期刊文献+
共找到8篇文章
< 1 >
每页显示 20 50 100
KPNQwest资产整体或分割卖出尚未确定
1
《通信世界》 2002年第18期11-11,共1页
关键词 KPNQwest公司 数据服务供应商 资产清算 资产收购
下载PDF
Secure Big Data Storage and Sharing Scheme for Cloud Tenants 被引量:10
2
作者 CHENG Hongbing RONG Chunming +2 位作者 HWANG Kai WANG Weihong LI Yanyan 《China Communications》 SCIE CSCD 2015年第6期106-115,共10页
The Cloud is increasingly being used to store and process big data for its tenants and classical security mechanisms using encryption are neither sufficiently efficient nor suited to the task of protecting big data in... The Cloud is increasingly being used to store and process big data for its tenants and classical security mechanisms using encryption are neither sufficiently efficient nor suited to the task of protecting big data in the Cloud.In this paper,we present an alternative approach which divides big data into sequenced parts and stores them among multiple Cloud storage service providers.Instead of protecting the big data itself,the proposed scheme protects the mapping of the various data elements to each provider using a trapdoor function.Analysis,comparison and simulation prove that the proposed scheme is efficient and secure for the big data of Cloud tenants. 展开更多
关键词 cloud computing big data stor-age and sharing security
下载PDF
A Retrievable Data Perturbation Method Used in Privacy-Preserving in Cloud Computing 被引量:3
3
作者 YANG Pan 《China Communications》 SCIE CSCD 2014年第8期73-84,共12页
With the increasing popularity of cloud computing,privacy has become one of the key problem in cloud security.When data is outsourced to the cloud,for data owners,they need to ensure the security of their privacy;for ... With the increasing popularity of cloud computing,privacy has become one of the key problem in cloud security.When data is outsourced to the cloud,for data owners,they need to ensure the security of their privacy;for cloud service providers,they need some information of the data to provide high QoS services;and for authorized users,they need to access to the true value of data.The existing privacy-preserving methods can't meet all the needs of the three parties at the same time.To address this issue,we propose a retrievable data perturbation method and use it in the privacy-preserving in data outsourcing in cloud computing.Our scheme comes in four steps.Firstly,an improved random generator is proposed to generate an accurate "noise".Next,a perturbation algorithm is introduced to add noise to the original data.By doing this,the privacy information is hidden,but the mean and covariance of data which the service providers may need remain unchanged.Then,a retrieval algorithm is proposed to get the original data back from the perturbed data.Finally,we combine the retrievable perturbation with the access control process to ensure only the authorized users can retrieve the original data.The experiments show that our scheme perturbs date correctly,efficiently,and securely. 展开更多
关键词 PRIVACY-PRESERVING data perturbation RETRIEVAL access control cloudcomputing
下载PDF
Analysis of Telephone Call Detail Records based on Fuzzy Decision Tree 被引量:1
4
作者 Ding Liping Gu jian +1 位作者 Wang Yongji Wu Jingzheng 《China Communications》 SCIE CSCD 2010年第6期120-127,共8页
Digital evidences can be obtained from computers and various kinds of digital devices, such as telephones, mp3/mp4 players, printers, cameras, etc. Telephone Call Detail Records (CDRs) are one important source of di... Digital evidences can be obtained from computers and various kinds of digital devices, such as telephones, mp3/mp4 players, printers, cameras, etc. Telephone Call Detail Records (CDRs) are one important source of digital evidences that can identify suspects and their partners. Law enforcement authorities may intercept and record specific conversations with a court order and CDRs can be obtained from telephone service providers. However, the CDRs of a suspect for a period of time are often fairly large in volume. To obtain useful information and make appropriate decisions automatically from such large amount of CDRs become more and more difficult. Current analysis tools are designed to present only numerical results rather than help us make useful decisions. In this paper, an algorithm based on Fuzzy Decision Tree (FDT) for analyzing CDRs is proposed. We conducted experimental evaluation to verify the proposed algorithm and the result is very promising. 展开更多
关键词 FORENSICS digital evidence telephonecall records fuzzy decision tree
下载PDF
TPTVer: A Trusted Third Party Based Trusted Verifier for Multi-Layered Outsourced Big Data System in Cloud Environment 被引量:3
5
作者 Jing Zhan Xudong Fan +2 位作者 Lei Cai Yaqi Gao Junxi Zhuang 《China Communications》 SCIE CSCD 2018年第2期122-137,共16页
Cloud computing is very useful for big data owner who doesn't want to manage IT infrastructure and big data technique details. However, it is hard for big data owner to trust multi-layer outsourced big data system... Cloud computing is very useful for big data owner who doesn't want to manage IT infrastructure and big data technique details. However, it is hard for big data owner to trust multi-layer outsourced big data system in cloud environment and to verify which outsourced service leads to the problem. Similarly, the cloud service provider cannot simply trust the data computation applications. At last,the verification data itself may also leak the sensitive information from the cloud service provider and data owner. We propose a new three-level definition of the verification, threat model, corresponding trusted policies based on different roles for outsourced big data system in cloud. We also provide two policy enforcement methods for building trusted data computation environment by measuring both the Map Reduce application and its behaviors based on trusted computing and aspect-oriented programming. To prevent sensitive information leakage from verification process,we provide a privacy-preserved verification method. Finally, we implement the TPTVer, a Trusted third Party based Trusted Verifier as a proof of concept system. Our evaluation and analysis show that TPTVer can provide trusted verification for multi-layered outsourced big data system in the cloud with low overhead. 展开更多
