The institutions of the Dutch (urban) planning system face four challenging characteristics of climate adaptation measures. These measures are uncertain in their effects, in competition with other interests, multiface...The institutions of the Dutch (urban) planning system face four challenging characteristics of climate adaptation measures. These measures are uncertain in their effects, in competition with other interests, multifaceted, and inherently complex. Capacity building is a key issue for the implementation of climate adaptation measures in urban planning processes, which aim to achieve Climate-Proof Cities (CPC). For successful capacity building, it is important to define the relevant stakeholders and tailor the adaptation strategies first to (the position of) these stakeholders and next to the specific urban conditions and issues. In addition, scientific insights and tools can be of assistance, and the use of climate maps can help to create a common language. Such common understanding of climate problems can lead to “goal entwinement” between actors, which can support the implementation of climate adaptation strategies in urban planning. Awareness, recognition and urgency are the most important components of this common understanding, which may differ for each stage in every urban planning process. In order to overcome the pragmatism that rules in day-to-day urban planning processes, multi-level arrangements between different tiers of government must be employed to improve the penetration of climate adaptation measures. After all, it still remains a soft interest in a hard process.展开更多
Data security is a significant issue in cloud storage systems. After outsourcing data to cloud servers, clients lose physical control over the data. To guarantee clients that their data is intact on the server side, s...Data security is a significant issue in cloud storage systems. After outsourcing data to cloud servers, clients lose physical control over the data. To guarantee clients that their data is intact on the server side, some mechanism is needed for clients to periodically check the integrity of their data. Proof of retrievability (PoR) is designed to ensure data integrity. However, most prior PoR schemes focus on static data, and existing dynamic PoR is inefficient. In this paper, we propose a new version of dynamic PoR that is based on a B+ tree and a Merkle hash tree. We propose a novel authenticated data structure, called Cloud Merkle B+ tree (CMBT). By combining CMBT with the BES signature, dynamic operations such as insertion, deletion, and modification are supported. Compared with existing PoR schemes, our scheme improves worst-case overhead from O(n) to O(log n).展开更多
The remote data integrity auditing technology can guarantee the integrity of outsourced data in clouds. Users can periodically run an integrity auditing protocol by interacting with cloud server, to verify the latest ...The remote data integrity auditing technology can guarantee the integrity of outsourced data in clouds. Users can periodically run an integrity auditing protocol by interacting with cloud server, to verify the latest status of outsourced data. Integrity auditing requires user to take massive time-consuming computations, which would not be affordable by weak devices. In this paper, we propose a privacy-preserving TPA-aided remote data integrity auditing scheme based on Li et al.’s data integrity auditing scheme without bilinear pairings, where a third party auditor (TPA) is employed to perform integrity auditing on outsourced data for users. The privacy of outsourced data can be guaranteed against TPA in the sense that TPA could not infer its contents from the returned proofs in the integrity auditing phase. Our construction is as efficient as Li et al.’s scheme, that is, each procedure takes the same time-consuming operations in both schemes, and our solution does not increase the sizes of processed data, challenge and proof.展开更多
In this paper, a conjecture put forward by G. D. Anderson, S.-L. Qiu and M. K. Vamanamurthy in 1995 and concerning elliptic integrals is proved to be true, and some monotoneity and onvexity properties of certain combi...In this paper, a conjecture put forward by G. D. Anderson, S.-L. Qiu and M. K. Vamanamurthy in 1995 and concerning elliptic integrals is proved to be true, and some monotoneity and onvexity properties of certain combinations of generalized elliptic integrals are obtained.展开更多
随着云存储模式的出现,越来越多的用户选择将应用和数据移植到云中,但他们在本地可能并没有保存任何数据副本,无法确保存储在云中的数据是完整的.如何确保云存储环境下用户数据的完整性,成为近来学术界研究的一个热点.数据完整性证明(Pr...随着云存储模式的出现,越来越多的用户选择将应用和数据移植到云中,但他们在本地可能并没有保存任何数据副本,无法确保存储在云中的数据是完整的.如何确保云存储环境下用户数据的完整性,成为近来学术界研究的一个热点.数据完整性证明(Provable Data Integrity,PDI)被认为是解决这一问题的重要手段,该文对此进行了综述.首先,给出了数据完整性证明机制的协议框架,分析了云存储环境下数据完整性证明所具备的特征;其次,对各种数据完整性证明机制加以分类,在此分类基础上,介绍了各种典型的数据完整性验证机制并进行了对比;最后,指出了云存储中数据完整性验证面临的挑战及发展趋势.展开更多
文摘The institutions of the Dutch (urban) planning system face four challenging characteristics of climate adaptation measures. These measures are uncertain in their effects, in competition with other interests, multifaceted, and inherently complex. Capacity building is a key issue for the implementation of climate adaptation measures in urban planning processes, which aim to achieve Climate-Proof Cities (CPC). For successful capacity building, it is important to define the relevant stakeholders and tailor the adaptation strategies first to (the position of) these stakeholders and next to the specific urban conditions and issues. In addition, scientific insights and tools can be of assistance, and the use of climate maps can help to create a common language. Such common understanding of climate problems can lead to “goal entwinement” between actors, which can support the implementation of climate adaptation strategies in urban planning. Awareness, recognition and urgency are the most important components of this common understanding, which may differ for each stage in every urban planning process. In order to overcome the pragmatism that rules in day-to-day urban planning processes, multi-level arrangements between different tiers of government must be employed to improve the penetration of climate adaptation measures. After all, it still remains a soft interest in a hard process.
