Mobile online social networks have gained tremendous momentum in the recent years due to both the wide proliferation of mobile devices such as smartphones and tablets as well as the ubiquitous availability of network services. Moreover, the positioning technologies such as GPS, and Wireless localization techniques for mobile devices have made both the generation and […]
Privacy-Preserving Public Auditing Scheme
To achieve privacy-preserving public auditing, we propose to uniquely integrate the homomorphic linear authenticator with random masking technique. In our protocol, the linear combination of sampled blocks in the server’s response is masked with randomness generated the server. With random masking, the TPA no longer has all the necessary information to build up a correct […]
A secure cloud storage system Supporting privacy-preserving public auditing
Cloud Computing has been envisioned as the next-generation information technology (IT) architecture for enterprises, due to its long list of unprecedented advantages in the IT history: on-demand self-service, ubiquitous network access, location independent resource pooling, rapid resource elasticity, usage-based pricing and transference of risk . As a disruptive technology with profound implications, Cloud Computing is […]
Social Network based P2P Overlay Construction Algorithm
Video sharing is an increasingly popular application in OSNs. The client/server architecture deployed by current video sharing systems in OSNs costs a large amount of resources (i.e. money, server storage) for the service provider and lacks scalability. The privacy constraints in OSNs, the current peer-assisted Video-on-Demand (VoD) techniques are suboptimal if not entirely applicable to […]
Effect of Social Distance on Video Viewing Patterns
Online social networks (OSNs) (e.g., Facebook, Twitter) are now among the most popular sites on the Web. An OSN provides a powerful means of establishing social connections and sharing, organizing, and finding content. For example, Facebook presently has over 500 million users. Unlike current file or video sharing systems (e.g., BitTorrent and YouTube), which are […]
Sophisticated Attack On Queuing Mechanisms
Queueing mechanisms are major mechanisms used in variety of computer and communications systems. Their major objective is to control the system operation when it is under heavy traffic load in order to provide good and fair performance to the various users. Since these system are responsible for the resource allocation and taking care of the […]
Userbased collaborative filtering method using vector Similarity
Cloud computing is Internet-based computing, whereby shared configurable resources (e.g., infrastructure, platform, and software) are provided to computers and other devices as services . Strongly promoted by the leading industrial companies (e.g., Amazon, Google, Microsoft, IBM, etc.), cloud computing is quickly becoming popular in recent years. Applications deployed in the cloud environment (named cloud applications […]
Parameters an Analytic hierarchy process
A Cloud service can be classified by many different factors that represent its overall performance and features. An example of a classification of such factors is provided by the Service Measurement Index (SMI) . The SMI framework summarizes the most important QoS attributes for Cloud offerings on a high level, such like Accountability, Agility, and […]
Limitation on Possible Duplicate Relaying
A simple and provably secure encryption allowing encrypted data to be efficiently and additively aggregated. Only a modular addition is needed for cipher-text aggregation. Scheme security is based on the in distinguish ability property of a pseudorandom function (PRF), a standard cryptographic primitive. It was proved that aggregation based on this can efficiently compute statistical […]
Privacy Enhanced Participatory Sensing Infrastructure
The outbreak of Wireless Sensor Networks (WSNs) and predicted the widespread installation of sensors, in infrastructures, buildings, woods, rivers, or even the atmosphere. This has triggered a lot of interest in many different WSN topics, including identifying and addressing security issues, such as data integrity, node capture, secure routing, etc. On the contrary, privacy has […]
- « Previous Page
- 1
- …
- 19
- 20
- 21