scholarly journals A Key Management and Public Auditing Scheme for Outsourced Data

Author(s):  
Chang sheng Wan ◽  
Juan Zhang ◽  
Lin Zhou ◽  
Zhong yuan Qin
Author(s):  
Vairaprakash Gurusamy ◽  
◽  
S. Kannan ◽  
T. Maria Mahajan ◽  
◽  
...  

2018 ◽  
Vol 8 (1) ◽  
pp. 30-36
Author(s):  
Роман Котельников ◽  
Roman Kotelnikov ◽  
Алескандр Мартынюк ◽  
Aleskandr Martynyuk

Timely availability of accurate burned out area data is a key management aspect in forest protection arrange-ments. Special operation multilevel net-work including field surveys of burned out areas has been established now to verify appropriate data accuracy. In the mean time extensive levels of information from various sources accumulated in wildfire databases enable statistical assessment of the data accuracy drastically reducing time and financial costs of verification operations. Mathematically proven that amount of numbers that specify real natural facilities may grow exponentially due to the Benford law. The paper proves applicability of the Benford law provisions in assessment of wildfire area data accuracy through analysis of first figure occurrence in numbers specifying forest covered burned out area in the Russian Federation territory in 2016 and assessed a minimum set of values needed for an adequate result. In addition the paper highlights an opportunity of variously outsourced data accuracy comparative analysis. Taking into consideration that variation of individual figure occurrence frequency in analyzed value packages may have a different sign for various figures it is offered to apply an indicator representing a mean value of appropriate figure occurrence probability variation modules. The offered procedure based on the Benford law application may be a part of a risk-targeted approach to plan control supervisory operations in forest relations.


2014 ◽  
Vol 19 (5) ◽  
pp. 449-454
Author(s):  
Bei Pei ◽  
Changsong Chen ◽  
Changsheng Wan

2017 ◽  
Vol 2017 ◽  
pp. 1-14 ◽  
Author(s):  
Dongmin Kim ◽  
Ik Rae Jeong

To provide the integrity of outsourced data in the cloud storage services, many public auditing schemes which allow a user to check the integrity of the outsourced data have been proposed. Since most of the schemes are constructed on Public Key Infrastructure (PKI), they suffer from several concerns like management of certificates. To resolve the problems,certificatelesspublic auditing schemes also have been studied in recent years. In this paper, we propose a certificateless public auditing scheme which has theconstant-time verification algorithm. Therefore, our scheme is more efficient than previous certificateless public auditing schemes. To prove the security of our certificateless public auditing scheme, we first define three formal security models and prove the security of our scheme under the three security models.


Sign in / Sign up

Export Citation Format

Share Document