

More information

Classic Problems at a Glance using the TVM Solver

Classic Problems at a Glance using the TVM Solver C H A P T E R 2 Classc Problems at a Glace usg the TVM Solver The table below llustrates the most commo types of classc face problems. The formulas are gve for each calculato. A bref troducto to usg the

More information

Projection model for Computer Network Security Evaluation with interval-valued intuitionistic fuzzy information. Qingxiang Li

Projection model for Computer Network Security Evaluation with interval-valued intuitionistic fuzzy information. Qingxiang Li Iteratoal Joural of Scece Vol No7 05 ISSN: 83-4890 Proecto model for Computer Network Securty Evaluato wth terval-valued tutostc fuzzy formato Qgxag L School of Software Egeerg Chogqg Uversty of rts ad

More information

Relaxation Methods for Iterative Solution to Linear Systems of Equations

Relaxation Methods for Iterative Solution to Linear Systems of Equations Relaxato Methods for Iteratve Soluto to Lear Systems of Equatos Gerald Recktewald Portlad State Uversty Mechacal Egeerg Departmet [email protected] Prmary Topcs Basc Cocepts Statoary Methods a.k.a. Relaxato

More information

On formula to compute primes and the n th prime

On formula to compute primes and the n th prime Joural's Ttle, Vol., 00, o., - O formula to compute prmes ad the th prme Issam Kaddoura Lebaese Iteratoal Uversty Faculty of Arts ad ceces, Lebao Emal: [email protected] amh Abdul-Nab Lebaese Iteratoal

More information

Fast, Secure Encryption for Indexing in a Column-Oriented DBMS

Fast, Secure Encryption for Indexing in a Column-Oriented DBMS Fast, Secure Ecrypto for Idexg a Colum-Oreted DBMS Tgja Ge, Sta Zdok Brow Uversty {tge, sbz}@cs.brow.edu Abstract Networked formato systems requre strog securty guaratees because of the ew threats that

More information

Cyber Journals: Multidisciplinary Journals in Science and Technology, Journal of Selected Areas in Telecommunications (JSAT), January Edition, 2011

Cyber Journals: Multidisciplinary Journals in Science and Technology, Journal of Selected Areas in Telecommunications (JSAT), January Edition, 2011 Cyber Jourals: Multdscplary Jourals cece ad Techology, Joural of elected Areas Telecommucatos (JAT), Jauary dto, 2011 A ovel rtual etwork Mappg Algorthm for Cost Mmzg ZHAG hu-l, QIU Xue-sog tate Key Laboratory

More information

STOCHASTIC approximation algorithms have several

STOCHASTIC approximation algorithms have several IEEE TRANSACTIONS ON INFORMATION THEORY, VOL 60, NO 10, OCTOBER 2014 6609 Trackg a Markov-Modulated Statoary Degree Dstrbuto of a Dyamc Radom Graph Mazyar Hamd, Vkram Krshamurthy, Fellow, IEEE, ad George

More information

The impact of service-oriented architecture on the scheduling algorithm in cloud computing

The impact of service-oriented architecture on the scheduling algorithm in cloud computing Iteratoal Research Joural of Appled ad Basc Sceces 2015 Avalable ole at www.rjabs.com ISSN 2251-838X / Vol, 9 (3): 387-392 Scece Explorer Publcatos The mpact of servce-oreted archtecture o the schedulg

More information

A New Bayesian Network Method for Computing Bottom Event's Structural Importance Degree using Jointree

A New Bayesian Network Method for Computing Bottom Event's Structural Importance Degree using Jointree , pp.277-288 http://dx.do.org/10.14257/juesst.2015.8.1.25 A New Bayesa Network Method for Computg Bottom Evet's Structural Importace Degree usg Jotree Wag Yao ad Su Q School of Aeroautcs, Northwester Polytechcal

More information

The Gompertz-Makeham distribution. Fredrik Norström. Supervisor: Yuri Belyaev

The Gompertz-Makeham distribution. Fredrik Norström. Supervisor: Yuri Belyaev The Gompertz-Makeham dstrbuto by Fredrk Norström Master s thess Mathematcal Statstcs, Umeå Uversty, 997 Supervsor: Yur Belyaev Abstract Ths work s about the Gompertz-Makeham dstrbuto. The dstrbuto has

More information

OPTIMAL KNOWLEDGE FLOW ON THE INTERNET

OPTIMAL KNOWLEDGE FLOW ON THE INTERNET İstabul Tcaret Üverstes Fe Blmler Dergs Yıl: 5 Sayı:0 Güz 006/ s. - OPTIMAL KNOWLEDGE FLOW ON THE INTERNET Bura ORDİN *, Urfat NURİYEV ** ABSTRACT The flow roblem ad the mmum sag tree roblem are both fudametal

More information

Dynamic Two-phase Truncated Rayleigh Model for Release Date Prediction of Software

