Fuzzy Keyword Search over Encrypted Data in Cloud Computing

Size: px
Start display at page:

Download "Fuzzy Keyword Search over Encrypted Data in Cloud Computing"

Transcription

1 Fuzzy Keyword Search over Encrypted Data n Cloud Computng Jn L,QanWang, Cong Wang,NngCao,KuRen, and Wenjng Lou Department of ECE, Illnos Insttute of Technology Department of ECE, Worcester Polytechnc Insttute Emal: {jnl, qan, cong, kren}@ece.t.edu, {ncao, wjlou}@ece.wp.edu Abstract As Cloud Computng becomes prevalent, more and more senstve nformaton are beng centralzed nto the cloud. For the protecton of data prvacy, senstve data usually have to be encrypted before outsourcng, whch makes effectve data utlzaton a very challengng task. Although tradtonal searchable encrypton schemes allow a user to securely search over encrypted data through keywords and selectvely retreve fles of nterest, these technques support only exact keyword search. That s, there s no tolerance of mnor typos and format nconsstences whch, on the other hand, are typcal user searchng behavor and happen very frequently. Ths sgnfcant drawback makes exstng technques unsutable n Cloud Computng as t greatly affects system usablty, renderng user searchng experences very frustratng and system effcacy very low. In ths paper, for the frst tme we formalze and solve the problem of effectve fuzzy keyword search over encrypted cloud data whle mantanng keyword prvacy. Fuzzy keyword search greatly enhances system usablty by returnng the matchng fles when users searchng nputs exactly match the predefned keywords or the closest possble matchng fles based on keyword smlarty semantcs, when exact match fals. In our soluton, we explot edt dstance to quantfy keywords smlarty and develop an advanced technque on constructng fuzzy keyword sets, whch greatly reduces the storage and representaton overheads. Through rgorous securty analyss, we show that our proposed soluton s secure and prvacy-preservng, whle correctly realzng the goal of fuzzy keyword search. I. INTRODUCTION As Cloud Computng becomes prevalent, more and more senstve nformaton are beng centralzed nto the cloud, such as emals, personal health records, government documents, etc. By storng ther data nto the cloud, the data owners can be releved from the burden of data storage and mantenance so as to enjoy the on-demand hgh qualty data storage servce. However, the fact that data owners and cloud server are not n the same trusted doman may put the oursourced data at rsk, as the cloud server may no longer be fully trusted. It follows that senstve data usually should be encrypted pror to outsourcng for data prvacy and combatng unsolcted accesses. However, data encrypton makes effectve data utlzaton a very challengng task gven that there could be a large amount of outsourced data fles. Moreover, n Cloud Computng, data owners may share ther outsourced data wth a large number of users. The ndvdual users mght want to only retreve certan specfc data fles they are nterested n durng a gven sesson. One of the most popular ways s to selectvely retreve fles through keyword-based search nstead of retrevng all the encrypted fles back whch s completely mpractcal n cloud computng scenaros. Such keyword-based search technque allows users to selectvely retreve fles of nterest and has been wdely appled n plantext search scenaros, such as Google search [1]. Unfortunately, data encrypton restrcts user s ablty to perform keyword search and thus makes the tradtonal plantext search methods unsutable for Cloud Computng. Besdes ths, data encrypton also demands the protecton of keyword prvacy snce keywords usually contan mportant nformaton related to the data fles. Although encrypton of keywords can protect keyword prvacy, t further renders the tradtonal plantext search technques useless n ths scenaro. To securely search over encrypted data, searchable encrypton technques have been developed n recent years [2] [10]. Searchable encrypton schemes usually buld up an ndex for each keyword of nterest and assocate the ndex wth the fles that contan the keyword. By ntegratng the trapdoors of keywords wthn the ndex nformaton, effectve keyword search can be realzed whle both fle content and keyword prvacy are well-preserved. Although allowng for performng searches securely and effectvely, the exstng searchable encrypton technques do not sut for cloud computng scenaro snce they support only exact keyword search. That s, there s no tolerance of mnor typos and format nconsstences. It s qute common that users searchng nput mght not exactly match those pre-set keywords due to the possble typos, such as Illnos and Ilnos, representaton nconsstences, such as PO BOX and P.O. Box, and/or her lack of exact knowledge about the data. The nave way to support fuzzy keyword search s through smple spell check mechansms. However, ths approach does not completely solve the problem and sometmes can be neffectve due to the followng reasons: on the one hand, t requres addtonal nteracton of user to determne the correct word from the canddates generated by the spell check algorthm, whch unnecessarly costs user s extra computaton effort; on the other hand, n case that user accdentally types some other vald keywords by mstake (for example, search for hat by carelessly typng cat ), the spell check algorthm would not even work at all, as t can never dfferentate between two actual vald words. Thus, the drawbacks of exstng schemes sgnfes the mportant need for new technques that support searchng flexblty, toleratng both mnor typos and format nconsstences. In ths paper, we focus on enablng effectve yet prvacy-

2 preservng fuzzy keyword search n Cloud Computng. To the best of our knowledge, we formalze for the frst tme the problem of effectve fuzzy keyword search over encrypted cloud data whle mantanng keyword prvacy. Fuzzy keyword search greatly enhances system usablty by returnng the matchng fles when users searchng nputs exactly match the predefned keywords or the closest possble matchng fles based on keyword smlarty semantcs, when exact match fals. More specfcally, we use edt dstance to quantfy keywords smlarty and develop a novel technque,.e., an wldcard-based technque, for the constructon of fuzzy keyword sets. Ths technque elmnates the need for enumeratng all the fuzzy keywords and the resulted sze of the fuzzy keyword sets s sgnfcantly reduced. Based on the constructed fuzzy keyword sets, we propose an effcent fuzzy keyword search scheme. Through rgorous securty analyss, we show that the proposed soluton s secure and prvacy-preservng, whle correctly realzng the goal of fuzzy keyword search. The rest of paper s organzed as follows: Secton II summarzes the features of related work. Secton III ntroduces the system model, threat model, our desgn goal and brefly descrbes some necessary background for the technques used n ths paper. Secton IV shows a straghtforward constructon of fuzzy keyword search scheme. Secton V provdes the detaled descrpton of our proposed schemes, ncludng the effcent constructons of fuzzy keyword set and fuzzy keyword search scheme. Secton VI presents the securty analyss. Fnally, Secton VIII concludes the paper. II. RELATED WORK Plantext fuzzy keyword search. Recently, the mportance of fuzzy search has receved attenton n the context of plantext searchng n nformaton retreval communty [11] [13]. They addressed ths problem n the tradtonal nformatonaccess paradgm by allowng user to search wthout usng try-and-see approach for fndng relevant nformaton based on approxmate strng matchng. At the frst glance, t seems possble for one to drectly apply these strng matchng algorthms to the context of searchable encrypton by computng the trapdoors on a character base wthn an alphabet. However, ths trval constructon suffers from the dctonary and statstcs attacks and fals to acheve the search prvacy. Searchable encrypton. Tradtonal searchable encrypton [2] [8], [10] has been wdely studed n the context of cryptography. Among those works, most are focused on effcency mprovements and securty defnton formalzatons. The frst constructon of searchable encrypton was proposed by Song et al. [3], n whch each word n the document s encrypted ndependently under a specal two-layered encrypton constructon. Goh [4] proposed to use Bloom flters to construct the ndexes for the data fles. To acheve more effcent search, Chang et al. [7] and Curtmola et al. [8] both proposed smlar ndex approaches, where a sngle encrypted hash table ndex s bult for the entre Owner Fuzzy keyword set Fles Index Encrypted Fles outsource outsource Cloud server Trapdoors of search request Fle retreval Users Fg. 1: Archtecture of the fuzzy keyword search fle collecton. In the ndex table, each entry conssts of the trapdoor of a keyword and an encrypted set of fle dentfers whose correspondng data fles contan the keyword. As a complementary approach, Boneh et al. [5] presented a publc-key based searchable encrypton scheme, wth an analogous scenaro to that of [3]. Note that all these exstng schemes support only exact keyword search, and thus are not sutable for Cloud Computng. Others. Prvate matchng [14], as another related noton, has been studed mostly n the context of secure multparty computaton to let dfferent partes compute some functon of ther own data collaboratvely wthout revealng ther data to the others. These functons could be ntersecton or approxmate prvate matchng of two sets, etc. The prvate nformaton retreval [15] s an often-used technque to retreve the matchng tems secretly, whch has been wdely appled n nformaton retreval from database and usually ncurs unexpectedly computaton complexty. III. PROBLEM FORMULATION A. System Model In ths paper, we consder a cloud data system consstng of data owner, data user and cloud server. Gven a collecton of n encrypted data fles C = (F 1, F 2,...,F N ) stored n the cloud server, a predefned set of dstnct keywords W = {w 1,w 2,..., w p }, the cloud server provdes the search servce for the authorzed users over the encrypted data C. We assume the authorzaton between the data owner and users s approprately done. An authorzed user types n a request to selectvely retreve data fles of hs/her nterest. The cloud server s responsble for mappng the searchng request to a set of data fles, where each fle s ndexed by a fle ID and lnked to a set of keywords. The fuzzy keyword search scheme returns the search results accordng to the followng rules: 1) f the user s searchng nput exactly matches the pre-set keyword, the server s expected to return the fles contanng the keyword 1 ; 2) f there exst typos and/or format nconsstences n the searchng nput, the server wll return the closest possble results based on pre-specfed smlarty semantcs (to be formally defned n secton III-D). An archtecture of fuzzy keyword search s shown n the Fg Note that we do not dfferentate between fles and fle IDs n ths paper.

