Watermark-based Provable Data Possession for Multimedia File in Cloud Storage
|
|
|
- Darcy Cameron
- 10 years ago
- Views:
Transcription
1 Vol.48 (CIA 014), pp Watermar-based Provable Data Possesson for Multmeda Fle n Cloud Storage Yongjun Ren 1,, Jang Xu 1,, Jn Wang 1,, Lmng Fang 3, Jeong-U Km 4 1 Jangsu Engneerng Center of Networ Montorng,Nanjng Unversty of Informaton Scence & Technology, Nanjng 10044, Chna Computer and Software School, Nanjng Unversty of Informaton Scence & Technology, Nanjng 10044, Chna 3 Computer and Software School, Nanjng Unversty of Aeronautcs and Astronautcs, Nanjng 10044, Chna 4 Department of Energy Grd, Sangmyung Unversty, Seoul , Korea Abstract. In cloud computng, data owners host ther data on cloud servers and data consumers can access the data from cloud servers. Due to the data outsourcng, however, ths new paradgm of data hostng servce also ntroduces new securty challenges, whch requres an ndependent audtng servce to chec the data ntegrty n the cloud. However, the exstng solutons are not specfc to the multmeda data. Moreover copyrght protecton s not provded. In ths paper, we defne specally a provable data possesson model for multmeda fle, and present a framewor based on dgtal watermarng for multmeda data storage audt servce, n whch we defne the securty features of audt servce for multmeda data outsourcng and the correspondng propertes of dgtal watermarng. Keywords: Cloud computng, Data storage audtng, Provable data possesson 1 Introducton Cloud Computng has been envsoned as the next-generaton archtecture of IT enterprse. Storng the data n cloud envronment becomes natural and also essental. Cloud s a large shared resource pool and the users move towards them wth respect to ther needs. It offers amentes for data storage, data access and other computatonal capabltes n a relable manner. But, securty becomes the major concern for all enttes n cloud servces. In order to solve the problem of data audtng servce, many schemes are proposed under dfferent systems and securty models [1-13]. Exstng solutons are not specfc to multmeda data. Besdes, copyrght protecton s not provded. In ths paper, we present an effcent watermarng-based audt servce for mage outsourced storages. Our audt system uses self-embeddng watermarng to provde mage content audt and support authentcty and ntegrty for mage content n cloud computng. In addton we also provde the ablty of copyrght protecton for mage by usng self-embedded technology. ISSN: ASTL Copyrght 014 SERSC
2 Vol.48 (CIA 014) Related Wor The message authentcaton code (MAC) s a nd of hash functon whch has been used for checng the data ntegrty for a long tme. Some solutons usng MAC for storage audtng servce have been proposed. Based on the pre-computed MACs stored on the verfer, the protocols proposed by Lllbrdge et al.[] and Naor et al. [3]can detect any data loss or corrupton wth hgh probablty. Shacham et al. [4] proposed a MAC-based batch verfcaton for multple data blocs. In 007 Atenese, et al [5] proposed a PDP model to solve the storage problems of fles. They dvded the fle nto blocs, and computed a homomorphc tag [6] for each bloc, completed the proof of the data ntegrty by samplng and verfyng the correspondence of the tags and blocs randomly. A.Juels, et al [7] proposed a provable data recovery (POR) model. Instead of taggng fle blocs, they nserted some sentnel blocs, and verfed the ntegrty of the fle by checng the correctness of sentnel blocs. For the sentnel blocs are one-tme labels, the number of tmes that the fle can do ntegrty verfcaton s lmted, related to the number of sentnel blocs. Havav Shacham and Brent Waters [4] proposed an mproved POR model under the securty model defned n [7], and had a very complete proof. They used tags smlar to [5], and appled to publc authentcaton. Kevn D. Bowers et al [8] and Yevgeny Dods et al [9] made some theory and applcaton extensons based on [4][7]. Zheng and Xu also present a dynamc POR model n [10].PDP model proposed n [5] only appled to prvate authentcaton. It meant that only the person who has the prvate ey can verfy the ntegrty of the fle. Atenese mproved PDP model to apply to publc authentcaton n [11]. They replaced the homomorphc tags n [5] wth homomorphc tags supported publc authentcaton [1]. 