Nowadays, an increasing number of persons choose to outsource their computing demands and storage demands to the Cloud. In order to ensure the integrity of the data in the untrusted Cloud, especially the dynamic files...Nowadays, an increasing number of persons choose to outsource their computing demands and storage demands to the Cloud. In order to ensure the integrity of the data in the untrusted Cloud, especially the dynamic files which can be updated online, we propose an improved dynamic provable data possession model. We use some homomorphic tags to verify the integrity of the file and use some hash values generated by some secret values and tags to prevent replay attack and forgery attack. Compared with previous works, our proposal reduces the computational and communication complexity from O(logn) to O(1). We did some experiments to ensure this improvement and extended the model to file sharing situation.展开更多
Provable Data Possession(PDP)schemes have long been proposed to solve problem of how to check the integrity of data stored in cloud service without downloading.However,with the emerging of network consisting of low pe...Provable Data Possession(PDP)schemes have long been proposed to solve problem of how to check the integrity of data stored in cloud service without downloading.However,with the emerging of network consisting of low performance devices such as Internet of Things,we find that there are still two obstacles for applying PDP schemes.The first one is the heavy computation overhead in generating tags for data blocks,which is essential for setting up any PDP scheme.The other one is how to resist collusion attacks from third party auditors with any possible entities participating the auditing.In this paper,we propose a novel blockchain-based light-weighted PDP scheme for low performance devices,with an instance deployed on a cloud server.We design a secure outsourced tag generating method for low performance devices,which enables a kind of“hash-sign-switch”two-phase tag computing.With this method,users with low performance devices can employ third party auditors to compute modular exponential operations that accounts for the largest portion of computation overhead in tag generation,without leaking their data content.Chaincodes in blockchain network ensure the correctness of such outsourcing and prevent collusion attacks.The security analysis and performance evaluation prove that our scheme is both secure and efficient.展开更多
Increment of mobile cloud video motivates mobile users to utilize cloud storage service to address their demands, cloud storage provider always furnish a location-independent platform for managing user's data. Howeve...Increment of mobile cloud video motivates mobile users to utilize cloud storage service to address their demands, cloud storage provider always furnish a location-independent platform for managing user's data. However, mobile users wonder if their cloud video data leakage or dynamic migration to illegal service providers. In this paper, we design a novel provable data possession protocol based on data geographic location attribute, which allows data owner to auditing the integrity of their video data, which put forward an ideal choice for remote data possession checking in the mobile cloud storage. In our proposed scheme, we check out whether the video data dynamic migrate to an unspecified location (such as: overseas) by adding data geographic location attribute tag into provable data possession protocol. Moreover, we make sure the security of our proposed scheme under the Computational Diffic-Hellman assumption. The analysis and experiment results demonstrate that our proposed scheme is provably secure and efficient.展开更多
It is the important part of historical institutionalism to explore the reason of the changes of institutions,which includes key issues of historical institutionalism—why do institutions change?How do institutions pla...It is the important part of historical institutionalism to explore the reason of the changes of institutions,which includes key issues of historical institutionalism—why do institutions change?How do institutions play a new role through changing?As far as the reason of the changes is concerned,there are social reasons,economic reasons,technological reasons as well as concept reasons.Being part of the China’s civil law system,the possession institution unexceptionally experiences changing process of establishment,amendment,reform and innovation.This paper attempts to analyze the reason of the changes of the possession institution from the perspective of institutional change theory of the historical institutionalism,giving historical explanation of institutional changes and putting forward historical interpretation and support for the perfection of the contemporary possession institution.展开更多