3 B. Threat Model We consder a sem-trusted server. Even though data fles are encrypted, the cloud server may try to derve other senstve nformaton from users search requests whle performng keyword-based search over C. Thus, the search should be conducted n a secure manner that allows data fles to be securely retreved whle revealng as lttle nformaton as possble to the cloud server. In ths paper, when desgnng fuzzy keyword search scheme, we wll follow the securty defnton deployed n the tradtonal searchable encrypton [8]. More specfcally, t s requred that nothng should be leaked from the remotely stored fles and ndex beyond the outcome and the pattern of search queres. C. Desgn Goals In ths paper, we address the problem of supportng effcent yet prvacy-preservng fuzzy keyword search servces over encrypted cloud data. Specfcally, we have the followng goals: ) to explore new mechansm for constructng storageeffcent fuzzy keyword sets; ) to desgn effcent and effectve fuzzy search scheme based on the constructed fuzzy keyword sets; ) to valdate the securty of the proposed scheme. D. Prelmnares Edt Dstance There are several methods to quanttatvely measure the strng smlarty. In ths paper, we resort to the well-studed edt dstance [16] for our purpose. The edt dstance ed(w 1,w 2 ) between two words w 1 and w 2 s the number of operatons requred to transform one of them nto the other. The three prmtve operatons are 1) Substtuton: changng one character to another n a word; 2) Deleton: deletng one character from a word; 3) Inserton: nsertng a sngle character nto a word. Gven a keyword w, welet S w,d denote the set of words w satsfyng ed(w, w ) d for a certan nteger d. Fuzzy Keyword Search Usng edt dstance, the defnton of fuzzy keyword search can be formulated as follows: Gven a collecton of n encrypted data fles C =(F 1,F 2,...,F N ) stored n the cloud server, a set of dstnct keywords W = {w 1,w 2,..., w p } wth predefned edt dstance d, and a searchng nput (w, k) wth edt dstance k (k d), the executon of fuzzy keyword search returns a set of fle IDs whose correspondng data fles possbly contan the word w, denoted as FID w :fw = w W, then return FID w ; otherwse, f w W, then return {FID w }, where ed(w, w ) k. Note that the above defnton s based on the assumpton that k d. In fact, d can be dfferent for dstnct keywords and the system wll return {FID w } satsfyng ed(w, w ) mn{k, d} f exact match fals. IV. THE STRAIGHTFORWARD APPROACH Before ntroducng our constructon of fuzzy keyword sets, we frst propose a straghtforward approach that acheves all the functons of fuzzy keyword search, whch ams at provdng an overvew of how fuzzy search scheme works over encrypted data. Assume Π=(Setup(1 λ ), Enc(sk, ), Dec(sk, )) sasymmetrc encrypton scheme, where sk s a secret key, Setup(1 λ ) s the setup algorthm wth securty parameter λ, Enc(sk, ) and Dec(sk, ) are the encrypton and decrypton algorthms, respectvely. Let T w denote a trapdoor of keyword w. Trapdoors of the keywords can be realzed by applyng a one-way functon f, whch s smlar as [2], [4], [8]: Gven a keyword w and a secret key sk, we can compute the trapdoor of w as T w = f(sk, w ). The scheme of the fuzzy keyword search goes as follows: We begn by constructng the fuzzy keyword set S w,d for each keyword w W (1 p) wth edt dstance d. The ntutve way to construct the fuzzy keyword set of w s to enumerate all possble words w that satsfy the smlarty crtera ed(w,w ) d, that s, all the words wth edt dstance d from w are lsted. For example, the followng s the lstng varants after a substtuton operaton on the frst character of keyword CASTLE: {AASTLE, BASTLE, DASTLE,, YASTLE, ZASTLE}. Based on the resulted fuzzy keyword sets, the fuzzy search over encrypted data s conducted as follows: 1) To buld an ndex for w, the data owner computes trapdoors T w = f(sk, w ) for each w S w,d wth a secret key sk shared between data owner and authorzed users. The data owner also encrypts FID w as Enc(sk, FID w w ).The ndex table {({T w } w S, Enc(sk, FID w,d w w ))} w W and encrypted data fles are outsourced to the cloud server for stroage; 2) To search wth w, the authorzed user computes the trapdoor T w of w and sends t to the server; 3) Upon recevng the search request T w, the server compares t wth the ndex table and returns all the possble encrypted fle dentfers {Enc(sk, FID w w )} accordng to the fuzzy keyword defnton n secton III-D. The user decrypts the returned results and retreves relevant fles of nterest. Ths straghtforward approach apparently provdes fuzzy keyword search over the encrypted fles whle achevng search prvacy usng the technque of secure trapdoors. However, ths approach has serous effcency dsadvantages. The smple enumeraton method n constructng fuzzy keyword sets would ntroduce large storage complextes, whch greatly affect the usablty. Recall that n the defnton of edt dstance, substtuton, deleton and nserton are three knds of operatons n computaton of edt dstance. The numbers of all smlar words of w satsfyng ed(w,w ) d for d = 1, 2 and 3 are approxmately 2k 26, 2k , and 4 3 k3 26 3, respectvely. For example, assume there are 10 4 keywords n the fle collecton wth average keyword length 10, d =2, and the output length of hash functon s 160 bts, then, the resulted storage cost for the ndex wll be 30GB. Therefore, t brngs forth the demand for fuzzy keyword sets wth smaller sze.