3 Self-Embeddng Watermar-Based PDP 3.1 Watermar generaton and embeddng Let the orgnal mage (Q) s N N. In cloud mage owners mae the followng calculaton to generate watermar for mage audtng. 1.The orgnal Q s dvded nto n n sub-bloc wthout overlap. Each sub-bloc s recorded as 1,,, ( N / n )..The least sgnfcant m bts of each pxel of sub-bloc s recorded as BtSet (, j,0 ), s the seral number the sub-bloc, and are set nto zero. And the new. The process can be mared as the equalty., j 1,,, m, BtSet (.) s settng functon. 104 Copyrght 014 SERSC
3 Vol.48 (CIA 014) 3. Computng sngular value decomposton (SVD) of.the generated sngular value s recorded as, s the seral number of sngular value, and 1,,, n. 4. Accordng to the followng formula to compute the norm of sngular value for,.e. Norm. N o rm n ( ) (1) 1 5.Extracton the party of the hghest order for robust watermar W. If the party of the hghest order for W 0 ;otherwse W 1, W s the -th bt of W. 6.Embeddng gettng sub-bloc Norm and produce orgnal s even, N o rm W to the least sgnfcant m bts of every pxel for wth watermarng. and s restructured and produce an mage ( Q ) ncludng watermar. The self-embeddng process can be expressed as: BtGet (, j, W ) From the above mentoned we now that the length of W s embedded to number of self-embedded watermarng s every pxel for () ( N / n ) bts, W s n pxels and every pxel s embedded by m bts. So the total bt W s mn and the embeddng capacty of the mn.because W s embedded nto the least sgnfcant m bts of, whch lead to mall change, the nvsblty of watermar algorthm s very good. Moreover the watermarng W s generated by the characterstcs of the orgnal mage and has the robustness aganst the attac, whch s called robust watermarng. After the above operaton, MDO wll be able to upload the mage Q wth watermarng to CSP for cloud storage servce. 3. Copyrght protecton of cloud mage servce from robust watermarng Image audtor MDA download mage Q from cloud servce provder. And then t extracts the robust watermarng to dentfy copyrght of the mage. 1. Image Q s dvded nto n n sub-bloc wthout overlap. Each sub-bloc s recorded as and 1,,, ( N / n )., s the seral number the sub-bloc, Copyrght 014 SERSC 105
4 Vol.48 (CIA 014).The least sgnfcant m bts of each pxel n sub-bloc s recorded as BtSet (, j,0 ) are set nto zero. And the new. The process can be mared as the equalty: 3.Computng sngular value decomposton of value s recorded as, j 1,,, m, BtSet (.) s a settng functon..the generated sngular, s the seral number of sngular value, and 1,,, n. 4.Computng the norm of sngular value for Norm n 1,.e. Norm. ( ) (3) 5.Extracton the party of the hghest order for watermar Norm and produce robust W. If the party of the hghest order for Norm s even, W 0 ; otherwse W 1. W s the -th bt of W. 6.Calculatng and analyzng the NC dentfy copyrght of W and W N C ( ( W W )) / ( W W ) 3.3 Integrty and authentcty verfcaton of mage content Image audtor download mage Q from cloud servce provder and mplement the followng operaton to verfy the mage content. 1. Image Q s dvded nto n n sub-bloc wthout overlap. Each sub-bloc s recorded as and 1,,, ( N / n )..The least sgnfcant m bts of each pxel n.e. L j ( r ) B tg e t ( A B, j ), s the seral number the sub-bloc, are extracted, j L r s ;where B tg et (.) s extracton potental functon. ( ) the bt sequence of the mnmum j bts for each pxel n the -th sub-bloc. j 1,,, m, and r 1,,, n. j 3. Contrastng the extracted robust watermar W and L ( r ). Image audtors verfy the consstence between them. If any one bt for every j and r s not consstent, the sub-bloc content has been altered; otherwse the mage Q s ntact. 106 Copyrght 014 SERSC
