期刊文献+
共找到6篇文章
< 1 >
每页显示 20 50 100
Hadoop-based secure storage solution for big data in cloud computing environment 被引量:1
1
作者 Shaopeng Guan Conghui Zhang +1 位作者 Yilin Wang Wenqing Liu 《Digital Communications and Networks》 SCIE CSCD 2024年第1期227-236,共10页
In order to address the problems of the single encryption algorithm,such as low encryption efficiency and unreliable metadata for static data storage of big data platforms in the cloud computing environment,we propose... In order to address the problems of the single encryption algorithm,such as low encryption efficiency and unreliable metadata for static data storage of big data platforms in the cloud computing environment,we propose a Hadoop based big data secure storage scheme.Firstly,in order to disperse the NameNode service from a single server to multiple servers,we combine HDFS federation and HDFS high-availability mechanisms,and use the Zookeeper distributed coordination mechanism to coordinate each node to achieve dual-channel storage.Then,we improve the ECC encryption algorithm for the encryption of ordinary data,and adopt a homomorphic encryption algorithm to encrypt data that needs to be calculated.To accelerate the encryption,we adopt the dualthread encryption mode.Finally,the HDFS control module is designed to combine the encryption algorithm with the storage model.Experimental results show that the proposed solution solves the problem of a single point of failure of metadata,performs well in terms of metadata reliability,and can realize the fault tolerance of the server.The improved encryption algorithm integrates the dual-channel storage mode,and the encryption storage efficiency improves by 27.6% on average. 展开更多
关键词 Big data security Data encryption HADOOP Parallel encrypted storage Zookeeper
下载PDF
Photodynamic patterning of living bacterial biofilms with high resolutions for information encryption and antibiotic screening
2
作者 Minghui Xiao Ke Xue +6 位作者 Hao Fu Jiaxin Wang Shuyi Lv Zhencheng Sun Cheng Wang Linqi Shi Chunlei Zhu 《Aggregate》 EI CAS 2024年第4期155-164,共10页
Controlling the growth of bacterial biofilms in a specific pattern greatly enhances the study of cell-to-cell interactions and paves the way for expanding their biolog-ical applications.However,the development of simple... Controlling the growth of bacterial biofilms in a specific pattern greatly enhances the study of cell-to-cell interactions and paves the way for expanding their biolog-ical applications.However,the development of simple,cost-effective,and highly resolved biopatterning approaches remains a persistent challenge.Herein,a pio-neering photodynamic biopatterning technique for the creation of living bacterial biofilms with customized geometries at high resolutions is presented.First of all,an outstanding aggregation-induced emission photosensitizer is synthesized to enable efficient photodynamic bacterial killing at a low concentration.By combining with custom-designed photomasks featuring both opaque and transparent patterns,the viability of photosensitizer-coated bacteria is successfully manipulated by control-ling the degree of light transmittance.This process leads to the formation of living bacterial biofilms with specific patterns replicated from the photomask.Such an innovative strategy can be employed to generate living bacterial biofilms composed of either mono-or multispecies,with a spatial resolution of approximately 24µm.Furthermore,its potential applications in information storage/encryption and antibi-otic screening are explored.This study provides an alternative way to understand and investigate the intricate interactions among bacteria within 3D biofilms,hold-ing great promise in the controlled fabrication of dynamic biological systems for advanced applications. 展开更多
关键词 aggregation-induced emission antibiotic screening bacterial biofilms information storage/encryption photodynamic patterning
原文传递
Multi-authority proxy re-encryption based on CPABE for cloud storage systems 被引量:7
3
作者 Xiaolong Xu Jinglan Zhou +1 位作者 Xinheng Wang Yun Zhang 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2016年第1期211-223,共13页
The dissociation between data management and data ownership makes it difficult to protect data security and privacy in cloud storage systems.Traditional encryption technologies are not suitable for data protection in ... The dissociation between data management and data ownership makes it difficult to protect data security and privacy in cloud storage systems.Traditional encryption technologies are not suitable for data protection in cloud storage systems.A novel multi-authority proxy re-encryption mechanism based on ciphertext-policy attribute-based encryption(MPRE-CPABE) is proposed for cloud storage systems.MPRE-CPABE requires data owner to split each file into two blocks,one big block and one small block.The small block is used to encrypt the big one as the private key,and then the encrypted big block will be uploaded to the cloud storage system.Even if the uploaded big block of file is stolen,illegal users cannot get the complete information of the file easily.Ciphertext-policy attribute-based encryption(CPABE)is always criticized for its heavy overload and insecure issues when distributing keys or revoking user's access right.MPRE-CPABE applies CPABE to the multi-authority cloud storage system,and solves the above issues.The weighted access structure(WAS) is proposed to support a variety of fine-grained threshold access control policy in multi-authority environments,and reduce the computational cost of key distribution.Meanwhile,MPRE-CPABE uses proxy re-encryption to reduce the computational cost of access revocation.Experiments are implemented on platforms of Ubuntu and CloudSim.Experimental results show that MPRE-CPABE can greatly reduce the computational cost of the generation of key components and the revocation of user's access right.MPRE-CPABE is also proved secure under the security model of decisional bilinear Diffie-Hellman(DBDH). 展开更多
关键词 cloud storage data partition multi-authority security proxy re-encryption attribute-based encryption(ABE).