4 V. CONSTRUCTIONS OF EFFECTIVE FUZZY KEYWORD SEARCH IN CLOUD The key dea behnd our secure fuzzy keyword search s two-fold: 1) buldng up fuzzy keyword sets that ncorporate not only the exact keywords but also the ones dfferng slghtly due to mnor typos, format nconsstences, etc.; 2) desgnng an effcent and secure searchng approach for fle retreval based on the resulted fuzzy keyword sets. A. Advanced Technque for Constructng Fuzzy Keyword Sets To provde more practcal and effectve fuzzy keyword search constructons wth regard to both storage and search effcency, we now propose an advanced technque to mprove the straghtforward approach for constructng the fuzzy keyword set. Wthout loss of generalty, we wll focus on the case of edt dstance d = 1 to elaborate the proposed advanced technque. For larger values of d, the reasonng s smlar. Note that the technque s carefully desgned n such a way that whle suppressng the fuzzy keyword set, t wll not affect the search correctness. Wldcard-based Fuzzy Set Constructon In the above straghtforward approach, all the varants of the keywords have to be lsted even f an operaton s performed at the same poston. Based on the above observaton, we proposed to use a wldcard to denote edt operatons at the same poston. The wldcard-based fuzzy set of w wth edt dstance d s denoted as S w,d={s w,0,s w,1,, S w }, where,d S w,τ denotes the set of words w wth τ wldcards. Note each wldcard represents an edt operaton on w. For example, for the keyword CASTLE wth the pre-set edt dstance 1, ts wldcard-based fuzzy keyword set can be constructed as S CASTLE,1 = {CASTLE, *CASTLE, *ASTLE, C*ASTLE, C*STLE,, CASTL*E, CASTL*, CASTLE*}. The total number of varants on CASTLE constructed n ths way s only , nstead of as n the above exhaustve enumeraton approach when the edt dstance s set to be 1. Generally, for a gven keyword w wth length l, the sze of S w,1 wll be only 2l +1+1, as compared to (2l +1) obtaned n the straghtforward approach. The larger the pre-set edt dstance, the more storage overhead can be reduced: wth the same settng of the example n the straghtforward approach, the proposed technque can help reduce the storage of the ndex from 30GB to approxmately 40MB. In case the edt dstance s set to be 2 and 3, the sze of S w,2 and S w,3 wll be Cl+1 1 +C1 l C1 l +2C2 l+2 and Cl 1 + C3 l +2C2 l +2C2 l C1 l. In other words, the number s only O(l d ) for the keyword wth length l and edt dstance d. B. The Effcent Fuzzy Keyword Search Scheme Based on the storage-effcent fuzzy keyword sets, we show how to construct an effcent and effectve fuzzy keyword search scheme. The scheme of the fuzzy keyword search goes as follows: 1) To buld an ndex for w wth edt dstance d, the data owner frst constructs a fuzzy keyword set S w,d usng the wldcard based technque. Then he computes trapdoor set {T w } for each w S w,d wth a secret key sk shared between data owner and authorzed users. The data owner encrypts FID w as Enc(sk, FID w w ). The ndex table {({T w } w S, Enc(sk, FID w,d w w ))} w W and encrypted data fles are outsourced to the cloud server for storage; 2) To search wth (w, k), the authorzed user computes the trapdoor set {T w } w S w,k, where S w,k s also derved from the wldcard-based fuzzy set constructon. He then sends {T w } w S w,k to the server; 3) Upon recevng the search request {T w } w S w,k, the server compares them wth the ndex table and returns all the possble encrypted fle dentfers {Enc(sk, FID w w )} accordng to the fuzzy keyword defnton n secton III-D. The user decrypts the returned results and retreves relevant fles of nterest. In ths constructon, the technque of constructng search request for w s the same as the constructon of ndex for a keyword. As a result, the search request s a trapdoor set based on S w,k, nstead of a sngle trapdoor as n the straghtforward approach. In ths way, the searchng result correctness can be ensured. VI. SECURITY ANALYSIS In ths secton, we analyze the correctness and securty of the proposed fuzzy keyword search scheme. At frst, we show the correctness of the schemes n terms of two aspects, that s, completeness and soundness. Theorem 1: The wldcard-based scheme satsfes both completeness and soundness. Specfcally, upon recevng the request of w, all of the keywords {w } wll be returned f and only f ed(w, w ) k. The proof of ths Theorem can be reduced to the followng Lemma: Lemma 1: The ntersecton of the fuzzy sets S w,d and S w,k for w and w s not empty f and only f ed(w, w ) k. Proof: Frst, we show that S w,d S w,k s not empty when ed(w, w ) k. To prove ths, t s enough to fnd an element n S w,d S w,k.letw = a 1 a 2 a s and w = b 1 b 2 b t, where all these a and b j are sngle characters. After ed(w, w ) edt operatons, w can be changed to w accordng to the defnton of edt dstance. Let w = a 1a 2 a m, where a = a j or a = f any operaton s performed at ths poston. Snce the edt operaton s nverted, from w, the same postons contanng wldcard at w wll be performed. Because ed(w, w ) k, w s ncluded n both S w,d and S w,k, we get the result that S w,d S w,k s not empty. Next, we prove that S w,d S w,k s empty f ed(w, w ) >k. The proof s gven by reducton. Assume there exsts an w belongng to S w,d S w,k. We wll show that ed(w, w ) k,