5 Vol.48 (CIA 014) 4 Conclusons In ths paper, we present an effcent watermarng-based audt servce for mage outsourced storages. We ntegrate mage content audt servce and copyrght protecton through a double functon self-embedded watermarng scheme, whch greatly reduced the consumpton of resources and s very sutable for multmeda data n cloud envronment. Acnowledgments. Ths wor was supported by the Industral Strategc Technology Development Program ( ) funded by the Mnstry of Trade, Industry and Energy (MOTIE) Korea. It was also supported by the Natural Scence Foundaton of Jangsu Provnce (No. BK01461). Prof. Jeong-U Km s the correspondng author. References 1. Yang, K., Ja, X.: Data storage audtng servce n cloud computng: challenges, methods and opportuntes. The journal of World Wde Web. July 01, Volume 15, pp Lllbrdge, M., Elnety, S., Brrell, A., Burrows, M., Isard, M.: A cooperatve nternet bacup 3. Naor, M., Rothblum, G.N.: The complexty of onlne memory checng. In: Proceedngs of the 46th Annual IEEE Symposum on Foundatons of Computer Scence, FOCS 05, pp IEEE Computer Socety, Washngton, DC, USA (005) H. Shacham and B. Waters. Compact proofs of retrevablty. In ASIACRYPT '08, pp , G. Atenese, R. Burns, R. Curtmola, J. Herrng, L. Kssner, Z. Peterson, and D. Song. Provable data possesson at untrusted stores. In CCS '07, pp , R. Johnson, D.Molnar, D. Song, and D. Wagner.: Homomorphc sgnature schemes. In Proc. of CT-RSA, volume 71 of LNCS, pp. 44-6, A. Juels and B. Kals. PORs: Proofs of retrevablty for large fles. In CCS '07, pp , Bowers, K., Juels, A. and Oprea, A.: Proofs of retrevablty: Theory and mplementaton. Techncal Report 008/175, Cryptology eprnt Archve, Y. Dods, S. Vadhan, and D. Wchs. Proofs of retrevablty va hardness applcaton. In TCC, vol.5444 of LNCS, pp , Zheng, Q. and Xu, S.: Far and Dynamc Proofs of Retrevablty. CODASPY 11, February 1 3, 011, San Antono, Texas, USA. 11. G. Atenese, S. Kamara, and J. Katz. Proofs of storage from homomorphc dentfcaton protocols. ASIACRYPT 09, LNCC, D Boneh, B Lynn, H Shacham. Short sgnatures from the wel parng. ASIACCRYPT 001. LNCS, vol. 48, pp , 001. Copyrght 014 SERSC 107
A Secure Password-Authenticated Key Agreement Using Smart Cards
A Secure Password-Authentcated Key Agreement Usng Smart Cards Ka Chan 1, Wen-Chung Kuo 2 and Jn-Chou Cheng 3 1 Department of Computer and Informaton Scence, R.O.C. Mltary Academy, Kaohsung 83059, Tawan,
AN EFFICIENT GROUP AUTHENTICATION FOR GROUP COMMUNICATIONS
Internatonal Journal of Network Securty & Its Applcatons (IJNSA), Vol.5, No.3, May 2013 AN EFFICIENT GROUP AUTHENTICATION FOR GROUP COMMUNICATIONS Len Harn 1 and Changlu Ln 2 1 Department of Computer Scence
Ensuring Data Storage Security in Cloud Computing
1 Ensurng Data Storage Securty n Cloud Computng Cong Wang,Qan Wang, Ku Ren, and Wenjng Lou Dept of ECE, Illnos Insttute of Technology, Emal: {cwang, qwang, kren}@ecetedu Dept of ECE, Worcester Polytechnc
Ensuring Data Storage Security in Cloud Computing
Ensurng Data Storage Securty n Cloud Computng Cong Wang, Qan Wang, and Ku Ren Department of ECE Illnos Insttute of Technology Emal: {cwang, qwang, kren}@ece.t.edu Wenjng Lou Department of ECE Worcester
SEVERAL trends are opening up the era of Cloud
1 Towards Secure and Dependable Storage Servces n Cloud Computng Cong Wang, Student Member, IEEE, Qan Wang, Student Member, IEEE, Ku Ren, Member, IEEE, Nng Cao, Student Member, IEEE, and Wenjng Lou, Senor
Secure and Efficient Proof of Storage with Deduplication
Secure and Effcent Proof of Storage wth Deduplcaton Qng Zheng Department of Computer Scence Unversty of Texas at San Antono [email protected] Shouhua Xu Department of Computer Scence Unversty of Texas
SEVERAL trends are opening up the era of Cloud
IEEE Transactons on Cloud Computng Date of Publcaton: Aprl-June 2012 Volume: 5, Issue: 2 1 Towards Secure and Dependable Storage Servces n Cloud Computng Cong Wang, Student Member, IEEE, Qan Wang, Student
The Development of Web Log Mining Based on Improve-K-Means Clustering Analysis
The Development of Web Log Mnng Based on Improve-K-Means Clusterng Analyss TngZhong Wang * College of Informaton Technology, Luoyang Normal Unversty, Luoyang, 471022, Chna [email protected] Abstract.
