This abstract proposed to extend SQL with set predicates for an important class of analytical queries, which otherwise would be difficult to write and optimize. It designed two query evaluation approaches for set predicates, including an aggregate function-based approach and a bitmap index-based approach. Aggregate function-based approach processes set predicates in a way similar to […]
CP-ABE BASED SECURE DATA RETRIEVAL SCHEME FOR DECENTRALIZED DISRUPTION-TOLERANT MILITARY NETWORKS
Ciphertext-policy attribute-based encryption (CP-ABE) is a promising cryptographic solution to the access control issues. Ciphertext-policy ABE provides a scalable way of encrypting data such that the encryptor defines the attribute set that the decryptor needs to possess in order to de-crypt the ciphertext. Thus, different users are allowed to decrypt different pieces of data per […]
BPN LEARNING MADE PRACTICAL WITH CLOUD COMPUTING FOR PRIVACY PRESERVING
To protect each participant’s private data set and intermediate results generated during the BPN network learning process, it requires secure computation of various operations, for example, addition, scalar product, and the nonlinear sigmoid function, which are needed by the BPN network algorithm; Back -Propagation is an effective method for learning neural networks and has been […]
Two-Phase Validation Commit Protocol for Secure Cloud Transaction
This work proposes a Two-Phase Validation Commit (2PVC) protocol that ensures that a transaction is safe by checking policy, credential, and data consistency during transaction execution. This paper defines several different levels of policy consistency constraints and corresponding enforcement approaches that guarantee the trustworthiness of transactions executing on cloud servers. 2PVC can be used to […]
DISTRIBUTED FILE SYSTEMS MODELING FOR SYSTEMATIC AND PRACTICAL PERFORMANCE ANALYSIS FRAMEWORK
Performance analysis is an important concern in the distributed system research area. Researchers have made a lot effort to evaluate, model, and analyze distributed systems for computing intensive or data intensive applications. There exist well-known evaluation benchmarks (e.g., LINPACK, mpiBLAST) for computing paradigms. In this paper, we propose a systematic and practical performance analysis framework, […]
ABE AND ABS SCHEME FOR DECENTRALIZED ACCESS CONTROL WITH ANONYMOUS AUTHENTICATION OF DATA STORED IN CLOUDS
Cloud computing is computing in which large groups of remote servers are networked to allow the centralized data storage, and online access to computer services or resources. Clouds can be classified as public, private or hybrid. We propose a new decentralized access control scheme for secure data storage in clouds that supports anonymous authentication. In […]
COLLABORATIVE ADAPTIVE DATA SHARING PLATFORM FOR FACILITATING DOCUMENT ANNOTATION USING CONTENT AND QUERYING VALUE
We propose Collaborative Adaptive Data Sharing platform (CADS), which is an “annotate-as-you-create” infrastructure that facilitates fielded data annotation. A key contribution of our system is the direct use of the query workload to direct the annotation process, in addition to examining the content of the document. A large number of organizations today generate and share […]
GENERAL BEHAVIORAL CHARACTERIZATION OF PROXIMITY MALWARE DETECTION IN DELAY TOLERANT NETWORK
Proximity malware based on the DTN model brings unique security challenges that are not present in the infrastructure model. In the infrastructure model, the cellular carrier centrally monitors networks for abnormalities; moreover, the resource scarcity of individual nodes limits the rate of malware propagation. Proximity malware exploits the opportunistic contacts and distributed nature of DTNs […]