5 whch reaches a contradcton. Frst, from the assumpton that w S w,d S w,k, we can get the number of wldcard n w, whch s denoted by n, s not greater than k. Next,we prove that ed(w, w ) n. We wll prove the nequalty wth nducton method. Frst, we prove t holds when n =1. There are nne cases should be consdered: If w s derved from the operaton of deleton from both w and w, then, ed(w,w) 1 because the other characters are the same except the character at the same poston. If the operaton s deleton from w and substtuton from w, wehaveed(w,w) 1 because they wll be the same after at most one substtuton from w. The other cases can be analyzed n a smlar way and are omtted. Now, assumng that t holds when n = γ, we need to prove t also holds when n = γ +1.Ifŵ = a 1a 2 a n S w,d S w,k, where a = a j or a =. For a wldcard at poston t, cancel the underlyng operatons and revert t to the orgnal characters n w and w at ths poston. Assume two new elements w and w are derved from them respectvely. Then perform one operaton at poston t of w to make the character of w at ths poston be the same wth w, whch s denoted by w. After ths operaton, w wll be changed to w, whch has only k wldcards. Therefore, we have ed(w,w) γ from the assumpton. We know that ed(w,w) γ and ed(w,w )=1, based on whch we know that ed(w,w) γ +1. Thus, we can get ed(w, w ) n. It renders the contradcton ed(w, w ) k because n k. Therefore, S w,d S w,k s empty f ed(w, w ) >k. Theorem 2: The fuzzy keyword search scheme s secure regardng the search prvacy. Proof: In the wldcard-based scheme, the computaton of ndex and request of the same keyword s dentcal. Therefore, we only need to prove the ndex prvacy by usng reducton. Suppose the searchable encrypton scheme fals to acheve the ndex prvacy aganst the ndstngushablty under the chosen keyword attack, whch means there exsts an algorthm A who can get the underlyng nformaton of keyword from the ndex. Then, we buld an algorthm A that utlzes A to determne whether some functon f ( ) s a pseudo-random functon such that f ( ) s equal to f(sk, ) or a random functon. A has an access to an oracle O f ( ) that takes as nput secret value x and returns f (x). Upon recevng any request of the ndex computaton, A answers t wth request to the oracle O f ( ). After makng these trapdoor queres, the adversary outputs two challenge keywords w0 and w1 wth the same length and edt dstance, whch can be relaxed by addng some redundant trapdoors. A pcks one random b {0, 1} and sends wb to the challenger. Then, A s gven a challenge value y, whch s ether computed from a pseudo-random functon f(sk, ) or a random functon. A sends y back to A, who answers wth b {0, 1}. Suppose A guesses b correctly wth nonneglgble probablty, whch ndcates that the value s not randomly computed. Then, A makes a decson that f ( ) s a pseudo-random functon. As a result, based on the assumpton of the ndstngushablty of the pseudo-random functon from some real random functon, A at most guesses b correctly wth approxmate probablty 1/2. Thus, the search prvacy s obtaned. VII. CONCLUSION In ths paper, for the frst tme we formalze and solve the problem of supportng effcent yet prvacy-preservng fuzzy search for achevng effectve utlzaton of remotely stored encrypted data n Cloud Computng. We desgn an advanced technque (.e., wldcard-based technque) to construct the storage-effcent fuzzy keyword sets by explotng a sgnfcant observaton on the smlarty metrc of edt dstance. Based on the constructed fuzzy keyword sets, we further propose an effcent fuzzy keyword search scheme. Through rgorous securty analyss, we show that our proposed soluton s secure and prvacy-preservng, whle correctly realzng the goal of fuzzy keyword search. As our ongong work, we wll contnue to research on securty mechansms that support: 1) search semantcs that takes nto consderaton conjuncton of keywords, sequence of keywords, and even the complex natural language semantcs to produce hghly relevant search results; and 2) search rankng that sorts the searchng results accordng to the relevance crtera. REFERENCES [1] Google, Brtney spears spellng correcton, Referenced onlne at http: // June [2] M. Bellare, A. Boldyreva, and A. O Nell, Determnstc and effcently searchable encrypton, n Proceedngs of Crypto 2007, volume 4622 of LNCS. Sprnger-Verlag, [3] D. Song, D. Wagner, and A. Perrg, Practcal technques for searches on encrypted data, n Proc. of IEEE Symposum on Securty and Prvacy 00, [4] E.-J. Goh, Secure ndexes, Cryptology eprnt Archve, Report 2003/216, 2003, [5] D. Boneh, G. D. Crescenzo, R. Ostrovsky, and G. Persano, Publc key encrypton wth keyword search, n Proc. of EUROCRYP 04, [6] B. Waters, D. Balfanz, G. Durfee, and D. Smetters, Buldng an encrypted and searchable audt log, n Proc. of 11th Annual Network and Dstrbuted System, [7] Y.-C. Chang and M. Mtzenmacher, Prvacy preservng keyword searches on remote encrypted data, n Proc. of ACNS 05, [8] R. Curtmola, J. A. Garay, S. Kamara, and R. Ostrovsky, Searchable symmetrc encrypton: mproved defntons and effcent constructons, n Proc. of ACM CCS 06, [9] D. Boneh and B. Waters, Conjunctve, subset, and range queres on encrypted data, n Proc. of TCC 07, 2007, pp [10] F. Bao, R. Deng, X. Dng, and Y. Yang, Prvate query on encrypted data n mult-user settngs, n Proc. of ISPEC 08, [11] C. L, J. Lu, and Y. Lu, Effcent mergng and flterng algorthms for approxmate strng searches, n Proc. of ICDE 08, [12] A. Behm, S. J, C. L,, and J. Lu, Space-constraned gram-based ndexng for effcent approxmate strng search, n Proc. of ICDE 09. [13] S. J, G. L, C. L, and J. Feng, Effcent nteractve fuzzy keyword search, n Proc. of WWW 09, [14] J. Fegenbaum, Y. Isha, T. Malkn, K. Nssm, M. Strauss, and R. N. Wrght, Secure multparty computaton of approxmatons, n Proc. of ICALP 01. [15] R. Ostrovsky, Software protecton and smulatons on oblvous rams, Ph.D dssertaton, Massachusetts Insttute of Technology, [16] V. Levenshten, Bnary codes capable of correctng spurous nsertons and deletons of ones, Problems of Informaton Transmsson, vol. 1, no. 1, pp. 8 17, 1965.

PKIS: practical keyword index search on cloud datacenter

PKIS: practical keyword index search on cloud datacenter Park et al. EURASIP Journal on Wreless Communcatons and Networkng 20, 20:64 http://jwcn.euraspjournals.com/content/20//64 RESEARCH Open Access PKIS: practcal keyword ndex search on cloud datacenter Hyun-A

More information

An Interest-Oriented Network Evolution Mechanism for Online Communities

An Interest-Oriented Network Evolution Mechanism for Online Communities An Interest-Orented Network Evoluton Mechansm for Onlne Communtes Cahong Sun and Xaopng Yang School of Informaton, Renmn Unversty of Chna, Bejng 100872, P.R. Chna {chsun,yang}@ruc.edu.cn Abstract. Onlne

More information

Luby s Alg. for Maximal Independent Sets using Pairwise Independence

Luby s Alg. for Maximal Independent Sets using Pairwise Independence Lecture Notes for Randomzed Algorthms Luby s Alg. for Maxmal Independent Sets usng Parwse Independence Last Updated by Erc Vgoda on February, 006 8. Maxmal Independent Sets For a graph G = (V, E), an ndependent

More information

A Secure Password-Authenticated Key Agreement Using Smart Cards

A Secure Password-Authenticated Key Agreement Using Smart Cards A Secure Password-Authentcated Key Agreement Usng Smart Cards Ka Chan 1, Wen-Chung Kuo 2 and Jn-Chou Cheng 3 1 Department of Computer and Informaton Scence, R.O.C. Mltary Academy, Kaohsung 83059, Tawan,

More information

The Development of Web Log Mining Based on Improve-K-Means Clustering Analysis

The Development of Web Log Mining Based on Improve-K-Means Clustering Analysis The Development of Web Log Mnng Based on Improve-K-Means Clusterng Analyss TngZhong Wang * College of Informaton Technology, Luoyang Normal Unversty, Luoyang, 471022, Chna [email protected] Abstract.

More information

What is Candidate Sampling

What is Candidate Sampling What s Canddate Samplng Say we have a multclass or mult label problem where each tranng example ( x, T ) conssts of a context x a small (mult)set of target classes T out of a large unverse L of possble

More information

Module 2 LOSSLESS IMAGE COMPRESSION SYSTEMS. Version 2 ECE IIT, Kharagpur

Module 2 LOSSLESS IMAGE COMPRESSION SYSTEMS. Version 2 ECE IIT, Kharagpur Module LOSSLESS IMAGE COMPRESSION SYSTEMS Lesson 3 Lossless Compresson: Huffman Codng Instructonal Objectves At the end of ths lesson, the students should be able to:. Defne and measure source entropy..