Genetic Algorithm Based Optimization Model for Reliable Data Storage in Cloud Environment
Advanced Scence and Technology Letters, pp.74-79 http://dx.do.org/10.14257/astl.2014.50.12 Genetc Algorthm Based Optmzaton Model for Relable Data Storage n Cloud Envronment Feng Lu 1,2,3, Hatao Wu 1,3,
Power-of-Two Policies for Single- Warehouse Multi-Retailer Inventory Systems with Order Frequency Discounts
Power-of-wo Polces for Sngle- Warehouse Mult-Retaler Inventory Systems wth Order Frequency Dscounts José A. Ventura Pennsylvana State Unversty (USA) Yale. Herer echnon Israel Insttute of echnology (Israel)
Forecasting the Direction and Strength of Stock Market Movement
Forecastng the Drecton and Strength of Stock Market Movement Jngwe Chen Mng Chen Nan Ye [email protected] [email protected] [email protected] Abstract - Stock market s one of the most complcated systems
Multi-sensor Data Fusion for Cyber Security Situation Awareness
Avalable onlne at www.scencedrect.com Proceda Envronmental Scences 0 (20 ) 029 034 20 3rd Internatonal Conference on Envronmental 3rd Internatonal Conference on Envronmental Scence and Informaton Applcaton
Proactive Secret Sharing Or: How to Cope With Perpetual Leakage
Proactve Secret Sharng Or: How to Cope Wth Perpetual Leakage Paper by Amr Herzberg Stanslaw Jareck Hugo Krawczyk Mot Yung Presentaton by Davd Zage What s Secret Sharng Basc Idea ((2, 2)-threshold scheme):
Hosting Virtual Machines on Distributed Datacenters
Hostng Vrtual Machnes on Dstrbuted Datacenters Chuan Pham Scence and Engneerng, KyungHee Unversty, Korea [email protected] Jae Hyeok Son Scence and Engneerng, KyungHee Unversty, Korea [email protected]
Optimization Model of Reliable Data Storage in Cloud Environment Using Genetic Algorithm
Internatonal Journal of Grd Dstrbuton Computng, pp.175-190 http://dx.do.org/10.14257/gdc.2014.7.6.14 Optmzaton odel of Relable Data Storage n Cloud Envronment Usng Genetc Algorthm Feng Lu 1,2,3, Hatao
A Load-Balancing Algorithm for Cluster-based Multi-core Web Servers
Journal of Computatonal Informaton Systems 7: 13 (2011) 4740-4747 Avalable at http://www.jofcs.com A Load-Balancng Algorthm for Cluster-based Mult-core Web Servers Guohua YOU, Yng ZHAO College of Informaton
A hybrid global optimization algorithm based on parallel chaos optimization and outlook algorithm
Avalable onlne www.ocpr.com Journal of Chemcal and Pharmaceutcal Research, 2014, 6(7):1884-1889 Research Artcle ISSN : 0975-7384 CODEN(USA) : JCPRC5 A hybrd global optmzaton algorthm based on parallel
Improved SVM in Cloud Computing Information Mining
Internatonal Journal of Grd Dstrbuton Computng Vol.8, No.1 (015), pp.33-40 http://dx.do.org/10.1457/jgdc.015.8.1.04 Improved n Cloud Computng Informaton Mnng Lvshuhong (ZhengDe polytechnc college JangSu
An Interest-Oriented Network Evolution Mechanism for Online Communities
An Interest-Orented Network Evoluton Mechansm for Onlne Communtes Cahong Sun and Xaopng Yang School of Informaton, Renmn Unversty of Chna, Bejng 100872, P.R. Chna {chsun,yang}@ruc.edu.cn Abstract. Onlne
A Performance Analysis of View Maintenance Techniques for Data Warehouses
A Performance Analyss of Vew Mantenance Technques for Data Warehouses Xng Wang Dell Computer Corporaton Round Roc, Texas Le Gruenwald The nversty of Olahoma School of Computer Scence orman, OK 739 Guangtao
A Replication-Based and Fault Tolerant Allocation Algorithm for Cloud Computing
A Replcaton-Based and Fault Tolerant Allocaton Algorthm for Cloud Computng Tork Altameem Dept of Computer Scence, RCC, Kng Saud Unversty, PO Box: 28095 11437 Ryadh-Saud Araba Abstract The very large nfrastructure
Module 2 LOSSLESS IMAGE COMPRESSION SYSTEMS. Version 2 ECE IIT, Kharagpur
Module LOSSLESS IMAGE COMPRESSION SYSTEMS Lesson 3 Lossless Compresson: Huffman Codng Instructonal Objectves At the end of ths lesson, the students should be able to:. Defne and measure source entropy..
