scholarly journals Reduction of Spatial Overhead in Decentralized Cloud Storage using IDA

Author(s):  
P Suresh Babu ◽  
Madhavi Kasa

Decentralized cloud storage reflects a significant change in large-scale storage performance and economy. Removing central control enables users to store and exchange data without depending on third-party storage [16] providers. Decentralization reduces the possibility of data failures and outages while increasing object storage protection and privacy at the same time. Decentralized cloud storage is where individuals or groups encouraged to enter, store, and keep data available are stored on a decentralized network through several locations. The servers used, rather than a single organization, are hosted by individuals. In this paper, an information dispersal algorithm is applied on decentralized cloud storage to reduce spatial overhead, which provides more efficient performance compared to the existing methodologies.

2021 ◽  
Vol 2021 ◽  
pp. 1-17
Author(s):  
Kai He ◽  
Chunxiao Huang ◽  
Jiaoli Shi ◽  
Xinrong Hu ◽  
Xiying Fan

Cloud storage provides elastic storage services for enterprises and individuals remotely. However, security problems such as data integrity are becoming a major obstacle. Recently, blockchain-based verification approaches have been extensively studied to get rid of a centralized third-party auditor. Most of these schemes suffer from poor scalability and low search efficiency and even fail to support data dynamic update operations on blockchain, which limits their large-scale and practical applications. In this work, we propose a blockchain-based dynamic data integrity verification scheme for cloud storage with T-Merkle hash tree. A decentralized scheme is proposed to eliminate the restrictions of previous centralized schemes. The data tags are generated by the technique of ZSS short signature and stored on blockchain. An improved verification method is designed to check the integrity of cloud data by transferring computation from a verifier to cloud server and blockchain. Furthermore, a storage structure called T-Merkle hash tree which is built based on T-tree and Merkle hash tree is designed to improve storage utilization of blockchain and support binary search on chain. Moreover, we achieve efficient and secure dynamic update operations on blockchain by an append-only manner. Besides, we extend our scheme to support batch verification to handle massive tasks simultaneously; thus, the efficiency is improved and communication cost is reduced. Finally, we implemented a prototype system based on Hyperledger Fabric to validate our scheme. Security analysis and performance studies show that the proposed scheme is secure and efficient.


2019 ◽  
Vol 13 (4) ◽  
pp. 356-363
Author(s):  
Yuezhong Wu ◽  
Wei Chen ◽  
Shuhong Chen ◽  
Guojun Wang ◽  
Changyun Li

Background: Cloud storage is generally used to provide on-demand services with sufficient scalability in an efficient network environment, and various encryption algorithms are typically applied to protect the data in the cloud. However, it is non-trivial to obtain the original data after encryption and efficient methods are needed to access the original data. Methods: In this paper, we propose a new user-controlled and efficient encrypted data sharing model in cloud storage. It preprocesses user data to ensure the confidentiality and integrity based on triple encryption scheme of CP-ABE ciphertext access control mechanism and integrity verification. Moreover, it adopts secondary screening program to achieve efficient ciphertext retrieval by using distributed Lucene technology and fine-grained decision tree. In this way, when a trustworthy third party is introduced, the security and reliability of data sharing can be guaranteed. To provide data security and efficient retrieval, we also combine active user with active system. Results: Experimental results show that the proposed model can ensure data security in cloud storage services platform as well as enhance the operational performance of data sharing. Conclusion: The proposed security sharing mechanism works well in an actual cloud storage environment.


PLoS ONE ◽  
2020 ◽  
Vol 15 (12) ◽  
pp. e0243475
Author(s):  
David Mödinger ◽  
Jan-Hendrik Lorenz ◽  
Rens W. van der Heijden ◽  
Franz J. Hauck

The cryptocurrency system Bitcoin uses a peer-to-peer network to distribute new transactions to all participants. For risk estimation and usability aspects of Bitcoin applications, it is necessary to know the time required to disseminate a transaction within the network. Unfortunately, this time is not immediately obvious and hard to acquire. Measuring the dissemination latency requires many connections into the Bitcoin network, wasting network resources. Some third parties operate that way and publish large scale measurements. Relying on these measurements introduces a dependency and requires additional trust. This work describes how to unobtrusively acquire reliable estimates of the dissemination latencies for transactions without involving a third party. The dissemination latency is modelled with a lognormal distribution, and we estimate their parameters using a Bayesian model that can be updated dynamically. Our approach provides reliable estimates even when using only eight connections, the minimum connection number used by the default Bitcoin client. We provide an implementation of our approach as well as datasets for modelling and evaluation. Our approach, while slightly underestimating the latency distribution, is largely congruent with observed dissemination latencies.


2019 ◽  
Author(s):  
Ciaran Docherty ◽  
Anthony J Lee ◽  
Amanda Hahn ◽  
Lisa Marie DeBruine ◽  
Benedict C Jones

Researchers have suggested that more attractive women will show stronger preferences for masculine men because such women are better placed to offset the potential costs of choosing a masculine mate. However, evidence for correlations between measures of women’s own attractiveness and preferences for masculine men is mixed. Moreover, the samples used to test this hypothesis are typically relatively small. Consequently, we conducted two large-scale studies that investigated possible associations between women’s preferences for facial masculinity and their own attractiveness as assessed from third-party ratings of their facial attractiveness (Study 1, N = 454, laboratory study) and self-rated attractiveness (Study 2, N = 8972, online study). Own attractiveness was positively correlated with preferences for masculine men in Study 2 (self-rated attractiveness), but not Study 1 (third-party ratings of facial attractiveness). This pattern of results is consistent with the proposal that women’s beliefs about their own attractiveness, rather than their physical condition per se, underpins attractiveness-contingent masculinity preferences.