More information

Enterprise Master Patient Index

Enterprise Master Patient Index Enterprse Master Patent Index Healthcare data are captured n many dfferent settngs such as hosptals, clncs, labs, and physcan offces. Accordng to a report by the CDC, patents n the Unted States made an

More information

Compact CCA2-secure Hierarchical Identity-Based Broadcast Encryption for Fuzzy-entity Data Sharing

Compact CCA2-secure Hierarchical Identity-Based Broadcast Encryption for Fuzzy-entity Data Sharing Compact CCA2-secure Herarchcal Identty-Based Broadcast Encrypton for Fuzzy-entty Data Sharng Weran Lu 1, Janwe Lu 1, Qanhong Wu 1, Bo Qn 2, Davd Naccache 3, and Houda Ferrad 4 1 School of Electronc and

More information

How To Understand The Results Of The German Meris Cloud And Water Vapour Product

How To Understand The Results Of The German Meris Cloud And Water Vapour Product Ttel: Project: Doc. No.: MERIS level 3 cloud and water vapour products MAPP MAPP-ATBD-ClWVL3 Issue: 1 Revson: 0 Date: 9.12.1998 Functon Name Organsaton Sgnature Date Author: Bennartz FUB Preusker FUB Schüller

More information

benefit is 2, paid if the policyholder dies within the year, and probability of death within the year is ).

benefit is 2, paid if the policyholder dies within the year, and probability of death within the year is ). REVIEW OF RISK MANAGEMENT CONCEPTS LOSS DISTRIBUTIONS AND INSURANCE Loss and nsurance: When someone s subject to the rsk of ncurrng a fnancal loss, the loss s generally modeled usng a random varable or

More information

Secure Cloud Storage Service with An Efficient DOKS Protocol

Secure Cloud Storage Service with An Efficient DOKS Protocol Secure Cloud Storage Servce wth An Effcent DOKS Protocol ZhengTao Jang Councaton Unversty of Chna [email protected] Abstract Storage servces based on publc clouds provde custoers wth elastc storage and on-deand

More information

8 Algorithm for Binary Searching in Trees

8 Algorithm for Binary Searching in Trees 8 Algorthm for Bnary Searchng n Trees In ths secton we present our algorthm for bnary searchng n trees. A crucal observaton employed by the algorthm s that ths problem can be effcently solved when the

More information

An Alternative Way to Measure Private Equity Performance

An Alternative Way to Measure Private Equity Performance An Alternatve Way to Measure Prvate Equty Performance Peter Todd Parlux Investment Technology LLC Summary Internal Rate of Return (IRR) s probably the most common way to measure the performance of prvate

More information

Proactive Secret Sharing Or: How to Cope With Perpetual Leakage

Proactive Secret Sharing Or: How to Cope With Perpetual Leakage Proactve Secret Sharng Or: How to Cope Wth Perpetual Leakage Paper by Amr Herzberg Stanslaw Jareck Hugo Krawczyk Mot Yung Presentaton by Davd Zage What s Secret Sharng Basc Idea ((2, 2)-threshold scheme):

More information

Data Broadcast on a Multi-System Heterogeneous Overlayed Wireless Network *

Data Broadcast on a Multi-System Heterogeneous Overlayed Wireless Network * JOURNAL OF INFORMATION SCIENCE AND ENGINEERING 24, 819-840 (2008) Data Broadcast on a Mult-System Heterogeneous Overlayed Wreless Network * Department of Computer Scence Natonal Chao Tung Unversty Hsnchu,

More information

v a 1 b 1 i, a 2 b 2 i,..., a n b n i.

v a 1 b 1 i, a 2 b 2 i,..., a n b n i. SECTION 8.4 COMPLEX VECTOR SPACES AND INNER PRODUCTS 455 8.4 COMPLEX VECTOR SPACES AND INNER PRODUCTS All the vector spaces we have studed thus far n the text are real vector spaces snce the scalars are

More information

Extending Probabilistic Dynamic Epistemic Logic

Extending Probabilistic Dynamic Epistemic Logic Extendng Probablstc Dynamc Epstemc Logc Joshua Sack May 29, 2008 Probablty Space Defnton A probablty space s a tuple (S, A, µ), where 1 S s a set called the sample space. 2 A P(S) s a σ-algebra: a set

More information

From Selective to Full Security: Semi-Generic Transformations in the Standard Model

From Selective to Full Security: Semi-Generic Transformations in the Standard Model An extended abstract of ths work appears n the proceedngs of PKC 2012 From Selectve to Full Securty: Sem-Generc Transformatons n the Standard Model Mchel Abdalla 1 Daro Fore 2 Vadm Lyubashevsky 1 1 Département

More information

denote the location of a node, and suppose node X . This transmission causes a successful reception by node X for any other node

denote the location of a node, and suppose node X . This transmission causes a successful reception by node X for any other node Fnal Report of EE359 Class Proect Throughput and Delay n Wreless Ad Hoc Networs Changhua He [email protected] Abstract: Networ throughput and pacet delay are the two most mportant parameters to evaluate

More information

Semantic Link Analysis for Finding Answer Experts *

Semantic Link Analysis for Finding Answer Experts * JOURNAL OF INFORMATION SCIENCE AND ENGINEERING 28, 51-65 (2012) Semantc Lnk Analyss for Fndng Answer Experts * YAO LU 1,2,3, XIAOJUN QUAN 2, JINGSHENG LEI 4, XINGLIANG NI 1,2,3, WENYIN LIU 2,3 AND YINLONG

More information

Minimal Coding Network With Combinatorial Structure For Instantaneous Recovery From Edge Failures

Minimal Coding Network With Combinatorial Structure For Instantaneous Recovery From Edge Failures Mnmal Codng Network Wth Combnatoral Structure For Instantaneous Recovery From Edge Falures Ashly Joseph 1, Mr.M.Sadsh Sendl 2, Dr.S.Karthk 3 1 Fnal Year ME CSE Student Department of Computer Scence Engneerng

More information

J. Parallel Distrib. Comput.

J. Parallel Distrib. Comput. J. Parallel Dstrb. Comput. 71 (2011) 62 76 Contents lsts avalable at ScenceDrect J. Parallel Dstrb. Comput. journal homepage: www.elsever.com/locate/jpdc Optmzng server placement n dstrbuted systems n

More information

The OC Curve of Attribute Acceptance Plans

The OC Curve of Attribute Acceptance Plans The OC Curve of Attrbute Acceptance Plans The Operatng Characterstc (OC) curve descrbes the probablty of acceptng a lot as a functon of the lot s qualty. Fgure 1 shows a typcal OC Curve. 10 8 6 4 1 3 4

More information

Identity-Based Encryption Gone Wild

Identity-Based Encryption Gone Wild An extended abstract of ths paper appeared n Mchele Bugles, Bart Preneel, Vladmro Sassone, and Ingo Wegener, edtors, 33rd Internatonal Colloquum on Automata, Languages and Programmng ICALP 2006, volume

More information

8.5 UNITARY AND HERMITIAN MATRICES. The conjugate transpose of a complex matrix A, denoted by A*, is given by

8.5 UNITARY AND HERMITIAN MATRICES. The conjugate transpose of a complex matrix A, denoted by A*, is given by 6 CHAPTER 8 COMPLEX VECTOR SPACES 5. Fnd the kernel of the lnear transformaton gven n Exercse 5. In Exercses 55 and 56, fnd the mage of v, for the ndcated composton, where and are gven by the followng

More information

1 Example 1: Axis-aligned rectangles

1 Example 1: Axis-aligned rectangles COS 511: Theoretcal Machne Learnng Lecturer: Rob Schapre Lecture # 6 Scrbe: Aaron Schld February 21, 2013 Last class, we dscussed an analogue for Occam s Razor for nfnte hypothess spaces that, n conjuncton

More information

An Optimally Robust Hybrid Mix Network (Extended Abstract)

An Optimally Robust Hybrid Mix Network (Extended Abstract) An Optmally Robust Hybrd Mx Network (Extended Abstract) Markus Jakobsson and Ar Juels RSA Laboratores Bedford, MA, USA {mjakobsson,ajuels}@rsasecurty.com Abstract We present a mx network that acheves effcent

More information

Canon NTSC Help Desk Documentation

Canon NTSC Help Desk Documentation Canon NTSC Help Desk Documentaton READ THIS BEFORE PROCEEDING Before revewng ths documentaton, Canon Busness Solutons, Inc. ( CBS ) hereby refers you, the customer or customer s representatve or agent