Secure Network Coding Over the Integers
Secure Network Codng Over the Integers Rosaro Gennaro Jonathan Katz Hugo Krawczyk Tal Rabn Abstract Network codng has receved sgnfcant attenton n the networkng communty for ts potental to ncrease throughput
A Study on Secure Data Storage Strategy in Cloud Computing
Journal of Convergence Informaton Technology Volume 5, Number 7, Setember 00 A Study on Secure Data Storage Strategy n Cloud Comutng Danwe Chen, Yanjun He, Frst Author College of Comuter Technology, Nanjng
Pricing Model of Cloud Computing Service with Partial Multihoming
Prcng Model of Cloud Computng Servce wth Partal Multhomng Zhang Ru 1 Tang Bng-yong 1 1.Glorous Sun School of Busness and Managment Donghua Unversty Shangha 251 Chna E-mal:[email protected] Abstract
A SECURE BILLING SERVICE WITH TWO-FACTOR USER AUTHENTICATION IN WIRELESS SENSOR NETWORKS. Received March 2010; revised July 2010
Internatonal Journal of Innovatve Computng, Informaton and Control ICIC Internatonal c 2011 ISSN 1349-4198 Volume 7, Number 8, August 2011 pp. 4821 4831 A SECURE BILLING SERVICE WITH TWO-FACTOR USER AUTHENTICATION
LITERATURE REVIEW: VARIOUS PRIORITY BASED TASK SCHEDULING ALGORITHMS IN CLOUD COMPUTING
LITERATURE REVIEW: VARIOUS PRIORITY BASED TASK SCHEDULING ALGORITHMS IN CLOUD COMPUTING 1 MS. POOJA.P.VASANI, 2 MR. NISHANT.S. SANGHANI 1 M.Tech. [Software Systems] Student, Patel College of Scence and
What is Candidate Sampling
What s Canddate Samplng Say we have a multclass or mult label problem where each tranng example ( x, T ) conssts of a context x a small (mult)set of target classes T out of a large unverse L of possble
ISSN 2278-3091. Index Terms Cloud computing, outsourcing data, cloud storage security, public auditability
Outsourcing and Discovering Storage Inconsistencies in Cloud Through TPA Sumathi Karanam 1, GL Varaprasad 2 Student, Department of CSE, QIS College of Engineering and Technology, Ongole, AndhraPradesh,India
A Crossplatform ECG Compression Library for Mobile HealthCare Services
A Crossplatform ECG Compresson Lbrary for Moble HealthCare Servces Alexander Borodn, Yulya Zavyalova Department of Computer Scence Petrozavodsk State Unversty Petrozavodsk, Russa {aborod, yzavyalo}@cs.petrsu.ru
Study on Model of Risks Assessment of Standard Operation in Rural Power Network
Study on Model of Rsks Assessment of Standard Operaton n Rural Power Network Qngj L 1, Tao Yang 2 1 Qngj L, College of Informaton and Electrcal Engneerng, Shenyang Agrculture Unversty, Shenyang 110866,
LIFETIME INCOME OPTIONS
LIFETIME INCOME OPTIONS May 2011 by: Marca S. Wagner, Esq. The Wagner Law Group A Professonal Corporaton 99 Summer Street, 13 th Floor Boston, MA 02110 Tel: (617) 357-5200 Fax: (617) 357-5250 www.ersa-lawyers.com
Luby s Alg. for Maximal Independent Sets using Pairwise Independence
Lecture Notes for Randomzed Algorthms Luby s Alg. for Maxmal Independent Sets usng Parwse Independence Last Updated by Erc Vgoda on February, 006 8. Maxmal Independent Sets For a graph G = (V, E), an ndependent
Statistical Approach for Offline Handwritten Signature Verification
Journal of Computer Scence 4 (3): 181-185, 2008 ISSN 1549-3636 2008 Scence Publcatons Statstcal Approach for Offlne Handwrtten Sgnature Verfcaton 2 Debnath Bhattacharyya, 1 Samr Kumar Bandyopadhyay, 2
An RFID Distance Bounding Protocol
An RFID Dstance Boundng Protocol Gerhard P. Hancke and Markus G. Kuhn May 22, 2006 An RFID Dstance Boundng Protocol p. 1 Dstance boundng Verfer d Prover Places an upper bound on physcal dstance Does not
A Dynamic Load Balancing for Massive Multiplayer Online Game Server
A Dynamc Load Balancng for Massve Multplayer Onlne Game Server Jungyoul Lm, Jaeyong Chung, Jnryong Km and Kwanghyun Shm Dgtal Content Research Dvson Electroncs and Telecommuncatons Research Insttute Daejeon,
Provably Secure Single Sign-on Scheme in Distributed Systems and Networks
0 IEEE th Internatonal Conference on Trust, Securty and Prvacy n Computng and Communcatons Provably Secure Sngle Sgn-on Scheme n Dstrbuted Systems and Networks Jangshan Yu, Guln Wang, and Y Mu Center for
iavenue iavenue i i i iavenue iavenue iavenue
Saratoga Systems' enterprse-wde Avenue CRM system s a comprehensve web-enabled software soluton. Ths next generaton system enables you to effectvely manage and enhance your customer relatonshps n both
APPLICATION OF PROBE DATA COLLECTED VIA INFRARED BEACONS TO TRAFFIC MANEGEMENT
APPLICATION OF PROBE DATA COLLECTED VIA INFRARED BEACONS TO TRAFFIC MANEGEMENT Toshhko Oda (1), Kochro Iwaoka (2) (1), (2) Infrastructure Systems Busness Unt, Panasonc System Networks Co., Ltd. Saedo-cho
A DISTRIBUTED REPUTATION MANAGEMENT SCHEME FOR MOBILE AGENT- BASED APPLICATIONS
Bamasak & Zhang: A Dstrbuted Reputaton Management Scheme for Moble Agent-Based Applcatons A DISTRIBUTED REPUTATION MANAGEMENT SCHEME FOR MOBILE AGENT- BASED APPLICATIONS Omama Bamasak School of Computer
SECURE CLOUD STORAGE PRIVACY-PRESERVING PUBLIC AUDITING FOR DATA STORAGE SECURITY IN CLOUD
Volume 1, Issue 7, PP:, JAN JUL 2015. SECURE CLOUD STORAGE PRIVACY-PRESERVING PUBLIC AUDITING FOR DATA STORAGE SECURITY IN CLOUD B ANNAPURNA 1*, G RAVI 2*, 1. II-M.Tech Student, MRCET 2. Assoc. Prof, Dept.
