Secure distributed data storage can shift the burden of maintaining a large number of files from the owner to proxy servers. Proxy servers can convert encrypted files for the owner to encrypted files for the receiver without the necessity of knowing the content of the original files. In practice, the original files will be removed […]
Multiattribute Resource Allocation Of Dynamic Optimization In Self-Organizing Clouds
By leveraging virtual machine (VM) technology which provides performance and fault isolation, cloud resources can be provisioned on demand in a fine grained, multiplexed manner rather than in monolithic pieces. By integrating volunteer computing into cloud architectures, we envision a gigantic self-organizing cloud (SOC) being formed to reap the huge potential of untapped commodity computing […]
Location Proof Updating System In A Resistance And Toward Privacy Preserving
we propose A Privacy-Preserving Location proof Updating System (APPLAUS) in which colocated Bluetooth enabled mobile devices mutually generate location proofs and send updates to a location proof server. Periodically changed pseudonyms are used by the mobile devices to protect source location privacy from each other, and from the untrusted location proof server For The Purpose […]
Website Structure Improvement through Facilitating Effective User Navigation
A primary reason is that the web developers’ understanding of how a website should be structured can be considerably different from that of the users. While various methods have been proposed to relink webpages to improve navigability using user navigation data, the completely reorganized new structure can be highly unpredictable, and the cost of disorienting […]
Scalable Database-Driven Reverse Dictionary In A Building
we describe the design and implementation of a reverse dictionary. Unlike a traditional forward dictionary,which maps from words to their definitions, a reverse dictionary takes a user input phrase describing the desired concept, and returns a set of candidate words that satisfy the input phrase. This work has significant application not only for the general […]
Secure Data Forwarding and Integrity checking in Multi Cloud Storage system
A cloud storage system, consisting of a collection of storage servers, provides long-term storage services over the Internet. One of the important concerns that need to be addressed is to assure the customer of the integrity i.e. correctness of his data in the cloud. In this paper we provide a scheme which gives a proof […]