More information

Mining Multiple Large Data Sources

Mining Multiple Large Data Sources The Internatonal Arab Journal of Informaton Technology, Vol. 7, No. 3, July 2 24 Mnng Multple Large Data Sources Anmesh Adhkar, Pralhad Ramachandrarao 2, Bhanu Prasad 3, and Jhml Adhkar 4 Department of

More information

SEVERAL trends are opening up the era of Cloud

SEVERAL trends are opening up the era of Cloud 1 Towards Secure and Dependable Storage Servces n Cloud Computng Cong Wang, Student Member, IEEE, Qan Wang, Student Member, IEEE, Ku Ren, Member, IEEE, Nng Cao, Student Member, IEEE, and Wenjng Lou, Senor

More information

Watermark-based Provable Data Possession for Multimedia File in Cloud Storage

Watermark-based Provable Data Possession for Multimedia File in Cloud Storage Vol.48 (CIA 014), pp.103-107 http://dx.do.org/10.1457/astl.014.48.18 Watermar-based Provable Data Possesson for Multmeda Fle n Cloud Storage Yongjun Ren 1,, Jang Xu 1,, Jn Wang 1,, Lmng Fang 3, Jeong-U

More information

PSYCHOLOGICAL RESEARCH (PYC 304-C) Lecture 12

PSYCHOLOGICAL RESEARCH (PYC 304-C) Lecture 12 14 The Ch-squared dstrbuton PSYCHOLOGICAL RESEARCH (PYC 304-C) Lecture 1 If a normal varable X, havng mean µ and varance σ, s standardsed, the new varable Z has a mean 0 and varance 1. When ths standardsed

More information

A hybrid global optimization algorithm based on parallel chaos optimization and outlook algorithm

A hybrid global optimization algorithm based on parallel chaos optimization and outlook algorithm Avalable onlne www.ocpr.com Journal of Chemcal and Pharmaceutcal Research, 2014, 6(7):1884-1889 Research Artcle ISSN : 0975-7384 CODEN(USA) : JCPRC5 A hybrd global optmzaton algorthm based on parallel

More information

A Performance Analysis of View Maintenance Techniques for Data Warehouses

A Performance Analysis of View Maintenance Techniques for Data Warehouses A Performance Analyss of Vew Mantenance Technques for Data Warehouses Xng Wang Dell Computer Corporaton Round Roc, Texas Le Gruenwald The nversty of Olahoma School of Computer Scence orman, OK 739 Guangtao

More information

SEVERAL trends are opening up the era of Cloud

SEVERAL trends are opening up the era of Cloud IEEE Transactons on Cloud Computng Date of Publcaton: Aprl-June 2012 Volume: 5, Issue: 2 1 Towards Secure and Dependable Storage Servces n Cloud Computng Cong Wang, Student Member, IEEE, Qan Wang, Student

More information

AN EFFICIENT GROUP AUTHENTICATION FOR GROUP COMMUNICATIONS

AN EFFICIENT GROUP AUTHENTICATION FOR GROUP COMMUNICATIONS Internatonal Journal of Network Securty & Its Applcatons (IJNSA), Vol.5, No.3, May 2013 AN EFFICIENT GROUP AUTHENTICATION FOR GROUP COMMUNICATIONS Len Harn 1 and Changlu Ln 2 1 Department of Computer Scence

More information

Frequency Selective IQ Phase and IQ Amplitude Imbalance Adjustments for OFDM Direct Conversion Transmitters

Frequency Selective IQ Phase and IQ Amplitude Imbalance Adjustments for OFDM Direct Conversion Transmitters Frequency Selectve IQ Phase and IQ Ampltude Imbalance Adjustments for OFDM Drect Converson ransmtters Edmund Coersmeer, Ernst Zelnsk Noka, Meesmannstrasse 103, 44807 Bochum, Germany [email protected],

More information

Tracker: Security and Privacy for RFID-based Supply Chains

Tracker: Security and Privacy for RFID-based Supply Chains Tracker: Securty and Prvacy for RFID-based Supply Chans Erk-Olver Blass Kaoutar Elkhyaou Refk Molva EURECOM Sopha Antpols, France {blass elkhyao molva}@eurecom.fr Abstract The counterfetng of pharmaceutcs

More information

Efficient Project Portfolio as a tool for Enterprise Risk Management

Efficient Project Portfolio as a tool for Enterprise Risk Management Effcent Proect Portfolo as a tool for Enterprse Rsk Management Valentn O. Nkonov Ural State Techncal Unversty Growth Traectory Consultng Company January 5, 27 Effcent Proect Portfolo as a tool for Enterprse

More information

Ensuring Data Storage Security in Cloud Computing

Ensuring Data Storage Security in Cloud Computing 1 Ensurng Data Storage Securty n Cloud Computng Cong Wang,Qan Wang, Ku Ren, and Wenjng Lou Dept of ECE, Illnos Insttute of Technology, Emal: {cwang, qwang, kren}@ecetedu Dept of ECE, Worcester Polytechnc

More information

Secure and Efficient Proof of Storage with Deduplication

Secure and Efficient Proof of Storage with Deduplication Secure and Effcent Proof of Storage wth Deduplcaton Qng Zheng Department of Computer Scence Unversty of Texas at San Antono [email protected] Shouhua Xu Department of Computer Scence Unversty of Texas

More information

Feature selection for intrusion detection. Slobodan Petrović NISlab, Gjøvik University College

Feature selection for intrusion detection. Slobodan Petrović NISlab, Gjøvik University College Feature selecton for ntruson detecton Slobodan Petrovć NISlab, Gjøvk Unversty College Contents The feature selecton problem Intruson detecton Traffc features relevant for IDS The CFS measure The mrmr measure

More information

Forecasting the Demand of Emergency Supplies: Based on the CBR Theory and BP Neural Network

Forecasting the Demand of Emergency Supplies: Based on the CBR Theory and BP Neural Network 700 Proceedngs of the 8th Internatonal Conference on Innovaton & Management Forecastng the Demand of Emergency Supples: Based on the CBR Theory and BP Neural Network Fu Deqang, Lu Yun, L Changbng School

More information

Provably Secure Single Sign-on Scheme in Distributed Systems and Networks

Provably Secure Single Sign-on Scheme in Distributed Systems and Networks 0 IEEE th Internatonal Conference on Trust, Securty and Prvacy n Computng and Communcatons Provably Secure Sngle Sgn-on Scheme n Dstrbuted Systems and Networks Jangshan Yu, Guln Wang, and Y Mu Center for

More information

Support Vector Machines

Support Vector Machines Support Vector Machnes Max Wellng Department of Computer Scence Unversty of Toronto 10 Kng s College Road Toronto, M5S 3G5 Canada [email protected] Abstract Ths s a note to explan support vector machnes.

More information

Ensuring Data Storage Security in Cloud Computing

Ensuring Data Storage Security in Cloud Computing Ensurng Data Storage Securty n Cloud Computng Cong Wang, Qan Wang, and Ku Ren Department of ECE Illnos Insttute of Technology Emal: {cwang, qwang, kren}@ece.t.edu Wenjng Lou Department of ECE Worcester

More information

Riposte: An Anonymous Messaging System Handling Millions of Users

Riposte: An Anonymous Messaging System Handling Millions of Users Rposte: An Anonymous Messagng System Handlng Mllons of Users Henry Corrgan-Gbbs, Dan Boneh, and Davd Mazères Stanford Unversty Abstract Ths paper presents Rposte, a new system for anonymous broadcast messagng.