Global innovative solutions You can rely on. www.calyon.com
Global nnovatve solutons You can rely on www.calyon.com CALYON has developed OPTIM SWIFTNet for ts clents. By provdng an extensve range of value-added servces, OPTIM SWIFTNet offers you worldwde connectons
Practical and Secure Solutions for Integer Comparison
In Publc Key Cryptography PKC 07, Vol. 4450 of Lecture Notes n Computer Scence, Sprnger-Verlag, 2007. pp. 330-342. Practcal and Secure Solutons for Integer Comparson Juan Garay 1, erry Schoenmakers 2,
"Research Note" APPLICATION OF CHARGE SIMULATION METHOD TO ELECTRIC FIELD CALCULATION IN THE POWER CABLES *
Iranan Journal of Scence & Technology, Transacton B, Engneerng, ol. 30, No. B6, 789-794 rnted n The Islamc Republc of Iran, 006 Shraz Unversty "Research Note" ALICATION OF CHARGE SIMULATION METHOD TO ELECTRIC
Dynamic Pricing for Smart Grid with Reinforcement Learning
Dynamc Prcng for Smart Grd wth Renforcement Learnng Byung-Gook Km, Yu Zhang, Mhaela van der Schaar, and Jang-Won Lee Samsung Electroncs, Suwon, Korea Department of Electrcal Engneerng, UCLA, Los Angeles,
A DYNAMIC CUSTOMIZABLE ARCHITECTURE FOR SAAS BASED PLATFORM
A DYNAMIC CUSTOMIZABLE ARCHITECTURE FOR SAAS BASED PLATFORM 1 WEIZHI LIAO, 2 LINFU SUN 1 School of Electromechancal Engneerng, UESTC of Chna, Chengdu 610054, Chna 2 CAD Engneerng Center, Southwest JIAOTONG
Chosen Public Key and Ciphertext Secure Proxy Re-encryption Schemes
Internatonal Journal of Dgtal ontent Technology and ts Alcatons Volume 4 Number 9 December 00 hosen Publc Key and hertext Secure Proxy Re-encryton Schemes Lmng Fang Wlly Suslo Yongun Ren huneng Ge and
Partner selection of cloud computing federation based on Markov chains
COMPUER MODELLING & NEW ECHNOLOGIES 2014 18(12B) 590-594 Abstract Partner selecton of cloud computng federaton based on Markov chans Lang Hong 1,2, Changyuan Gao 1* 1 School of Management, Harbn Unversty
Application of an Improved BP Neural Network Model in Enterprise Network Security Forecasting
161 A publcaton of VOL. 46, 15 CHEMICAL ENGINEERING TRANSACTIONS Guest Edtors: Peyu Ren, Yancang L, Hupng Song Copyrght 15, AIDIC Servz S.r.l., ISBN 978-88-9568-37-; ISSN 83-916 The Italan Assocaton of
Canon NTSC Help Desk Documentation
Canon NTSC Help Desk Documentaton READ THIS BEFORE PROCEEDING Before revewng ths documentaton, Canon Busness Solutons, Inc. ( CBS ) hereby refers you, the customer or customer s representatve or agent
Open Access A Load Balancing Strategy with Bandwidth Constraint in Cloud Computing. Jing Deng 1,*, Ping Guo 2, Qi Li 3, Haizhu Chen 1
Send Orders for Reprnts to [email protected] The Open Cybernetcs & Systemcs Journal, 2014, 8, 115-121 115 Open Access A Load Balancng Strategy wth Bandwdth Constrant n Cloud Computng Jng Deng 1,*,
CLOUD COMPUTING AUDIT
U.P.B. Sc. Bull., Seres C, Vol. 77, Iss. 3, 2015 ISSN 2286-3540 CLOUD COMPUTING AUDIT Georgana MATEESCU 1, Valentn SGÂRCIU 2 Ths paper presents a personal approach of conductng the audt process n cloud
Frequency Selective IQ Phase and IQ Amplitude Imbalance Adjustments for OFDM Direct Conversion Transmitters
Frequency Selectve IQ Phase and IQ Ampltude Imbalance Adjustments for OFDM Drect Converson ransmtters Edmund Coersmeer, Ernst Zelnsk Noka, Meesmannstrasse 103, 44807 Bochum, Germany [email protected],
Minimal Coding Network With Combinatorial Structure For Instantaneous Recovery From Edge Failures
Mnmal Codng Network Wth Combnatoral Structure For Instantaneous Recovery From Edge Falures Ashly Joseph 1, Mr.M.Sadsh Sendl 2, Dr.S.Karthk 3 1 Fnal Year ME CSE Student Department of Computer Scence Engneerng
How Sets of Coherent Probabilities May Serve as Models for Degrees of Incoherence
