Securing Cloud Data under Key Exposure

Author(s):  
Azham Hussain
Keyword(s):  
Author(s):  
Prasad Arala ◽  
V. Gayatri ◽  
Y. Jahnavi
Keyword(s):  

2019 ◽  
Vol 7 (3) ◽  
pp. 838-849 ◽  
Author(s):  
Ghassan O. Karame ◽  
Claudio Soriente ◽  
Krzysztof Lichota ◽  
Srdjan Capkun
Keyword(s):  

2018 ◽  
Vol 5 (4) ◽  
pp. 355-359
Author(s):  
Pooja Vijay Bankar ◽  
◽  
Yashanjali Sisodiya ◽  
Keyword(s):  

Author(s):  
Jiayong Yu ◽  
Longchen Ma ◽  
Maoyi Tian, ◽  
Xiushan Lu

The unmanned aerial vehicle (UAV)-mounted mobile LiDAR system (ULS) is widely used for geomatics owing to its efficient data acquisition and convenient operation. However, due to limited carrying capacity of a UAV, sensors integrated in the ULS should be small and lightweight, which results in decrease in the density of the collected scanning points. This affects registration between image data and point cloud data. To address this issue, the authors propose a method for registering and fusing ULS sequence images and laser point clouds, wherein they convert the problem of registering point cloud data and image data into a problem of matching feature points between the two images. First, a point cloud is selected to produce an intensity image. Subsequently, the corresponding feature points of the intensity image and the optical image are matched, and exterior orientation parameters are solved using a collinear equation based on image position and orientation. Finally, the sequence images are fused with the laser point cloud, based on the Global Navigation Satellite System (GNSS) time index of the optical image, to generate a true color point cloud. The experimental results show the higher registration accuracy and fusion speed of the proposed method, thereby demonstrating its accuracy and effectiveness.


Author(s):  
P. Sudheer ◽  
T. Lakshmi Surekha

Cloud computing is a revolutionary computing paradigm, which enables flexible, on-demand, and low-cost usage of computing resources, but the data is outsourced to some cloud servers, and various privacy concerns emerge from it. Various schemes based on the attribute-based encryption have been to secure the cloud storage. Data content privacy. A semi anonymous privilege control scheme AnonyControl to address not only the data privacy. But also the user identity privacy. AnonyControl decentralizes the central authority to limit the identity leakage and thus achieves semi anonymity. The  Anonymity –F which fully prevent the identity leakage and achieve the full anonymity.


Sign in / Sign up

Export Citation Format

Share Document