More information

1. Fundamentals of probability theory 2. Emergence of communication traffic 3. Stochastic & Markovian Processes (SP & MP)

1. Fundamentals of probability theory 2. Emergence of communication traffic 3. Stochastic & Markovian Processes (SP & MP) 6.3 / -- Communcaton Networks II (Görg) SS20 -- www.comnets.un-bremen.de Communcaton Networks II Contents. Fundamentals of probablty theory 2. Emergence of communcaton traffc 3. Stochastc & Markovan Processes

More information

RequIn, a tool for fast web traffic inference

RequIn, a tool for fast web traffic inference RequIn, a tool for fast web traffc nference Olver aul, Jean Etenne Kba GET/INT, LOR Department 9 rue Charles Fourer 90 Evry, France [email protected], [email protected] Abstract As networked

More information

A Cryptographic Key Assignment Scheme for Access Control in Poset Ordered Hierarchies with Enhanced Security

A Cryptographic Key Assignment Scheme for Access Control in Poset Ordered Hierarchies with Enhanced Security Internatonal Journal of Network Securty, Vol.7, No., PP.3 34, Sept. 8 3 A ryptographc Key Assgnment Scheme for Access ontrol n Poset Ordered Herarches wth Enhanced Securty Debass Gr and P. D. Srvastava

More information

Secure Network Coding Over the Integers

Secure Network Coding Over the Integers Secure Network Codng Over the Integers Rosaro Gennaro Jonathan Katz Hugo Krawczyk Tal Rabn Abstract Network codng has receved sgnfcant attenton n the networkng communty for ts potental to ncrease throughput

More information

Recurrence. 1 Definitions and main statements

Recurrence. 1 Definitions and main statements Recurrence 1 Defntons and man statements Let X n, n = 0, 1, 2,... be a MC wth the state space S = (1, 2,...), transton probabltes p j = P {X n+1 = j X n = }, and the transton matrx P = (p j ),j S def.

More information

EVALUATING THE PERCEIVED QUALITY OF INFRASTRUCTURE-LESS VOIP. Kun-chan Lan and Tsung-hsun Wu

EVALUATING THE PERCEIVED QUALITY OF INFRASTRUCTURE-LESS VOIP. Kun-chan Lan and Tsung-hsun Wu EVALUATING THE PERCEIVED QUALITY OF INFRASTRUCTURE-LESS VOIP Kun-chan Lan and Tsung-hsun Wu Natonal Cheng Kung Unversty [email protected], [email protected] ABSTRACT Voce over IP (VoIP) s one of

More information

A Replication-Based and Fault Tolerant Allocation Algorithm for Cloud Computing

A Replication-Based and Fault Tolerant Allocation Algorithm for Cloud Computing A Replcaton-Based and Fault Tolerant Allocaton Algorthm for Cloud Computng Tork Altameem Dept of Computer Scence, RCC, Kng Saud Unversty, PO Box: 28095 11437 Ryadh-Saud Araba Abstract The very large nfrastructure

More information

Practical and Secure Solutions for Integer Comparison

Practical and Secure Solutions for Integer Comparison In Publc Key Cryptography PKC 07, Vol. 4450 of Lecture Notes n Computer Scence, Sprnger-Verlag, 2007. pp. 330-342. Practcal and Secure Solutons for Integer Comparson Juan Garay 1, erry Schoenmakers 2,

More information

Multiple-Period Attribution: Residuals and Compounding

Multiple-Period Attribution: Residuals and Compounding Multple-Perod Attrbuton: Resduals and Compoundng Our revewer gave these authors full marks for dealng wth an ssue that performance measurers and vendors often regard as propretary nformaton. In 1994, Dens

More information

WISE-Integrator: An Automatic Integrator of Web Search Interfaces for E-Commerce

WISE-Integrator: An Automatic Integrator of Web Search Interfaces for E-Commerce WSE-ntegrator: An Automatc ntegrator of Web Search nterfaces for E-Commerce Ha He, Wey Meng Dept. of Computer Scence SUNY at Bnghamton Bnghamton, NY 13902 {hahe,meng}@cs.bnghamton.edu Clement Yu Dept.

More information

POLYSA: A Polynomial Algorithm for Non-binary Constraint Satisfaction Problems with and

POLYSA: A Polynomial Algorithm for Non-binary Constraint Satisfaction Problems with and POLYSA: A Polynomal Algorthm for Non-bnary Constrant Satsfacton Problems wth and Mguel A. Saldo, Federco Barber Dpto. Sstemas Informátcos y Computacón Unversdad Poltécnca de Valenca, Camno de Vera s/n

More information

Conversion between the vector and raster data structures using Fuzzy Geographical Entities

Conversion between the vector and raster data structures using Fuzzy Geographical Entities Converson between the vector and raster data structures usng Fuzzy Geographcal Enttes Cdála Fonte Department of Mathematcs Faculty of Scences and Technology Unversty of Combra, Apartado 38, 3 454 Combra,

More information

VRT012 User s guide V0.1. Address: Žirmūnų g. 27, Vilnius LT-09105, Phone: (370-5) 2127472, Fax: (370-5) 276 1380, Email: info@teltonika.

VRT012 User s guide V0.1. Address: Žirmūnų g. 27, Vilnius LT-09105, Phone: (370-5) 2127472, Fax: (370-5) 276 1380, Email: info@teltonika. VRT012 User s gude V0.1 Thank you for purchasng our product. We hope ths user-frendly devce wll be helpful n realsng your deas and brngng comfort to your lfe. Please take few mnutes to read ths manual

More information

Key Laboratory of Computer Networks and Information Security Xidian University, Xi an, P.R. China e-mail: [email protected]

Key Laboratory of Computer Networks and Information Security Xidian University, Xi an, P.R. China e-mail: xfchen@xidian.edu.cn Computing and Informatics, Vol. 32, 2013, 723 738 EFFICIENT MULTI-USER KEYWORD SEARCH OVER ENCRYPTED DATA IN CLOUD COMPUTING Jin Li Department of Computer Science, Guangzhou University Guangzhou, P.R.

More information

Updating the E5810B firmware

Updating the E5810B firmware Updatng the E5810B frmware NOTE Do not update your E5810B frmware unless you have a specfc need to do so, such as defect repar or nstrument enhancements. If the frmware update fals, the E5810B wll revert

More information

Forecasting the Direction and Strength of Stock Market Movement

Forecasting the Direction and Strength of Stock Market Movement Forecastng the Drecton and Strength of Stock Market Movement Jngwe Chen Mng Chen Nan Ye [email protected] [email protected] [email protected] Abstract - Stock market s one of the most complcated systems

More information

FORMAL ANALYSIS FOR REAL-TIME SCHEDULING

FORMAL ANALYSIS FOR REAL-TIME SCHEDULING FORMAL ANALYSIS FOR REAL-TIME SCHEDULING Bruno Dutertre and Vctora Stavrdou, SRI Internatonal, Menlo Park, CA Introducton In modern avoncs archtectures, applcaton software ncreasngly reles on servces provded

More information

Nordea G10 Alpha Carry Index

Nordea G10 Alpha Carry Index Nordea G10 Alpha Carry Index Index Rules v1.1 Verson as of 10/10/2013 1 (6) Page 1 Index Descrpton The G10 Alpha Carry Index, the Index, follows the development of a rule based strategy whch nvests and

More information

Complete Fairness in Secure Two-Party Computation

Complete Fairness in Secure Two-Party Computation Complete Farness n Secure Two-Party Computaton S. Dov Gordon Carmt Hazay Jonathan Katz Yehuda Lndell Abstract In the settng of secure two-party computaton, two mutually dstrustng partes wsh to compute

More information

Scalable and Secure Architecture for Digital Content Distribution

Scalable and Secure Architecture for Digital Content Distribution Valer Bocan Scalable and Secure Archtecture for Dgtal Content Dstrbuton Mha Fagadar-Cosma Department of Computer Scence and Engneerng Informaton Technology Department Poltehnca Unversty of Tmsoara Alcatel