关键词 big data security outsourced ser-vice security MapReduce behavior trustedverification trusted third party
下载PDF
Mining and Modelling the Dynamic Patterns of Service Providers in Cellular Data Network Based on Big Data Analysis 被引量:3
6
作者 刘军 李婷婷 +2 位作者 CHENG Gang 于华 雷振明 《China Communications》 SCIE CSCD 2013年第12期25-36,共12页
Understanding the dynamic traffic and usage characteristics of data services in cellular networks is important for optimising network resources and improving user experience.Recent studies have illustrated traffic cha... Understanding the dynamic traffic and usage characteristics of data services in cellular networks is important for optimising network resources and improving user experience.Recent studies have illustrated traffic characteristics from specific perspectives,such as user behaviour,device type,and applications.In this paper,we present the results of our study from a different perspective,namely service providers,to reveal the traffic characteristics of cellular data networks.Our study is based on traffic data collected over a five-day period from a leading mobile operator's core network in China.We propose a Zipf-like model to characterise the distributions of the traffic volume,subscribers,and requests among service providers.Nine distinct diurnal traffic patterns of service providers are identified by formulating and solving a time series clustering problem.Our work differs from previous related works in that we perform measurements on a large quantity of data covering 2.2 billion traffic records,and we first explore the traffic patterns of thousands of service providers.Results of our study present mobile Internet participants with a better understanding of the traffic and usage characteristics of service providers,which play a critical role in the mobile Internet era. 展开更多
关键词 mobile Internet service provider traffic measurement MAPREDUCE time seriesclustering
下载PDF
Approximate Discovery of Service Nodes by Duplicate Detection in Flows
7
作者 Zhou Changling Xiao Jianguo +2 位作者 Cui Jian Zhang Bei Li Feng 《China Communications》 SCIE CSCD 2012年第5期75-89,共15页
Discovery of service nodes in flows is a challenging task, especially in large ISPs or campus networks where the amount of traffic across net-work is rmssive. We propose an effective data structure called Round-robin ... Discovery of service nodes in flows is a challenging task, especially in large ISPs or campus networks where the amount of traffic across net-work is rmssive. We propose an effective data structure called Round-robin Buddy Bloom Filters (RBBF) to detect duplicate elements in flows. A two-stage approximate algorithm based on RBBF which can be used for detecting service nodes from NetFlow data is also given and the perfonmnce of the algorithm is analyzed. In our case, the proposed algorithm uses about 1% memory of hash table with false positive error rate less than 5%. A proto-type system, which is compatible with both IPv4 and IPv6, using the proposed data structure and al-gorithm is introduced. Some real world case studies based on the prototype system are discussed. 展开更多
关键词 duplicate detection service nodes dis-covery buddy bloom filter round-robin schema NETFLOW
下载PDF
Understanding the YouTube Partners and Their Data: Measurement and Analysis 被引量:2
8
作者 CHENG Xu Fatourechi Mehrdad +2 位作者 MA Xiaoqiang ZHANG Cong LIU Jiangchuan 《China Communications》 SCIE CSCD 2014年第12期26-34,共9页
User generated content,e.g.,from YouTube,the most popular online video sharing site,is one of the major sources of today's big data and it is crucial to understand their inherent characteristics.Recently,YouTube h... User generated content,e.g.,from YouTube,the most popular online video sharing site,is one of the major sources of today's big data and it is crucial to understand their inherent characteristics.Recently,YouTube has started working with content providers(known as YouTube partners) to promote the users' watching and sharing activities.The substantial benefit is to further augment its service and monetize more videos,which is crucial to both YouTube and its partners,as well as to other providers of relevant services.In this paper,our main contribution is to analyze the massive amounts of video data from a YouTube partner's view.We make effective use of Insight,a new analytics service of YouTube that offers simple data analysis for partners.To provide the practical guidance from the raw Insight data,we enable more complex investigations for the inherent features that affect the popularity of the videos.Our findings facilitate YouTube partners to re-design current video publishing strategies,having more opportunities to attract more views. 展开更多
关键词 YouTube partners video popularity viewing behaviour user engagement
下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部