Transilvania is a province of the actual state of Romania, geographically situated in the middle of the country, in the inner arch of the Carpathians. Starting with the 10th century, the territory of Transilvania beca...Transilvania is a province of the actual state of Romania, geographically situated in the middle of the country, in the inner arch of the Carpathians. Starting with the 10th century, the territory of Transilvania became attractive for the neighboring Hungarian royalty and later on, in the 1 lth century it was annexed into Hungary. For a better control of the newly annexed territory and in order to convert the orthodox population to Catholicism, the Hungarian rulers brought the Szeklers to Transilvania and two centuries later, German originating populations, from Rhine, Luxemburg, and Saxony (the name of Sas people, or Saxon of Transilvania derives from "Saxony"). The aim of this paper is to focus on the Sighisoara County, namely on the easement of certain areas for temporary or permanent maintenance or use by the church and hospitals in the region. That was a common practice in Medieval Europe aimed at ensuring the survival means for these institutions. However, it was not the only one to serve this goal. There were also donations on behalf of various people or allocations of money by the county authorities. The documents attesting this are unpublished, unedited and are to be found in the archives of the Brasov County, Budapest, and Vienna. They are the stepping stone of this paper and hence, they grant its originality. The objectives of the paper are to bring arguments in favor of the thesis that community money was directed towards meeting the needs of the hospitals, as well as towards supporting the widows, the orphans, and the needy ones. Worth noting in this respect is the management of the funds ceded to the church and county hospitals and that actually benefitted the whole community. Moreover, the paper also emphasizes the role played by education, since the latter is an important landmark for a community's development level展开更多
From the perspective of feminism, by analyzing single intellectual women's living states in enclosed personal spaces, andcomparing their different spatial changes triggered by external intrusions, this essay inten...From the perspective of feminism, by analyzing single intellectual women's living states in enclosed personal spaces, andcomparing their different spatial changes triggered by external intrusions, this essay intends to explore Byatt's ambivalent attitudestowards the feminists' pursuit for a room of one's own, and point out the significance of harmonious co-existence between men andwomen to female identity construction.展开更多
The system of bona fide acquisition of movables is a very important system in civil law since modem times. However, in modem society, the further development of concept delivery makes the phenomenon of separation betw...The system of bona fide acquisition of movables is a very important system in civil law since modem times. However, in modem society, the further development of concept delivery makes the phenomenon of separation between possession and ownership become more and more universal. There is a potential conflict between possession reform and the announcement of property right of property as a sign of delivery, which has been brought up again in civil law circles. Based on the measure of interest and value analysis, on the possession case of bona fide acquisition system is discussed and reflection, in under the bona fide possession of the application, the modified say. With a view to China' s ongoing property rights legislation to benefit.展开更多
A.S.Byatt's Possession has its own appraisal of public and critic alike for its original structure, as well as for the novelty and complexity of its themes. With Northrop Frye's archetypal criticism, this pape...A.S.Byatt's Possession has its own appraisal of public and critic alike for its original structure, as well as for the novelty and complexity of its themes. With Northrop Frye's archetypal criticism, this paper analyzes the epic poems"The Garden of Proserpina"so as to identify the hidden creation theme from paradise archetype.展开更多
The author of the paper analyzes the story"Glass Coffin"in A. S. Byatt's Possession and compares it with Brothers Grimm's fairy tale with the same name. Through the study, the author identifies the q...The author of the paper analyzes the story"Glass Coffin"in A. S. Byatt's Possession and compares it with Brothers Grimm's fairy tale with the same name. Through the study, the author identifies the quest motif from our modern hero's discovery journey in Possession.展开更多