More information

Course outline. Financial Time Series Analysis. Overview. Data analysis. Predictive signal. Trading strategy

Course outline. Financial Time Series Analysis. Overview. Data analysis. Predictive signal. Trading strategy Fnancal Tme Seres Analyss Patrck McSharry [email protected] www.mcsharry.net Trnty Term 2014 Mathematcal Insttute Unversty of Oxford Course outlne 1. Data analyss, probablty, correlatons, vsualsaton

More information

Calculation of Sampling Weights

Calculation of Sampling Weights Perre Foy Statstcs Canada 4 Calculaton of Samplng Weghts 4.1 OVERVIEW The basc sample desgn used n TIMSS Populatons 1 and 2 was a two-stage stratfed cluster desgn. 1 The frst stage conssted of a sample

More information

Availability-Based Path Selection and Network Vulnerability Assessment

Availability-Based Path Selection and Network Vulnerability Assessment Avalablty-Based Path Selecton and Network Vulnerablty Assessment Song Yang, Stojan Trajanovsk and Fernando A. Kupers Delft Unversty of Technology, The Netherlands {S.Yang, S.Trajanovsk, F.A.Kupers}@tudelft.nl

More information

A Crossplatform ECG Compression Library for Mobile HealthCare Services

A Crossplatform ECG Compression Library for Mobile HealthCare Services A Crossplatform ECG Compresson Lbrary for Moble HealthCare Servces Alexander Borodn, Yulya Zavyalova Department of Computer Scence Petrozavodsk State Unversty Petrozavodsk, Russa {aborod, yzavyalo}@cs.petrsu.ru

More information

Enabling P2P One-view Multi-party Video Conferencing

Enabling P2P One-view Multi-party Video Conferencing Enablng P2P One-vew Mult-party Vdeo Conferencng Yongxang Zhao, Yong Lu, Changja Chen, and JanYn Zhang Abstract Mult-Party Vdeo Conferencng (MPVC) facltates realtme group nteracton between users. Whle P2P

More information

Analysis of Energy-Conserving Access Protocols for Wireless Identification Networks

Analysis of Energy-Conserving Access Protocols for Wireless Identification Networks From the Proceedngs of Internatonal Conference on Telecommuncaton Systems (ITC-97), March 2-23, 1997. 1 Analyss of Energy-Conservng Access Protocols for Wreless Identfcaton etworks Imrch Chlamtac a, Chara

More information

Calculating the high frequency transmission line parameters of power cables

Calculating the high frequency transmission line parameters of power cables < ' Calculatng the hgh frequency transmsson lne parameters of power cables Authors: Dr. John Dcknson, Laboratory Servces Manager, N 0 RW E B Communcatons Mr. Peter J. Ncholson, Project Assgnment Manager,

More information

A Dynamic Energy-Efficiency Mechanism for Data Center Networks

A Dynamic Energy-Efficiency Mechanism for Data Center Networks A Dynamc Energy-Effcency Mechansm for Data Center Networks Sun Lang, Zhang Jnfang, Huang Daochao, Yang Dong, Qn Yajuan A Dynamc Energy-Effcency Mechansm for Data Center Networks 1 Sun Lang, 1 Zhang Jnfang,

More information

Stochastic Protocol Modeling for Anomaly Based Network Intrusion Detection

Stochastic Protocol Modeling for Anomaly Based Network Intrusion Detection Stochastc Protocol Modelng for Anomaly Based Network Intruson Detecton Juan M. Estevez-Tapador, Pedro Garca-Teodoro, and Jesus E. Daz-Verdejo Department of Electroncs and Computer Technology Unversty of

More information

Joint Scheduling of Processing and Shuffle Phases in MapReduce Systems

Joint Scheduling of Processing and Shuffle Phases in MapReduce Systems Jont Schedulng of Processng and Shuffle Phases n MapReduce Systems Fangfe Chen, Mural Kodalam, T. V. Lakshman Department of Computer Scence and Engneerng, The Penn State Unversty Bell Laboratores, Alcatel-Lucent

More information

Master s Thesis. Configuring robust virtual wireless sensor networks for Internet of Things inspired by brain functional networks

Master s Thesis. Configuring robust virtual wireless sensor networks for Internet of Things inspired by brain functional networks Master s Thess Ttle Confgurng robust vrtual wreless sensor networks for Internet of Thngs nspred by bran functonal networks Supervsor Professor Masayuk Murata Author Shnya Toyonaga February 10th, 2014

More information

Politecnico di Torino. Porto Institutional Repository

Politecnico di Torino. Porto Institutional Repository Poltecnco d Torno Porto Insttutonal Repostory [Artcle] A cost-effectve cloud computng framework for acceleratng multmeda communcaton smulatons Orgnal Ctaton: D. Angel, E. Masala (2012). A cost-effectve

More information

Web Object Indexing Using Domain Knowledge *

Web Object Indexing Using Domain Knowledge * Web Object Indexng Usng Doman Knowledge * Muyuan Wang Department of Automaton Tsnghua Unversty Bejng 100084, Chna (86-10)51774518 Zhwe L, Le Lu, We-Yng Ma Mcrosoft Research Asa Sgma Center, Hadan Dstrct

More information

The Greedy Method. Introduction. 0/1 Knapsack Problem

The Greedy Method. Introduction. 0/1 Knapsack Problem The Greedy Method Introducton We have completed data structures. We now are gong to look at algorthm desgn methods. Often we are lookng at optmzaton problems whose performance s exponental. For an optmzaton

More information

Network Security Situation Evaluation Method for Distributed Denial of Service

Network Security Situation Evaluation Method for Distributed Denial of Service Network Securty Stuaton Evaluaton Method for Dstrbuted Denal of Servce Jn Q,2, Cu YMn,2, Huang MnHuan,2, Kuang XaoHu,2, TangHong,2 ) Scence and Technology on Informaton System Securty Laboratory, Bejng,

More information

QOS DISTRIBUTION MONITORING FOR PERFORMANCE MANAGEMENT IN MULTIMEDIA NETWORKS

QOS DISTRIBUTION MONITORING FOR PERFORMANCE MANAGEMENT IN MULTIMEDIA NETWORKS QOS DISTRIBUTION MONITORING FOR PERFORMANCE MANAGEMENT IN MULTIMEDIA NETWORKS Yumng Jang, Chen-Khong Tham, Ch-Chung Ko Department Electrcal Engneerng Natonal Unversty Sngapore 119260 Sngapore Emal: {engp7450,

More information

To manage leave, meeting institutional requirements and treating individual staff members fairly and consistently.

To manage leave, meeting institutional requirements and treating individual staff members fairly and consistently. Corporate Polces & Procedures Human Resources - Document CPP216 Leave Management Frst Produced: Current Verson: Past Revsons: Revew Cycle: Apples From: 09/09/09 26/10/12 09/09/09 3 years Immedately Authorsaton:

More information

Fully Homomorphic Encryption Scheme with Symmetric Keys

Fully Homomorphic Encryption Scheme with Symmetric Keys Fully Homomorphc Encrypton Scheme wth Symmetrc Keys A Dssertaton submtted n partal fulfllment for the award of the Degree of Master of Technology n Department of Computer Scence & Engneerng (wth specalzaton

More information

Trivial lump sum R5.0

Trivial lump sum R5.0 Optons form Once you have flled n ths form, please return t wth your orgnal brth certfcate to: Premer PO Box 2067 Croydon CR90 9ND. Fll n ths form usng BLOCK CAPITALS and black nk. Mark all answers wth

More information