Dynamic Two-phase Truncated Rayleigh Model for Release Date Prediction of Software J. Software Egeerg & Applcatos 3 63-69 do:.436/jsea..367 Publshed Ole Jue (http://www.scrp.org/joural/jsea) Dyamc Two-phase Trucated Raylegh Model for Release Date Predcto of Software Lafe Qa Qgchua Yao

More information

Common p-belief: The General Case

Common p-belief: The General Case GAMES AND ECONOMIC BEHAVIOR 8, 738 997 ARTICLE NO. GA97053 Commo p-belef: The Geeral Case Atsush Kaj* ad Stephe Morrs Departmet of Ecoomcs, Uersty of Pesylaa Receved February, 995 We develop belef operators

More information

On Application-level Load Balancing in FastReplica

On Application-level Load Balancing in FastReplica O Appcato-eve Load Baacg FastRepca Jagwo Lee, Gustavo de Vecaa Abstract I the paper, we cosder the probem o dstrbutg arge-sze cotet to a xed set o odes. I cotrast wth the most exstg ed-system soutos to

More information

1. The Time Value of Money

1. The Time Value of Money Corporate Face [00-0345]. The Tme Value of Moey. Compoudg ad Dscoutg Captalzato (compoudg, fdg future values) s a process of movg a value forward tme. It yelds the future value gve the relevat compoudg

More information

How To Value An Annuity

How To Value An Annuity Future Value of a Auty After payg all your blls, you have $200 left each payday (at the ed of each moth) that you wll put to savgs order to save up a dow paymet for a house. If you vest ths moey at 5%

More information

FINANCIAL MATHEMATICS 12 MARCH 2014

FINANCIAL MATHEMATICS 12 MARCH 2014 FINNCIL MTHEMTICS 12 MRCH 2014 I ths lesso we: Lesso Descrpto Make use of logarthms to calculate the value of, the tme perod, the equato P1 or P1. Solve problems volvg preset value ad future value autes.

More information

Geometric Motion Planning and Formation Optimization for a Fleet of Nonholonomic Wheeled Mobile Robots

Geometric Motion Planning and Formation Optimization for a Fleet of Nonholonomic Wheeled Mobile Robots Proceedgs of the 4 IEEE Iteratoal Coferece o Robotcs & Automato New Orleas, LA Arl 4 Geometrc oto Plag ad Formato Otmzato for a Fleet of Noholoomc Wheeled oble Robots Rajakumar Bhatt echacal & Aerosace

More information

An Approach to Evaluating the Computer Network Security with Hesitant Fuzzy Information

An Approach to Evaluating the Computer Network Security with Hesitant Fuzzy Information A Approach to Evaluatg the Computer Network Securty wth Hestat Fuzzy Iformato Jafeg Dog A Approach to Evaluatg the Computer Network Securty wth Hestat Fuzzy Iformato Jafeg Dog, Frst ad Correspodg Author

More information

Analyses of Integrity Monitoring Techniques for a Global Navigation Satellite System (GNSS-2)

Analyses of Integrity Monitoring Techniques for a Global Navigation Satellite System (GNSS-2) Aalyses of Iterty Motor echques for a Global Navato Satellte System (GNSS-) heodor Z ad Berd Essfeller Isttute of Geodesy ad Navato (IfEN), Uversty FAF Much D-85577 Neubber, Germay Erw Löhert ad Robert

More information

RUSSIAN ROULETTE AND PARTICLE SPLITTING

RUSSIAN ROULETTE AND PARTICLE SPLITTING RUSSAN ROULETTE AND PARTCLE SPLTTNG M. Ragheb 3/7/203 NTRODUCTON To stuatos are ecoutered partcle trasport smulatos:. a multplyg medum, a partcle such as a eutro a cosmc ray partcle or a photo may geerate

More information

A particle swarm optimization to vehicle routing problem with fuzzy demands

A particle swarm optimization to vehicle routing problem with fuzzy demands A partcle swarm optmzato to vehcle routg problem wth fuzzy demads Yag Peg, Ye-me Qa A partcle swarm optmzato to vehcle routg problem wth fuzzy demads Yag Peg 1,Ye-me Qa 1 School of computer ad formato

More information

ANALYTICAL MODEL FOR TCP FILE TRANSFERS OVER UMTS. Janne Peisa Ericsson Research 02420 Jorvas, Finland. Michael Meyer Ericsson Research, Germany

ANALYTICAL MODEL FOR TCP FILE TRANSFERS OVER UMTS. Janne Peisa Ericsson Research 02420 Jorvas, Finland. Michael Meyer Ericsson Research, Germany ANALYTICAL MODEL FOR TCP FILE TRANSFERS OVER UMTS Jae Pesa Erco Research 4 Jorvas, Flad Mchael Meyer Erco Research, Germay Abstract Ths paper proposes a farly complex model to aalyze the performace of

More information

Maintenance Scheduling of Distribution System with Optimal Economy and Reliability

