In order to ensure the security of cloud storage, on the basis of the analysis of cloud storage security requirements, this paper puts forward a kind of" hidden mapping hyper-combined public key management scheme...In order to ensure the security of cloud storage, on the basis of the analysis of cloud storage security requirements, this paper puts forward a kind of" hidden mapping hyper-combined public key management scheme based on the hyperelliptic curve crypto system, which is applicable to the distributed cloud storage. A series of operation processes of the key management are elaborated, including key distribution, key updating and key agreement, etc. Analysis shows that the scheme can solve the problem of large-scale key management and storage issues in cloud storage effectively. The scheme feathers high efficiency and good scalability. It is able to resist collusion attack and ensure safe and reliable service provided by the cloud storaee system展开更多
In this paper, we consider the problem (θ(x,U))_t=(K(x,U)U_x)_x-(K(x,U))_x (x,t)∈G_T (θ(x,U)V(x,t))_t=(DθV_x)_x+(V(KU_x-K))_x,(x,t)∈G_T, u(x,0)=u_0(x),V(x,0),(x,0)=V_0(x),0≤x≤2, U(0,t)=h_0(t),U(2,t)=h_2(t),0≤t...In this paper, we consider the problem (θ(x,U))_t=(K(x,U)U_x)_x-(K(x,U))_x (x,t)∈G_T (θ(x,U)V(x,t))_t=(DθV_x)_x+(V(KU_x-K))_x,(x,t)∈G_T, u(x,0)=u_0(x),V(x,0),(x,0)=V_0(x),0≤x≤2, U(0,t)=h_0(t),U(2,t)=h_2(t),0≤t≤T, V(0,t)=g_0(t),V(2,t)=g_2(t),0≤t≤T. Where, θ(x,U)=θ_1(x,U) when (x,t)∈D_1={0≤x<1,0≤t≤T};θ(x,U)=θ_2(x,U),(x,t)∈D_2={1<x≤2,0≤t≤T}.K(x,U)=K_i(x,U),(x,t)∈D_i. θ_i, K_i are the Moisture content and hy draulic conductivity of porous Media on D_i respectively. V be the the concentration of solute in the fluid. In addition we also require that U, V, (K(x,U)U_x-1) and DθV_x+V(KU_x-K) are continu ous at x=1. We prove the exisence, uniqueness and large time behavior of the problem by the method of reg ularization.展开更多
基金This work was supported in part by the National Science Foundation Project of P.R.China,the Fundamental Research Funds for the Central Universities under Grant No.FRF-TP-14-046A2
文摘In order to ensure the security of cloud storage, on the basis of the analysis of cloud storage security requirements, this paper puts forward a kind of" hidden mapping hyper-combined public key management scheme based on the hyperelliptic curve crypto system, which is applicable to the distributed cloud storage. A series of operation processes of the key management are elaborated, including key distribution, key updating and key agreement, etc. Analysis shows that the scheme can solve the problem of large-scale key management and storage issues in cloud storage effectively. The scheme feathers high efficiency and good scalability. It is able to resist collusion attack and ensure safe and reliable service provided by the cloud storaee system
文摘In this paper, we consider the problem (θ(x,U))_t=(K(x,U)U_x)_x-(K(x,U))_x (x,t)∈G_T (θ(x,U)V(x,t))_t=(DθV_x)_x+(V(KU_x-K))_x,(x,t)∈G_T, u(x,0)=u_0(x),V(x,0),(x,0)=V_0(x),0≤x≤2, U(0,t)=h_0(t),U(2,t)=h_2(t),0≤t≤T, V(0,t)=g_0(t),V(2,t)=g_2(t),0≤t≤T. Where, θ(x,U)=θ_1(x,U) when (x,t)∈D_1={0≤x<1,0≤t≤T};θ(x,U)=θ_2(x,U),(x,t)∈D_2={1<x≤2,0≤t≤T}.K(x,U)=K_i(x,U),(x,t)∈D_i. θ_i, K_i are the Moisture content and hy draulic conductivity of porous Media on D_i respectively. V be the the concentration of solute in the fluid. In addition we also require that U, V, (K(x,U)U_x-1) and DθV_x+V(KU_x-K) are continu ous at x=1. We prove the exisence, uniqueness and large time behavior of the problem by the method of reg ularization.