Cloud storage is a service involving cloud service providers providingstorage space to customers. Cloud storage services have numerous advantages,including convenience, high computation, and capacity, thereby attracti...Cloud storage is a service involving cloud service providers providingstorage space to customers. Cloud storage services have numerous advantages,including convenience, high computation, and capacity, thereby attracting usersto outsource data in the cloud. However, users outsource data directly via cloudstage services that are unsafe when outsourcing data is sensitive for users. Therefore, cipher text-policy attribute-based encryption is a promising cryptographicsolution in a cloud environment, and can be drawn up for access control by dataowners (DO) to define access policy. Unfortunately, an outsourced architectureapplied with attribute-based encryption introduces numerous challenges, including revocation. This issue is a threat to the data security of DO. Furthermore,highly secure and flexible cipher text-based attribute access control with role hierarchy user grouping in cloud storage is implemented by extending the KUNodes(revocation) storage identity-based encryption. Result is evaluated using Cloudsim, and our algorithm outperforms in terms of computational cost by consuming32 MB for 150-MB files.展开更多
A unified approach is proposed for making a continuity adjustment on some control charts for attributes, e.g., np-chart and c-chart, through adding a uniform (0, 1) random observation to the conventional sample statis...A unified approach is proposed for making a continuity adjustment on some control charts for attributes, e.g., np-chart and c-chart, through adding a uniform (0, 1) random observation to the conventional sample statistic (e.g., and c <SUB>i </SUB>). The adjusted sample statistic then has a continuous distribution. Consequently, given any Type I risk α (the probability that the sample statistic is on or beyond the control limits), control charts achieving the exact value of α can be readily constructed. Guidelines are given for when to use the continuity adjustment control chart, the conventional Shewhart control chart (with ±3 standard deviations control limits), and the control chart based on the exact distribution of the sample statistic before adjustment.展开更多
Cloud computing has become a significant computing model in the IT industry. In this emerging model,computing resources such as software, hardware, networking, and storage can be accessed anywhere in the world on a pa...Cloud computing has become a significant computing model in the IT industry. In this emerging model,computing resources such as software, hardware, networking, and storage can be accessed anywhere in the world on a pay-per-use basis. However, storing sensitive data on un-trusted servers is a challenging issue for this model. To guarantee confidentiality and proper access control of outsourced sensitive data, classical encryption techniques are used. However, such access control schemes are not feasible in cloud computing because of their lack of flexibility, scalability, and fine-grained access control. Instead, Attribute-Based Encryption(ABE) techniques are used in the cloud. This paper extensively surveys all ABE schemes and creates a comparison table for the key criteria for these schemes in cloud applications.展开更多
文摘Cloud storage is a service involving cloud service providers providingstorage space to customers. Cloud storage services have numerous advantages,including convenience, high computation, and capacity, thereby attracting usersto outsource data in the cloud. However, users outsource data directly via cloudstage services that are unsafe when outsourcing data is sensitive for users. Therefore, cipher text-policy attribute-based encryption is a promising cryptographicsolution in a cloud environment, and can be drawn up for access control by dataowners (DO) to define access policy. Unfortunately, an outsourced architectureapplied with attribute-based encryption introduces numerous challenges, including revocation. This issue is a threat to the data security of DO. Furthermore,highly secure and flexible cipher text-based attribute access control with role hierarchy user grouping in cloud storage is implemented by extending the KUNodes(revocation) storage identity-based encryption. Result is evaluated using Cloudsim, and our algorithm outperforms in terms of computational cost by consuming32 MB for 150-MB files.
基金the Natural Science and Engineering Research Council of Canada and Research Grant Council of Hong Kong grants.
文摘A unified approach is proposed for making a continuity adjustment on some control charts for attributes, e.g., np-chart and c-chart, through adding a uniform (0, 1) random observation to the conventional sample statistic (e.g., and c <SUB>i </SUB>). The adjusted sample statistic then has a continuous distribution. Consequently, given any Type I risk α (the probability that the sample statistic is on or beyond the control limits), control charts achieving the exact value of α can be readily constructed. Guidelines are given for when to use the continuity adjustment control chart, the conventional Shewhart control chart (with ±3 standard deviations control limits), and the control chart based on the exact distribution of the sample statistic before adjustment.
文摘Cloud computing has become a significant computing model in the IT industry. In this emerging model,computing resources such as software, hardware, networking, and storage can be accessed anywhere in the world on a pay-per-use basis. However, storing sensitive data on un-trusted servers is a challenging issue for this model. To guarantee confidentiality and proper access control of outsourced sensitive data, classical encryption techniques are used. However, such access control schemes are not feasible in cloud computing because of their lack of flexibility, scalability, and fine-grained access control. Instead, Attribute-Based Encryption(ABE) techniques are used in the cloud. This paper extensively surveys all ABE schemes and creates a comparison table for the key criteria for these schemes in cloud applications.