1 st Internatonal Symposum on Imprecse Probabltes and Ther Applcatons, Ghent, Belgum, 29 June 2 July 1999 How Sets of Coherent Probabltes May Serve as Models for Degrees of Incoherence Mar J. Schervsh
Data Broadcast on a Multi-System Heterogeneous Overlayed Wireless Network *
JOURNAL OF INFORMATION SCIENCE AND ENGINEERING 24, 819-840 (2008) Data Broadcast on a Mult-System Heterogeneous Overlayed Wreless Network * Department of Computer Scence Natonal Chao Tung Unversty Hsnchu,
Implementation of Deutsch's Algorithm Using Mathcad
Implementaton of Deutsch's Algorthm Usng Mathcad Frank Roux The followng s a Mathcad mplementaton of Davd Deutsch's quantum computer prototype as presented on pages - n "Machnes, Logc and Quantum Physcs"
For example, you might want to capture security group membership changes. A quick web search may lead you to the 632 event.
Audtng Wndows & Actve Drectory Changes va Wndows Event Logs Ths document takes a lghtweght look at the steps and consderatons nvolved n settng up Wndows and/or Actve Drectory event log audtng. Settng up
An Alternative Way to Measure Private Equity Performance
An Alternatve Way to Measure Prvate Equty Performance Peter Todd Parlux Investment Technology LLC Summary Internal Rate of Return (IRR) s probably the most common way to measure the performance of prvate
Feature selection for intrusion detection. Slobodan Petrović NISlab, Gjøvik University College
Feature selecton for ntruson detecton Slobodan Petrovć NISlab, Gjøvk Unversty College Contents The feature selecton problem Intruson detecton Traffc features relevant for IDS The CFS measure The mrmr measure
Optimization of File Allocation for Video Sharing Servers
Optmzaton of Fle Allocaton for Vdeo Sharng Servers Emad Mohamed Abd Elrahman Abousabea, Hossam Aff To cte ths verson: Emad Mohamed Abd Elrahman Abousabea, Hossam Aff. Optmzaton of Fle Allocaton for Vdeo
CONSIDERATION OF DYNAMIC STORAGE ATTRIBUTES IN CLOUD
INTERNATIONAL JOURNAL OF ADVANCED RESEARCH IN ENGINEERING AND SCIENCE CONSIDERATION OF DYNAMIC STORAGE ATTRIBUTES IN CLOUD Ravi Sativada 1, M.Prabhakar Rao 2 1 M.Tech Student, Dept of CSE, Chilkur Balaji
Verifying Correctness of Trusted data in Clouds
Volume-3, Issue-6, December-2013, ISSN No.: 2250-0758 International Journal of Engineering and Management Research Available at: www.ijemr.net Page Number: 21-25 Verifying Correctness of Trusted data in
A Secure Nonrepudiable Threshold Proxy Signature Scheme with Known Signers
INFORMATICA, 2000, Vol. 11, No. 2, 137 144 137 2000 Insttute of Mathematcs and Informatcs, Vlnus A Secure Nonrepudable Threshold Proxy Sgnature Scheme wth Known Sgners Mn-Shang HWANG, Iuon-Chang LIN, Erc
An ILP Formulation for Task Mapping and Scheduling on Multi-core Architectures
An ILP Formulaton for Task Mappng and Schedulng on Mult-core Archtectures Yng Y, We Han, Xn Zhao, Ahmet T. Erdogan and Tughrul Arslan Unversty of Ednburgh, The Kng's Buldngs, Mayfeld Road, Ednburgh, EH9
Research of Network System Reconfigurable Model Based on the Finite State Automation
JOURNAL OF NETWORKS, VOL., NO. 5, MAY 24 237 Research of Network System Reconfgurable Model Based on the Fnte State Automaton Shenghan Zhou and Wenbng Chang School of Relablty and System Engneerng, Behang
Mathematical Framework for A Novel Database Replication Algorithm
I.J.Modern Educaton and Computer Scence, 203, 9, -0 Publshed Onlne October 203 n MECS (http://www.mecs-press.org/) DOI: 0.585/jmecs.203.09.0 Mathematcal Framework for A Novel Database Replcaton Algorthm
Scalable and Secure Architecture for Digital Content Distribution
