scholarly journals Secure Data Collaborative Computing Scheme Based on Blockchain

2021 ◽  
Vol 2021 ◽  
pp. 1-9
Author(s):  
Tao Feng ◽  
Xusheng Wang ◽  
Chunyan Liu ◽  
Junli Fang

With the rapid development of information technology, different organizations cooperate with each other to share data information and make full use of data value. Not only should the integrity and privacy of data be guaranteed but also the collaborative computing should be carried out on the basis of data sharing. In this paper, in order to achieve the fairness of data security sharing and collaborative computing, a security data collaborative computing scheme based on blockchain is proposed. A data storage query model based on Bloom filter is designed to improve the efficiency of data query sharing. The MPC contract is designed according to the specific requirements. The participants are rational, and the contract encourages the participants to implement the agreement honestly to achieve fair calculation. A secure multiparty computation based on secret sharing is introduced. The problem of identity and vote privacy in electronic voting is solved. The scheme is analyzed and discussed from storage expansion, anticollusion, verifiability, and privacy.

2012 ◽  
Vol 214 ◽  
pp. 538-542 ◽  
Author(s):  
Xiao Dan Zhang ◽  
Zhi Min Liu ◽  
Peng Sheng ◽  
Chun Dong Hu ◽  
Yuan Zhe Zhao

For the sake of achieving to manage and query the experimental data scientifically, as well as relevant experiment information for Neutral Beam Injection (NBI) system, NBI Data Server software is developed for data exchanging between the remote server control layer and the field measurement and control layer, data storage and querying. Experimental results show that managing data scientifically can ensure data security and making best use of data will bring data value into full play. NBI Data Server software is programmed by C language, developed with Client/Server program model and multi-threading technology, runs on linux operating system. Experiments show that NBI data server software can work steadily and reliably.


Author(s):  
A. V. Deorankar ◽  
Khushboo T. Khobragade

Cloud technology is very profitable for the business evolution. In cloud computing, the data is mostly outsourced. The security and integrity of the data in the cloud system is always a main worry. Because of rapid development of adaptable cloud services, it becomes increasingly vulnerable to use cloud services to share data in a friend circle in the environment of cloud computing. The user privacy is also an important concern. Many systems and technique are being developed to address these issues, but still there is always a scope of improvement. While addressing the issues related to the user privacy and data security and integrity, we must consider the efficiency of the system while accessing and searching for the data. In this paper, we discuss about the major challenges in cloud environment. Also, presented is a brief overview on proposed system with elliptical curve cryptography is a public key encryption technique uses the properties of elliptic curve in order to generate keys instead of using the traditional methodology of generation of keys.


SinkrOn ◽  
2019 ◽  
Vol 3 (2) ◽  
pp. 180
Author(s):  
Suparni Suparni ◽  
Lilyani Asri Utami ◽  
Elsa Dwi Selviana

PT. Pratama Mega Konstruksindo is one of the companies engaged in Property, especially Housing. One of the fields that requires technological progress is one of them is the property sector, the rapid development in the property sector is currently urging property service companies to meet the demands of the wider community. Implementation of work related to housing sales. In managing the data, this company still uses a manual system, starting from the recording and calculation aspects so that its performance has not been effective. At PT Pratama Mega Konstruksindo this still manages data using Ms Excel. As well as down payment, cash payments and consumer data are recorded using Ms Excel. This can cause errors in recording transactions, data security that is not guaranteed confidentiality, ineffective employees at work because it requires more time to input and make sales reports and even loss of data. Therefore, PT. Pratama Mega Konstruksindo requires a system that can solve the problem. This data processing system is designed web-based using the PHP and MySql programming languages as data storage databases. With the existence of this website, it can help processing sales data more effectively and efficiently, reports can be printed in realtime and data security can be maintained


2010 ◽  
Vol 40-41 ◽  
pp. 156-161 ◽  
Author(s):  
Yang Li ◽  
Yan Qiang Li ◽  
Zhi Xue Wang

With the rapid development of automotive ECUs(Electronic Control Unit), the fault diagnosis becomes increasingly complicated. And the link between fault and symptom becomes less obvious. In order to improve the maintenance quality and efficiency, the paper proposes a fault diagnosis approach based on data mining technologies. By making full use of data stream, we firstly extract fault symptom vectors by processing data stream, and then establish a diagnosis decision tree through the ID3 decision tree algorithm, and finally store the link rules between faults and the related symptoms into historical fault database as a foundation for the fault diagnosis. The database provides the basis of trend judgments for a future fault. To verify this approach, an example of diagnosing faults of entertainment ECU is showed. The test result testifies the reliability and validity of this diagnostic method and reduces the cost of ECU diagnosis.


