A spatial database manages multidimensional objects (such as points, rectangles, etc.), and provides fast access to those objects based on different selection criteria. The importance of spatial databases is reflected by the convenience of modeling entities of reality in a geometric manner. For example, locations of restaurants, hotels, hospitals and so on are often represented […]
Dynamic Operations on the Outsourced Data
The dynamic operations in the proposed scheme are performed at the block level via a request in the general form Existing research close to our work can be found in the areas of integrity verification of outsourced data, cryptographic file systems in distributed networks, and access control of outsourced data. Different variations of PDP protocols […]
Cloud computing data storage system model
Cloud computing has received considerable attention from both academia and industry due to a number of important advantages including: cost effectiveness, low management overhead, immediate access to a wide range of applications, flexibility to scale up and down information technology (IT) capacity, and mobility where customers can access information wherever they are, rather than having […]
System Adversary Model and Preliminaries
The basic idea of blind vector transformation protocol is allowing two untrusted parties to transform two vectors into the blind ones by following a series of private and identical steps, e.g., adding a random vector, shuffling in the same order. Since the transformation follows the same step, the matching results (e.g. the number of matched […]
Proposed Privacy Preserving and Fairness Aware Friend Matching Protocol
Mobile online social networks have gained tremendous momentum in the recent years due to both the wide proliferation of mobile devices such as smartphones and tablets as well as the ubiquitous availability of network services. Moreover, the positioning technologies such as GPS, and Wireless localization techniques for mobile devices have made both the generation and […]
Privacy-Preserving Public Auditing Scheme
To achieve privacy-preserving public auditing, we propose to uniquely integrate the homomorphic linear authenticator with random masking technique. In our protocol, the linear combination of sampled blocks in the server’s response is masked with randomness generated the server. With random masking, the TPA no longer has all the necessary information to build up a correct […]
A secure cloud storage system Supporting privacy-preserving public auditing
Cloud Computing has been envisioned as the next-generation information technology (IT) architecture for enterprises, due to its long list of unprecedented advantages in the IT history: on-demand self-service, ubiquitous network access, location independent resource pooling, rapid resource elasticity, usage-based pricing and transference of risk . As a disruptive technology with profound implications, Cloud Computing is […]
Social Network based P2P Overlay Construction Algorithm
Video sharing is an increasingly popular application in OSNs. The client/server architecture deployed by current video sharing systems in OSNs costs a large amount of resources (i.e. money, server storage) for the service provider and lacks scalability. The privacy constraints in OSNs, the current peer-assisted Video-on-Demand (VoD) techniques are suboptimal if not entirely applicable to […]
Effect of Social Distance on Video Viewing Patterns
Online social networks (OSNs) (e.g., Facebook, Twitter) are now among the most popular sites on the Web. An OSN provides a powerful means of establishing social connections and sharing, organizing, and finding content. For example, Facebook presently has over 500 million users. Unlike current file or video sharing systems (e.g., BitTorrent and YouTube), which are […]
Sophisticated Attack On Queuing Mechanisms
Queueing mechanisms are major mechanisms used in variety of computer and communications systems. Their major objective is to control the system operation when it is under heavy traffic load in order to provide good and fair performance to the various users. Since these system are responsible for the resource allocation and taking care of the […]