“Face to face With Hurricane Camilleisa Piece of narration writ-ten by Joseph P.Blank.It has been adopted by text-book compilers of various countries ever since its first publication in The Readers Digest,March1970.A...“Face to face With Hurricane Camilleisa Piece of narration writ-ten by Joseph P.Blank.It has been adopted by text-book compilers of various countries ever since its first publication in The Readers Digest,March1970.A Searlyas1973,Nat-aliC.展开更多
可证数据持有方案(Provable Data Possession, PDP)可以让用户在不下载全部数据的情况下验证其外包数据是否完好无损。为了提高外包数据的可用性和安全性,许多用户将数据的多个副本存储在单云服务器上,但是单云服务器在发生故障或者其...可证数据持有方案(Provable Data Possession, PDP)可以让用户在不下载全部数据的情况下验证其外包数据是否完好无损。为了提高外包数据的可用性和安全性,许多用户将数据的多个副本存储在单云服务器上,但是单云服务器在发生故障或者其他意外情况时,用户存储的数据副本也会遭到破坏因而无法恢复原始数据。同时,许多可证数据持有方案依赖于公钥基础设施(Public Key Infrastructure, PKI)技术,存在密钥管理问题。此外,现有的可证数据持有方案大多是在用户端使用密钥对数据进行处理。由于用户端的安全意识较弱或者安全设置较低,密钥可能会有泄露的风险。恶意云一旦获得了用户端的密钥,就可以通过伪造虚假的数据持有证明来隐藏数据丢失的事件。基于上述问题,提出了一种基于身份的密钥隔离的多云多副本可证数据持有方案(Identity-Based Key-Insulated Provable Multi-Copy Data Possession in Multi-Cloud Storage, IDKIMC-PDP)。基于身份的可证数据持有方案消除了公钥基础设施技术中复杂的证书管理。多云多副本确保了即使在某个云服务器上的副本被篡改或者被破坏的情况下,用户仍然可以从其他云服务器上获取副本并恢复数据。同时,方案中使用了密钥隔离技术实现了前向和后向安全。即使某一时间段内的密钥泄露,其他时间段内云存储审计的安全性也不会受到影响。给出了该方案的正式定义、系统模型和安全模型;在标准困难问题下,给出了该方案的安全性证明。安全性分析表明,IDKIMC-PDP方案具有强抗密钥泄露性、可检测性以及数据块标签和证明的不可伪造性。实验结果表明,与现有的多云多副本相关方案相比,IDKIMC-PDP方案具有相对较高的效率。展开更多
Let m be a positive integer, g(m) be the number of integers t for which 1 ≤ t ≤ m and there does not exist a positive integer n satisfying ( t = t(n) ) t^n+1≡t(modm).For a number x≥3, let G(x)=∑m≤tg(...Let m be a positive integer, g(m) be the number of integers t for which 1 ≤ t ≤ m and there does not exist a positive integer n satisfying ( t = t(n) ) t^n+1≡t(modm).For a number x≥3, let G(x)=∑m≤tg(m) In this paper, we obtain the asymptotic formula: .G(x)=αx^2+O(xlogx),ax x→∞ Our result improves the corresponding result with an error term O(xlog^2 x) of Yang Zhaohua obtained in 1986展开更多
Isovaleroyl oxokadsurane,a novel dibenzocyclooctadiene lignan pos- sessing a spirobenzofuranoid skeleton was isolated from the stems of Kadsura coccinea.Its structure and relative configuration were determined by X-ra...Isovaleroyl oxokadsurane,a novel dibenzocyclooctadiene lignan pos- sessing a spirobenzofuranoid skeleton was isolated from the stems of Kadsura coccinea.Its structure and relative configuration were determined by X-ray diffraction analysis.展开更多
This paper lays out the morphosyntactic structures of existential,locative and possessive constructions in Amharic.Amharic belongs to South Ethio-Semitic language subfamily.It is natively spoken in the Amhara region a...This paper lays out the morphosyntactic structures of existential,locative and possessive constructions in Amharic.Amharic belongs to South Ethio-Semitic language subfamily.It is natively spoken in the Amhara region and used as the first and the second language for some urban dwellers in the country.It is a working language for the Federal Government of Ethiopia.It serves the same in Gambella,Southern Nations,Nationalities and Peoples’and Benishangul-Gumuz regional states.The Amharic existential,possessive and locative constructions are characterized by using the same existential verb stem all-‘exist’.The verb is defective in its derivation and conjugation.Unlike the prototypical verbs of the language,the existential verb uses a different verb for imperfective and past verb forms.Unlike the regular verbs of the language,the existential verb,which is perfective in form,conveys present tense.It has been observed that indefinite nominals appear as the E(Existent)in existentials and possessives,whereas definite ones appear in locatives.The morphosyntactic features of existentials and locatives are the same in every aspect except the use of definiteness of the E(Existent).The possessives differ from the two constructions in word order and morphological structure of the verb.展开更多
基金supported by Major Program of Shanghai Science and Technology Commission under Grant No.10DZ1500200Collaborative Applied Research and Development Project between Morgan Stanley and Shanghai Jiao Tong University, China
文摘Nowadays, an increasing number of persons choose to outsource their computing demands and storage demands to the Cloud. In order to ensure the integrity of the data in the untrusted Cloud, especially the dynamic files which can be updated online, we propose an improved dynamic provable data possession model. We use some homomorphic tags to verify the integrity of the file and use some hash values generated by some secret values and tags to prevent replay attack and forgery attack. Compared with previous works, our proposal reduces the computational and communication complexity from O(logn) to O(1). We did some experiments to ensure this improvement and extended the model to file sharing situation.