2020 ◽  
Vol 198 ◽  
pp. 04030
Author(s):  
Dai Yanyan ◽  
Chen Meng

With the development of new technologies such as artificial intelligence, big data, and cloud computing, the “intelligent airport” is considered to be an effective means to solve or alleviate the current industry problems such as large-scale airport business, the large number of operating entities, and the complicated operation conditions. This paper is about the collaboration between universities and enterprises based on the concept of service design. Relying on big data and cloud computing technology, this paper addresses the problems of airport service robots in inquiries, blind spots of security inspection, and full monomer smart navigation diffluence, combined with the basic technology of service robot artificial intelligence and the third-party interface to design solutions to effectively solve the problems of process.


2018 ◽  
Vol 25 (4) ◽  
pp. 1398-1411 ◽  
Author(s):  
Vishal Patel

The electronic sharing of medical imaging data is an important element of modern healthcare systems, but current infrastructure for cross-site image transfer depends on trust in third-party intermediaries. In this work, we examine the blockchain concept, which enables parties to establish consensus without relying on a central authority. We develop a framework for cross-domain image sharing that uses a blockchain as a distributed data store to establish a ledger of radiological studies and patient-defined access permissions. The blockchain framework is shown to eliminate third-party access to protected health information, satisfy many criteria of an interoperable health system, and readily generalize to domains beyond medical imaging. Relative drawbacks of the framework include the complexity of the privacy and security models and an unclear regulatory environment. Ultimately, the large-scale feasibility of such an approach remains to be demonstrated and will depend on a number of factors which we discuss in detail.


Author(s):  
David Greenwood ◽  
Ian Sommerville

Society is demanding larger and more complex information systems to support increasingly complex and critical organisational work. Whilst troubleshooting socio-technical issues in small-to-medium scale situations may be achievable using approaches such as ethnography, troubleshooting enterprise scale situations is an open research question because of the overwhelming number of socio-technical elements and interactions involved. This paper demonstrates proof-of-concept tools for network analysis and visualisation that may provide a promising avenue for identifying problematic elements and interactions among an overwhelming number of socio-technical elements. The findings indicate that computers may be used to aid the analysis of problematic large-scale complex socio-technical situations by using analytical techniques to highlighting elements, or groups of interacting elements, that are important to the overall outcome of a problematic situation.


2019 ◽  
pp. 760-769
Author(s):  
Kashif Munir

There's a big change happening in the world of databases. The industry is buzzing about Database-as-a-Service (DBaaS), a cloud offering that allows companies to rent access to these managed digital data warehouses. Database-as-a-service (DBaaS) is a cloud computing service model that provides users with some form of access to a database without the need for setting up physical hardware, installing software or configuring for performance. Since consumers host data on the Mobile Cloud, DBaaS providers should be able to guarantee data owners that their data would be protected from all potential security threats. Protecting application data for large-scale web and mobile apps can be complex; especially with distributed and NoSQL databases. Data centers are no longer confined to the enterprise perimeter. More and more enterprises take their data to the Mobile Cloud, but forget to adjust their security management practices when doing so. Unauthorized access to data resources, misuse of data stored on third party platform, data confidentiality, integrity and availability are some of the major security challenges that ail this nascent Cloud service model, which hinders the wide-scale adoption of DBaaS. In this chapter, I propose a security model for Mobile Cloud Database as a Service (DBaaS). A user can change his/her password, whenever demanded. Furthermore, security analysis realizes the feasibility of the proposed model for DBaaS and achieves efficiency. This will help Cloud community to get an insight into state-of-the-art progress in terms of secure strategies, their deficiencies and possible future directions.


Author(s):  
Dan J. Kim

Despite the importance of trust in electronic commerce including mobile commerce, there is insufficient theory and model concerning the determinants of consumer trust in business-to-consumer electronic commerce. Thus, the purpose of this chapter is to: i) identify the major antecedents of a consumer’s trust in electronic commerce and mobile commerce contexts through a large-scale literature review, ii) develop an integrative trust antecedent reference model summarizing the antecedents of consumer trust, and iii) finally discuss six categories of mobile applications as future trends of technologies and key issues related to consumer trust area in electronic commerce. In addition, to provide the validity of the proposed reference model, this chapter also proposes a research model derived from the reference model and discusses the constructs of the proposed model in detail. The chapter concludes that building trust is not simply an issue related to consumer-technology-buyer, but it is a complex issue that involves the interactions of key elements (buyer, seller, third-party, technology, and market environment) at least.


2006 ◽  
Vol 46 (1) ◽  
pp. 445
Author(s):  
A.M. Warburton ◽  
J.A. Grove ◽  
S. Then

Managing its growing greenhouse gas emissions has become a key issue in Australia’s energy and environmental policy.Geological storage (or geosequestration) of carbon dioxide emissions produced by power stations and gas processing plants is being promoted as an innovative way to combat the threat of climate change. Australian governments and industry are interested in the process because it would allow Australia to continue to rely on its extensive fossil fuel reserves as an energy source and export commodity into the future. The process, however, is still in an experimental phase. If geosequestration does prove to be a viable technology then regulatory changes will be required to facilitate large-scale commercial use.This paper discusses the status of geosequestration development in Australia. It considers some of the key legal and regulatory issues that would need to be addressed to allow geosequestration projects to proceed, including:jurisdictional issues between State and Commonwealth governments;access to land and rights to use storage sites;priorities between competing land uses;potential application of third party access regimes to geosequestration infrastructure;potential legal liabilities, especially over the longer term; and,the extent to which a consistent national approach to the regulation of geosequestration may be required. This paper is general in nature and must not be relied upon as legal advice in any respect.


Sign in / Sign up

Export Citation Format

Share Document