基金supported in part by the US National Science Foundation under grant CNS-1115548 and a grant from Cisco Research
文摘Data security is a significant issue in cloud storage systems. After outsourcing data to cloud servers, clients lose physical control over the data. To guarantee clients that their data is intact on the server side, some mechanism is needed for clients to periodically check the integrity of their data. Proof of retrievability (PoR) is designed to ensure data integrity. However, most prior PoR schemes focus on static data, and existing dynamic PoR is inefficient. In this paper, we propose a new version of dynamic PoR that is based on a B+ tree and a Merkle hash tree. We propose a novel authenticated data structure, called Cloud Merkle B+ tree (CMBT). By combining CMBT with the BES signature, dynamic operations such as insertion, deletion, and modification are supported. Compared with existing PoR schemes, our scheme improves worst-case overhead from O(n) to O(log n).
基金the National Natural Science Foundation of China under projects 61772150 and 61862012the Guangxi Key R&D Program under project AB17195025+3 种基金the Guangxi Natural Science Foundation under grants 2018GXNSFDA281054 and 2018GXNSFAA281232the National Cryptography Development Fund of China under project MMJJ20170217the Guangxi Young Teachers’ Basic Ability Improvement Program under Grant 2018KY0194and the open program of Guangxi Key Laboratory of Cryptography and Information Security under projects GCIS201621 and GCIS201702.
文摘The remote data integrity auditing technology can guarantee the integrity of outsourced data in clouds. Users can periodically run an integrity auditing protocol by interacting with cloud server, to verify the latest status of outsourced data. Integrity auditing requires user to take massive time-consuming computations, which would not be affordable by weak devices. In this paper, we propose a privacy-preserving TPA-aided remote data integrity auditing scheme based on Li et al.’s data integrity auditing scheme without bilinear pairings, where a third party auditor (TPA) is employed to perform integrity auditing on outsourced data for users. The privacy of outsourced data can be guaranteed against TPA in the sense that TPA could not infer its contents from the returned proofs in the integrity auditing phase. Our construction is as efficient as Li et al.’s scheme, that is, each procedure takes the same time-consuming operations in both schemes, and our solution does not increase the sizes of processed data, challenge and proof.
文摘In this paper, a conjecture put forward by G. D. Anderson, S.-L. Qiu and M. K. Vamanamurthy in 1995 and concerning elliptic integrals is proved to be true, and some monotoneity and onvexity properties of certain combinations of generalized elliptic integrals are obtained.
文摘随着云存储模式的出现,越来越多的用户选择将应用和数据移植到云中,但他们在本地可能并没有保存任何数据副本,无法确保存储在云中的数据是完整的.如何确保云存储环境下用户数据的完整性,成为近来学术界研究的一个热点.数据完整性证明(Provable Data Integrity,PDI)被认为是解决这一问题的重要手段,该文对此进行了综述.首先,给出了数据完整性证明机制的协议框架,分析了云存储环境下数据完整性证明所具备的特征;其次,对各种数据完整性证明机制加以分类,在此分类基础上,介绍了各种典型的数据完整性验证机制并进行了对比;最后,指出了云存储中数据完整性验证面临的挑战及发展趋势.