2021 ◽  
Vol ahead-of-print (ahead-of-print) ◽  
Author(s):  
Cheng Gong ◽  
Hongyu Xu ◽  
Feng Xiong ◽  
Jian Zuo ◽  
Na Dong

Purpose Some papers have investigated the complex factors impacting building information modeling (BIM) application in prefabricated buildings (PBs), but few paid attention to their interaction relationships. Ignoring the fact that different factors are not isolated may lead to some key factors being overlooked without appropriate improvement strategies being proposed. This paper aims to analyze those factors and their inter-relationships, with the view to identify the critical factors and their interaction relationships so as to derive constructive strategies that would effectively facilitate BIM adoption in Chinese prefabrication. Design/methodology/approach First, factors influencing BIM application in prefabrication are extracted and collated by literature review, expert interview and analysis of PBs characteristics. Thereafter, an evaluation laboratory (decision-making trial and evaluation laboratory) and interpretive structural modeling are used to explore the relationships and hierarchy among the factors. Based on the degree of cause and centrality, critical factors are extracted and the interaction relationship are investigated. Findings The results show that BIM policies and standards for PBs are the main causal factors. The maturity of BIM software and BIM data interface for PBs, willingness to share data, the strategic goals of the enterprise, BIM law and BIM input and benefit are the main transitional factors while BIM staff and workflow, enterprise attitude, distribution of BIM liability and cooperation of participants are the main direct factors. Originality/value Based on the above findings, corresponding improvement strategies are proposed so as to promote BIM application in prefabrication and the rapid development of China’s PBs efficiently.


2018 ◽  
Vol 8 (12) ◽  
pp. 2519
Author(s):  
Wei Li ◽  
Wei Ni ◽  
Dongxi Liu ◽  
Ren Liu ◽  
Shoushan Luo

With the rapid development of cloud computing, it is playing an increasingly important role in data sharing. Meanwhile, attribute-based encryption (ABE) has been an effective way to share data securely in cloud computing. In real circumstances, there is often a mutual access sub-policy in different providers’ access policies, and the significance of each attribute is usual diverse. In this paper, a secure and efficient data-sharing scheme in cloud computing, which is called unified ciphertext-policy weighted attribute-based encryption (UCP-WABE), is proposed. The weighted attribute authority assigns weights to attributes depending on their importance. The mutual information extractor extracts the mutual access sub-policy and generates the mutual information. Thus, UCP-WABE lowers the total encryption time cost of multiple providers. We prove that UCP-WABE is selectively secure on the basis of the security of ciphertext-policy weighted attribute-based encryption (CP-WABE). Additionally, the results of the implementation shows that UCP-WABE is efficient in terms of time.


2019 ◽  
Vol 3 (2) ◽  
pp. 152
Author(s):  
Xianglan Wu

<p>In today's society, the rise of the Internet and rapid development make every day produce a huge amount of data. Therefore, the traditional data processing mode and data storage can not be fully analyzed and mined these data. More and more new information technologies (such as cloud computing, virtualization and big data, etc.) have emerged and been applied, the network has turned from informationization to intelligence, and campus construction has ushered in the stage of smart campus construction.The construction of intelligent campus refers to big data and cloud computing technology, which improves the informatization service quality of colleges and universities by integrating, storing and mining huge data.</p>


2011 ◽  
Vol 8 (3) ◽  
pp. 801-819 ◽  
Author(s):  
Huang Ruwei ◽  
Gui Xiaolin ◽  
Yu Si ◽  
Zhuang Wei

In order to implement privacy-preserving, efficient and secure data storage and access environment of cloud storage, the following problems must be considered: data index structure, generation and management of keys, data retrieval, treatments of change of users? access right and dynamic operations on data, and interactions among participants. To solve those problems, the interactive protocol among participants is introduced, an extirpation-based key derivation algorithm (EKDA) is designed to manage the keys, a double hashed and weighted Bloom Filter (DWBF) is proposed to retrieve the encrypted keywords, which are combined with lazy revocation, multi-tree structure, asymmetric and symmetric encryptions, which form a privacypreserving, efficient and secure framework for cloud storage. The experiment and security analysis show that EKDA can reduce the communication and storage overheads efficiently, DWBF supports ciphertext retrieval and can reduce communication, storage and computation overhead as well, and the proposed framework is privacy preserving while supporting data access efficiently.


2014 ◽  
Vol 651-653 ◽  
pp. 1901-1904
Author(s):  
Xian Wei Li

In the society with the rapid development and popularization of computer technology, the management information system has become the hot field of software development. It runs stably in the browsers, like IE6, IE7, IE8, IE9 and FireFox, with high efficiency, sound security, friendly interface and simple operation. It has done research on the design and realization process of HTML5 off-line data storage on the Android platform. Under the Eclipse integrated development environment, with Android SDK and HTML5 grammar, develop the system, which realize the functions of off-line storage, addition, deletion and modification of user data. It enables the application of HTML5 of Android platform and has made detailed analysis on the Android platform and HTML5 application module. The result indicates, the webpage application design of HTML5 conducted on the Android platform, is simple and fast, which can better meet the demand of Android cellphone users.


2019 ◽  
Vol 15 (4) ◽  
pp. 2338-2348 ◽  
Author(s):  
Amritpal Singh ◽  
Sahil Garg ◽  
Kuljeet Kaur ◽  
Shalini Batra ◽  
Neeraj Kumar ◽  
...  

Sign in / Sign up

Export Citation Format

Share Document