基金The work is supported by the National Key Research and Development Program of China(No.2018YFC1604002)the National Natural Science Foundation of China(Nos.U1836204,U1936208,U1936216 and 62002197).
文摘Provable Data Possession(PDP)schemes have long been proposed to solve problem of how to check the integrity of data stored in cloud service without downloading.However,with the emerging of network consisting of low performance devices such as Internet of Things,we find that there are still two obstacles for applying PDP schemes.The first one is the heavy computation overhead in generating tags for data blocks,which is essential for setting up any PDP scheme.The other one is how to resist collusion attacks from third party auditors with any possible entities participating the auditing.In this paper,we propose a novel blockchain-based light-weighted PDP scheme for low performance devices,with an instance deployed on a cloud server.We design a secure outsourced tag generating method for low performance devices,which enables a kind of“hash-sign-switch”two-phase tag computing.With this method,users with low performance devices can employ third party auditors to compute modular exponential operations that accounts for the largest portion of computation overhead in tag generation,without leaking their data content.Chaincodes in blockchain network ensure the correctness of such outsourcing and prevent collusion attacks.The security analysis and performance evaluation prove that our scheme is both secure and efficient.
基金supported in part by National High Tech Research and Development Program(863 Program)of China(No.2015 AA016005)
文摘Increment of mobile cloud video motivates mobile users to utilize cloud storage service to address their demands, cloud storage provider always furnish a location-independent platform for managing user's data. However, mobile users wonder if their cloud video data leakage or dynamic migration to illegal service providers. In this paper, we design a novel provable data possession protocol based on data geographic location attribute, which allows data owner to auditing the integrity of their video data, which put forward an ideal choice for remote data possession checking in the mobile cloud storage. In our proposed scheme, we check out whether the video data dynamic migrate to an unspecified location (such as: overseas) by adding data geographic location attribute tag into provable data possession protocol. Moreover, we make sure the security of our proposed scheme under the Computational Diffic-Hellman assumption. The analysis and experiment results demonstrate that our proposed scheme is provably secure and efficient.
基金the staged achievement of the youth project of the education department of Hunan Province-“Research on the Legal Protection of Possession and Legislation Construction”(No.:10B083)
文摘It is the important part of historical institutionalism to explore the reason of the changes of institutions,which includes key issues of historical institutionalism—why do institutions change?How do institutions play a new role through changing?As far as the reason of the changes is concerned,there are social reasons,economic reasons,technological reasons as well as concept reasons.Being part of the China’s civil law system,the possession institution unexceptionally experiences changing process of establishment,amendment,reform and innovation.This paper attempts to analyze the reason of the changes of the possession institution from the perspective of institutional change theory of the historical institutionalism,giving historical explanation of institutional changes and putting forward historical interpretation and support for the perfection of the contemporary possession institution.