Maintenance Scheduling of Distribution System with Optimal Economy and Reliability Egeerg, 203, 5, 4-8 http://dx.do.org/0.4236/eg.203.59b003 Publshed Ole September 203 (http://www.scrp.org/joural/eg) Mateace Schedulg of Dstrbuto System wth Optmal Ecoomy ad Relablty Syua Hog, Hafeg L,

More information

Three Dimensional Interpolation of Video Signals

Three Dimensional Interpolation of Video Signals Three Dmesoal Iterpolato of Vdeo Sgals Elham Shahfard March 0 th 006 Outle A Bref reve of prevous tals Dgtal Iterpolato Bascs Upsamplg D Flter Desg Issues Ifte Impulse Respose Fte Impulse Respose Desged

More information

Statistical Intrusion Detector with Instance-Based Learning

Statistical Intrusion Detector with Instance-Based Learning Iformatca 5 (00) xxx yyy Statstcal Itruso Detector wth Istace-Based Learg Iva Verdo, Boja Nova Faulteta za eletroteho raualštvo Uverza v Marboru Smetaova 7, 000 Marbor, Sloveja [email protected] eywords:

More information

of the relationship between time and the value of money.

of the relationship between time and the value of money. TIME AND THE VALUE OF MONEY Most agrbusess maagers are famlar wth the terms compoudg, dscoutg, auty, ad captalzato. That s, most agrbusess maagers have a tutve uderstadg that each term mples some relatoshp

More information

Performance Attribution. Methodology Overview

Performance Attribution. Methodology Overview erformace Attrbuto Methodology Overvew Faba SUAREZ March 2004 erformace Attrbuto Methodology 1.1 Itroducto erformace Attrbuto s a set of techques that performace aalysts use to expla why a portfolo's performace

More information

A Parallel Transmission Remote Backup System

A Parallel Transmission Remote Backup System 2012 2d Iteratoal Coferece o Idustral Techology ad Maagemet (ICITM 2012) IPCSIT vol 49 (2012) (2012) IACSIT Press, Sgapore DOI: 107763/IPCSIT2012V495 2 A Parallel Trasmsso Remote Backup System Che Yu College

More information

Curve Fitting and Solution of Equation

Curve Fitting and Solution of Equation UNIT V Curve Fttg ad Soluto of Equato 5. CURVE FITTING I ma braches of appled mathematcs ad egeerg sceces we come across epermets ad problems, whch volve two varables. For eample, t s kow that the speed

More information

CHAPTER 2. Time Value of Money 6-1

CHAPTER 2. Time Value of Money 6-1 CHAPTER 2 Tme Value of Moey 6- Tme Value of Moey (TVM) Tme Les Future value & Preset value Rates of retur Autes & Perpetutes Ueve cash Flow Streams Amortzato 6-2 Tme les 0 2 3 % CF 0 CF CF 2 CF 3 Show

More information

Banking (Early Repayment of Housing Loans) Order, 5762 2002 1

Banking (Early Repayment of Housing Loans) Order, 5762 2002 1 akg (Early Repaymet of Housg Loas) Order, 5762 2002 y vrtue of the power vested me uder Secto 3 of the akg Ordace 94 (hereafter, the Ordace ), followg cosultato wth the Commttee, ad wth the approval of

More information

ECONOMIC CHOICE OF OPTIMUM FEEDER CABLE CONSIDERING RISK ANALYSIS. University of Brasilia (UnB) and The Brazilian Regulatory Agency (ANEEL), Brazil

ECONOMIC CHOICE OF OPTIMUM FEEDER CABLE CONSIDERING RISK ANALYSIS. University of Brasilia (UnB) and The Brazilian Regulatory Agency (ANEEL), Brazil ECONOMIC CHOICE OF OPTIMUM FEEDER CABE CONSIDERING RISK ANAYSIS I Camargo, F Fgueredo, M De Olvera Uversty of Brasla (UB) ad The Brazla Regulatory Agecy (ANEE), Brazl The choce of the approprate cable

More information

TESTING AND SECURITY IN DISTRIBUTED ECONOMETRIC APPLICATIONS REENGINEERING VIA SOFTWARE EVOLUTION

TESTING AND SECURITY IN DISTRIBUTED ECONOMETRIC APPLICATIONS REENGINEERING VIA SOFTWARE EVOLUTION TESTING AND SECURITY IN DISTRIBUTED ECONOMETRIC APPLICATIONS REENGINEERING VIA SOFTWARE EVOLUTION Cosm TOMOZEI 1 Assstat-Lecturer, PhD C. Vasle Alecsadr Uversty of Bacău, Romaa Departmet of Mathematcs

More information

One way to organize workers that lies between traditional assembly lines, where workers are specialists,

One way to organize workers that lies between traditional assembly lines, where workers are specialists, MANUFACTURING & SERVICE OPERATIONS MANAGEMENT Vol. 7, No. 2, Sprg 2005, pp. 121 129 ss 1523-4614 ess 1526-5498 05 0702 0121 forms do 10.1287/msom.1040.0059 2005 INFORMS Usg Bucket Brgades to Mgrate from

More information