期刊文献+
共找到3篇文章
< 1 >
每页显示 20 50 100
Hybrid Cloud Security by Revocable KUNodes-Storage with Identity-Based Encryption
1
作者 S.Saravanakumar S.Chitra 《Computer Systems Science & Engineering》 SCIE EI 2022年第12期985-996,共12页
Cloud storage is a service involving cloud service providers providingstorage space to customers. Cloud storage services have numerous advantages,including convenience, high computation, and capacity, thereby attracti... Cloud storage is a service involving cloud service providers providingstorage space to customers. Cloud storage services have numerous advantages,including convenience, high computation, and capacity, thereby attracting usersto outsource data in the cloud. However, users outsource data directly via cloudstage services that are unsafe when outsourcing data is sensitive for users. Therefore, cipher text-policy attribute-based encryption is a promising cryptographicsolution in a cloud environment, and can be drawn up for access control by dataowners (DO) to define access policy. Unfortunately, an outsourced architectureapplied with attribute-based encryption introduces numerous challenges, including revocation. This issue is a threat to the data security of DO. Furthermore,highly secure and flexible cipher text-based attribute access control with role hierarchy user grouping in cloud storage is implemented by extending the KUNodes(revocation) storage identity-based encryption. Result is evaluated using Cloudsim, and our algorithm outperforms in terms of computational cost by consuming32 MB for 150-MB files. 展开更多
关键词 Cloud computing storage identification based revocation attribute based access control encryption DECRYPTION
下载PDF
Continuity Adjustment for Control Charts for Attributes
2
作者 L.K.Chan T.K.Mak B.Tao 《Acta Mathematicae Applicatae Sinica》 SCIE CSCD 2003年第3期397-404,共8页
A unified approach is proposed for making a continuity adjustment on some control charts for attributes, e.g., np-chart and c-chart, through adding a uniform (0, 1) random observation to the conventional sample statis... A unified approach is proposed for making a continuity adjustment on some control charts for attributes, e.g., np-chart and c-chart, through adding a uniform (0, 1) random observation to the conventional sample statistic (e.g., and c <SUB>i </SUB>). The adjusted sample statistic then has a continuous distribution. Consequently, given any Type I risk &#945; (the probability that the sample statistic is on or beyond the control limits), control charts achieving the exact value of &#945; can be readily constructed. Guidelines are given for when to use the continuity adjustment control chart, the conventional Shewhart control chart (with ±3 standard deviations control limits), and the control chart based on the exact distribution of the sample statistic before adjustment. 展开更多
关键词 control charts for attributes continuity adjustments np p and c control charts statistical process control
原文传递
Analysis of Classical Encryption Techniques in Cloud Computing 被引量:1
3
作者 Muhammad Yasir Shabir Asif Iqbal +1 位作者 Zahid Mahmood Ata Ullah Ghafoor 《Tsinghua Science and Technology》 SCIE EI CAS CSCD 2016年第1期102-113,共12页
Cloud computing has become a significant computing model in the IT industry. In this emerging model,computing resources such as software, hardware, networking, and storage can be accessed anywhere in the world on a pa... Cloud computing has become a significant computing model in the IT industry. In this emerging model,computing resources such as software, hardware, networking, and storage can be accessed anywhere in the world on a pay-per-use basis. However, storing sensitive data on un-trusted servers is a challenging issue for this model. To guarantee confidentiality and proper access control of outsourced sensitive data, classical encryption techniques are used. However, such access control schemes are not feasible in cloud computing because of their lack of flexibility, scalability, and fine-grained access control. Instead, Attribute-Based Encryption(ABE) techniques are used in the cloud. This paper extensively surveys all ABE schemes and creates a comparison table for the key criteria for these schemes in cloud applications. 展开更多
关键词 cloud computing access control fine-grained access weighted attribute
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部