文摘Transilvania is a province of the actual state of Romania, geographically situated in the middle of the country, in the inner arch of the Carpathians. Starting with the 10th century, the territory of Transilvania became attractive for the neighboring Hungarian royalty and later on, in the 1 lth century it was annexed into Hungary. For a better control of the newly annexed territory and in order to convert the orthodox population to Catholicism, the Hungarian rulers brought the Szeklers to Transilvania and two centuries later, German originating populations, from Rhine, Luxemburg, and Saxony (the name of Sas people, or Saxon of Transilvania derives from "Saxony"). The aim of this paper is to focus on the Sighisoara County, namely on the easement of certain areas for temporary or permanent maintenance or use by the church and hospitals in the region. That was a common practice in Medieval Europe aimed at ensuring the survival means for these institutions. However, it was not the only one to serve this goal. There were also donations on behalf of various people or allocations of money by the county authorities. The documents attesting this are unpublished, unedited and are to be found in the archives of the Brasov County, Budapest, and Vienna. They are the stepping stone of this paper and hence, they grant its originality. The objectives of the paper are to bring arguments in favor of the thesis that community money was directed towards meeting the needs of the hospitals, as well as towards supporting the widows, the orphans, and the needy ones. Worth noting in this respect is the management of the funds ceded to the church and county hospitals and that actually benefitted the whole community. Moreover, the paper also emphasizes the role played by education, since the latter is an important landmark for a community's development level
文摘From the perspective of feminism, by analyzing single intellectual women's living states in enclosed personal spaces, andcomparing their different spatial changes triggered by external intrusions, this essay intends to explore Byatt's ambivalent attitudestowards the feminists' pursuit for a room of one's own, and point out the significance of harmonious co-existence between men andwomen to female identity construction.
文摘The system of bona fide acquisition of movables is a very important system in civil law since modem times. However, in modem society, the further development of concept delivery makes the phenomenon of separation between possession and ownership become more and more universal. There is a potential conflict between possession reform and the announcement of property right of property as a sign of delivery, which has been brought up again in civil law circles. Based on the measure of interest and value analysis, on the possession case of bona fide acquisition system is discussed and reflection, in under the bona fide possession of the application, the modified say. With a view to China' s ongoing property rights legislation to benefit.
文摘A.S.Byatt's Possession has its own appraisal of public and critic alike for its original structure, as well as for the novelty and complexity of its themes. With Northrop Frye's archetypal criticism, this paper analyzes the epic poems"The Garden of Proserpina"so as to identify the hidden creation theme from paradise archetype.
文摘The author of the paper analyzes the story"Glass Coffin"in A. S. Byatt's Possession and compares it with Brothers Grimm's fairy tale with the same name. Through the study, the author identifies the quest motif from our modern hero's discovery journey in Possession.
文摘“Face to face With Hurricane Camilleisa Piece of narration writ-ten by Joseph P.Blank.It has been adopted by text-book compilers of various countries ever since its first publication in The Readers Digest,March1970.A Searlyas1973,Nat-aliC.
文摘Let m be a positive integer, g(m) be the number of integers t for which 1 ≤ t ≤ m and there does not exist a positive integer n satisfying ( t = t(n) ) t^n+1≡t(modm).For a number x≥3, let G(x)=∑m≤tg(m) In this paper, we obtain the asymptotic formula: .G(x)=αx^2+O(xlogx),ax x→∞ Our result improves the corresponding result with an error term O(xlog^2 x) of Yang Zhaohua obtained in 1986
文摘Isovaleroyl oxokadsurane,a novel dibenzocyclooctadiene lignan pos- sessing a spirobenzofuranoid skeleton was isolated from the stems of Kadsura coccinea.Its structure and relative configuration were determined by X-ray diffraction analysis.
文摘This paper lays out the morphosyntactic structures of existential,locative and possessive constructions in Amharic.Amharic belongs to South Ethio-Semitic language subfamily.It is natively spoken in the Amhara region and used as the first and the second language for some urban dwellers in the country.It is a working language for the Federal Government of Ethiopia.It serves the same in Gambella,Southern Nations,Nationalities and Peoples’and Benishangul-Gumuz regional states.The Amharic existential,possessive and locative constructions are characterized by using the same existential verb stem all-‘exist’.The verb is defective in its derivation and conjugation.Unlike the prototypical verbs of the language,the existential verb uses a different verb for imperfective and past verb forms.Unlike the regular verbs of the language,the existential verb,which is perfective in form,conveys present tense.It has been observed that indefinite nominals appear as the E(Existent)in existentials and possessives,whereas definite ones appear in locatives.The morphosyntactic features of existentials and locatives are the same in every aspect except the use of definiteness of the E(Existent).The possessives differ from the two constructions in word order and morphological structure of the verb.