下载PDF
Multicolor Circularly Polarized Luminescence of a Single-Component System Revealing Multiple Information Encryption 被引量:4
4
作者 Ying Hu Zizhao Huang +1 位作者 Itamar Willner Xiang Ma 《CCS Chemistry》 CSCD 2024年第2期518-527,共10页
Metal-free materials with multicolor tunable circularly polarized luminescence(CPL)are attractive because of their potential applications in information storage and encryption.Here,we designed two enantiomers composed... Metal-free materials with multicolor tunable circularly polarized luminescence(CPL)are attractive because of their potential applications in information storage and encryption.Here,we designed two enantiomers composed of chiral dialkyl glutamides and achiral vibration-induced emission(VIE)moiety,which can switch on CPL after a simple gelation process.It is noteworthy that the CPL colors vary in different solvents,and this is attributed to various self-assembly-induced microstructures,in which the VIE moiety is restrained to different degrees.Accordingly,a multidimensional code system composed of a quick response code,a ultraviolet(UV)light-activated color code,and a CPL information figure was constructed.To our satisfaction,the system possesses multiple information-storage functions.The orthogonal anticounterfeiting and CPLenhanced encryption functions also improve the system information encryption ability.In brief,this study provides a practical example of CPL applied to information security and an effective approach to obtain a single-component color-tunable CPL material with multiple information storage and encryption functions as well. 展开更多
关键词 circularly polarized luminescence information storage and encryption multicolor tunable single component vibration-induced emission
原文传递
MobiGemini:Sensitive-Based Data and Resource Protection Framework for Mobile Device 被引量:1
5
作者 Shuangxi Hong Chuanchang Liu +2 位作者 Bo Cheng Bingfei Ren Junliang Chen 《China Communications》 SCIE CSCD 2017年第7期67-77,共11页
With the popularity of smartphones and the rapid development of mobile internet, smartphone becomes an important tool that store sensitive data of owner. Encryption naturally becomes a necessary means of protection. I... With the popularity of smartphones and the rapid development of mobile internet, smartphone becomes an important tool that store sensitive data of owner. Encryption naturally becomes a necessary means of protection. In certain situations, this is inadequate, as user may be coerced to hand over decryption keys or passwords of sensitive APP(Ali Pay) on mobile device. Therefore, only encryption cannot protect sensitive APP and privacy data stored on user's smartphone. To address these obstacles, we design a protection system called Mobi Gemini. It enables automatic uninstalling service that can immediately uninstall multiple APP at same time, and also enabling plausibly deniable encryption(PDE) on mobile devices by hiding encrypted volume within random data in free space of cache partition. We improve the key store way of previous PDE schemes on mobile device. The evaluation results show that the scheme introduces a few overhead compared with original android system enabling full disk encryption. 展开更多
关键词 mobile security privacy protection storage encryption deniable encryption
下载PDF
A Practical Group Key Management Algorithm for Cloud Data Sharing with Dynamic Group
6
作者 Wei Song Hua Zou +1 位作者 Haowen Liu Jun Chen 《China Communications》 SCIE CSCD 2016年第6期205-216,共12页
Cloud data sharing service, which allows a group of people to work together to access and modify the shared data, is one of the most popular and efficient working styles in the enterprises. However, the cloud server i... Cloud data sharing service, which allows a group of people to work together to access and modify the shared data, is one of the most popular and efficient working styles in the enterprises. However, the cloud server is not completely trusted, and its security could be compromised by monetary reasons or caused by hacking and hardware errors. Therefore, despite of having advantages of scalability and flexibility, cloud storage service comes with privacy and the security concerns. A straightforward method to protect the user's privacy is to encrypt the data stored at the cloud. To enable the authenticated users to access the encrypted cloud data, a practical group key management algorithm for the cloud data sharing application is highly desired. The existing group key management mechanisms presume that the server is trusted. But, the cloud data service mode does not always meet this condition. How to manage the group keys to support the scenario of the cloud storage with a semi-trusted cloud server is still a challenging task. Moreover, the cloud storage system is a large-scale and open application, in which the user group is dynamic. To address this problem, we propose a practical group key management algorithm based on a proxy re-encryption mechanism in this paper. We use the cloud server to act as a proxy tore-encrypt the group key to allow authorized users to decrypt and get the group key by their private key. To achieve the hierarchical access control policy, our scheme enables the cloud server to convert the encrypted group key of the lower group to the upper group. The numerical analysis and experimental results further validate the high efficiency and security of the proposed scheme. 展开更多
关键词 proxy re-encryption group key management bilinear map encrypted cloud storage
下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部