Valer Bocan Scalable and Secure Archtecture for Dgtal Content Dstrbuton Mha Fagadar-Cosma Department of Computer Scence and Engneerng Informaton Technology Department Poltehnca Unversty of Tmsoara Alcatel
A New Service Pricing Mechanism based on Coalition Game Theory in
A New Servce Prcng Mechansm based on Coalton Game Theory n Cloud Servce A New Servce Prcng Mechansm based on Coalton Game Theory n Cloud Servce 1 Luyun Xu, 2 Yunsheng Zhang *1, Frst Author, Correspondng
Network Security Situation Evaluation Method for Distributed Denial of Service
Network Securty Stuaton Evaluaton Method for Dstrbuted Denal of Servce Jn Q,2, Cu YMn,2, Huang MnHuan,2, Kuang XaoHu,2, TangHong,2 ) Scence and Technology on Informaton System Securty Laboratory, Bejng,
An Adaptive and Distributed Clustering Scheme for Wireless Sensor Networks
2007 Internatonal Conference on Convergence Informaton Technology An Adaptve and Dstrbuted Clusterng Scheme for Wreless Sensor Networs Xnguo Wang, Xnmng Zhang, Guolang Chen, Shuang Tan Department of Computer
EFFICIENT DISCOVERY OF INTEGRITY AUTOMATION IN HYBRID CLOUD COMPUTING
INTERNATIONAL JOURNAL OF REVIEWS ON RECENT ELECTRONICS AND COMPUTER SCIENCE EFFICIENT DISCOVERY OF INTEGRITY AUTOMATION IN HYBRID CLOUD COMPUTING K.Saipriya 1, A.Ravi Kumar 2 1 M.Tech Student, Dept of
Resource Scheduling in Desktop Grid by Grid-JQA
The 3rd Internatonal Conference on Grd and Pervasve Computng - Worshops esource Schedulng n Destop Grd by Grd-JQA L. Mohammad Khanl M. Analou Assstant professor Assstant professor C.S. Dept.Tabrz Unversty
v a 1 b 1 i, a 2 b 2 i,..., a n b n i.
SECTION 8.4 COMPLEX VECTOR SPACES AND INNER PRODUCTS 455 8.4 COMPLEX VECTOR SPACES AND INNER PRODUCTS All the vector spaces we have studed thus far n the text are real vector spaces snce the scalars are
PKIS: practical keyword index search on cloud datacenter
Park et al. EURASIP Journal on Wreless Communcatons and Networkng 20, 20:64 http://jwcn.euraspjournals.com/content/20//64 RESEARCH Open Access PKIS: practcal keyword ndex search on cloud datacenter Hyun-A
Politecnico di Torino. Porto Institutional Repository
Poltecnco d Torno Porto Insttutonal Repostory [Artcle] A cost-effectve cloud computng framework for acceleratng multmeda communcaton smulatons Orgnal Ctaton: D. Angel, E. Masala (2012). A cost-effectve
How To Classfy Onlne Mesh Network Traffc Classfcaton And Onlna Wreless Mesh Network Traffic Onlnge Network
Journal of Computatonal Informaton Systems 7:5 (2011) 1524-1532 Avalable at http://www.jofcs.com Onlne Wreless Mesh Network Traffc Classfcaton usng Machne Learnng Chengje GU 1,, Shuny ZHANG 1, Xaozhen
How To Understand The Results Of The German Meris Cloud And Water Vapour Product
Ttel: Project: Doc. No.: MERIS level 3 cloud and water vapour products MAPP MAPP-ATBD-ClWVL3 Issue: 1 Revson: 0 Date: 9.12.1998 Functon Name Organsaton Sgnature Date Author: Bennartz FUB Preusker FUB Schüller
An Evaluation of the Extended Logistic, Simple Logistic, and Gompertz Models for Forecasting Short Lifecycle Products and Services
An Evaluaton of the Extended Logstc, Smple Logstc, and Gompertz Models for Forecastng Short Lfecycle Products and Servces Charles V. Trappey a,1, Hsn-yng Wu b a Professor (Management Scence), Natonal Chao
IMPACT ANALYSIS OF A CELLULAR PHONE
4 th ASA & μeta Internatonal Conference IMPACT AALYSIS OF A CELLULAR PHOE We Lu, 2 Hongy L Bejng FEAonlne Engneerng Co.,Ltd. Bejng, Chna ABSTRACT Drop test smulaton plays an mportant role n nvestgatng
Single and multiple stage classifiers implementing logistic discrimination
Sngle and multple stage classfers mplementng logstc dscrmnaton Hélo Radke Bttencourt 1 Dens Alter de Olvera Moraes 2 Vctor Haertel 2 1 Pontfíca Unversdade Católca do Ro Grande do Sul - PUCRS Av. Ipranga,
