EFFECTIVE AND EFFICIENT BORDA COUNT APPROACH USING INDEX BASED ALGORITHM FOR TOP-K QUERY ON MULTIVALUED OBJECTS

As ranking is an essential analytic method, it is natural and fundamental to investigate how to rank a set of multivalued objects. To the best of our knowledge, however, there is no existing work addressing this important problem systematically. One may think we may simply rank multivalued objects as uncertain/probabilistic …

Continue reading

CLOUD COMPUTING WITH RESILIENT UCONABC REEVALUATION AUTHORIZATION MODEL

UCONABC applies continuous authorization reevaluation, which requires usage accounting that enables fine-grained access control for cloud computing. The UCONABC usage control enhances the classical access control by reevaluating continuously the user attributes during consumption of a service or resource against the usage policies. The usage can be understood as an …

Continue reading

A SECURITY AND PRIVACY AWARE LOCATION-BASED REWARDING PROTOCOL FOR THE LOCAWARD SYSTEM

In this abstract, we propose a secure, privacy-preserving, and realistic mobile location-based rewarding system, called LocaWard, which strives to address the above concerns. The proposed system consists of a trusted third party (TTP), mobile users (MUs), token distributors (TDs), token collectors (TCs), and a central controller (CC). The TTP issues …

Continue reading

A REVOCABLE MULTI-AUTHORITY CP-ABE SCHEME

In this abstract, we first propose a revocable multi-authority CP-ABE scheme, where an efficient and secure revocation method is proposed to solve the attribute revocation problem in the system. Our attribute revocation method is efficient in the sense that it incurs less communication cost and computation cost, and is secure …

Continue reading

SECURE AUTHORIZED DEDUPLICATION USING A HYBRID CLOUD APPROACH

Data deduplication is a specialized data compression technique for eliminating duplicate copies of repeating data in storage. The technique is used to improve storage utilization and can also be applied to network data transfers to reduce the number of bytes that must be sent. To protect the confidentiality of sensitive …

Continue reading

LOCAWARD: A SECURE, PRIVACY-PRESERVING, AND REALISTIC MOBILE LOCATION-BASED REWARDING SYSTEM

Location-based social networking, such as Facebook, here users share their locations with friends and find others who are nearby. Another type of MLBSs requires the users to provide current or historical location proof to fulfill some purposes. Emerging  as  a  new  type  of  mobile  marketing,  mobile  location-based  services  (MLBSs)  have  …

Continue reading

MULTI-AUTHORITY ACCESS CONTROL SCHEME FOR SECURE CLOUD STORAGE

In multi-authority cloud storage systems, users’ attributes can be changed dynamically. A user may be entitled some new attributes or revoked some current attributes. And his permission of data access should be changed accordingly. Ciphertext-Policy Attribute-based Encryption (CP-ABE) is regarded as one of the most suitable technologies for data access …

Continue reading

RESILIENCE TO THE UCONABC CONTINUOUS AUTHORIZATION REEVALUATION FOR CLOUD COMPUTING

The proposed approach provides a resilient UCONABC reevaluation authorization model for cloud computing. The usage architecture for collecting contextual data allows for fine-grained services accounting and authorization attributes. The data are consolidated on a management domain and provided to consumer management systems, enabling the reconfiguration of usage policies and monitoring …

Continue reading

DOS ATTACK DETECTION BASED ON MULTIVARIATE CORRELATION ANALYSIS

DoS attacks severely degrade the availability of a victim, which can be a host, a router, or an entire network. They impose intensive computati on tasks to the victim by exploiting its system vulnerability or flooding it with huge amount of useless packets. The victim can be forced out of …

Continue reading

PREDICTING THE DEGREE OF THE DIFFICULTY FOR KEYWORD QUERIES OVER DATABASES

In Keyword Query Interface, any entity in a data set that contains the query keywords is a potential answer, keyword queries typically have many possible answers. KQIs must identify the information needs behind keyword queries and rank the answers so that the desired answers appear at the top of the …

Continue reading