Dynamic Provable Data Possession of Multiple Copies in Cloud Storage Based on Full-Node of AVL Tree

2019 ◽  
Vol 11 (1) ◽  
pp. 126-137 ◽  
Author(s):  
Min Long ◽  
You Li ◽  
Fei Peng

This article describes how to protect the security of cloud storage, a provable data possession scheme based on full-nodes of an AVL tree for multiple data copies in cloud storage. In the proposed scheme, a Henon chaotic map is first implemented for the node calculation of the AVL tree, and then the location of the data in the cloud is verified by AVL tree. As an AVL tree can keep the balance even with multiple dynamic operations made on the data in the cloud, it can improve the search efficiency of the data block, and reduce the length of the authentication path. Simulation results and analysis confirm that it can achieve good security and high efficiency.

2011 ◽  
Vol 279 ◽  
pp. 456-460
Author(s):  
Jian Hua Song ◽  
Qun Ding

In recent years, the chaos based cryptographic algorithms have suggested some new and efficient ways to develop secure image encryption techniques. In this paper, the sequence was generated using chaotic system, combined with high efficiency and better security in transform domain. An image encryption method based on Tent chaotic map in DCT domain was proposed. The simulation results show that this method has characteristics such as high efficiency and good safety, and has a certain practicality and objectivity.


2014 ◽  
Vol 556-562 ◽  
pp. 5511-5517 ◽  
Author(s):  
Bang Zhang ◽  
Xing Wei Wang ◽  
Min Huang

In this paper, a multiple data replica placement scheme for cloud storage under health-care environment is proposed. It is based on p-center model with minimizing user access cost as its optimization objective. It uses GA (Genetic Algorithm) to find the optimal data replica placement solution. Simulation results have shown that it can not only improve user access time and promote load balance but also enhance system scalability and reliability.


2017 ◽  
Vol 27 (04) ◽  
pp. 1750054 ◽  
Author(s):  
Min Long ◽  
You Li ◽  
Fei Peng

Aiming to strike for a balance between the security, efficiency and availability of the data verification in cloud storage, a novel integrity verification scheme based on spatiotemporal chaos is proposed for multiple data copies. Spatiotemporal chaos is implemented for node calculation of the binary tree, and the location of the data in the cloud is verified. Meanwhile, dynamic operation can be made to the data. Furthermore, blind information is used to prevent a third-party auditor (TPA) leakage of the users’ data privacy in a public auditing process. Performance analysis and discussion indicate that it is secure and efficient, and it supports dynamic operation and the integrity verification of multiple copies of data. It has a great potential to be implemented in cloud storage services.


Author(s):  
Jialei Song ◽  
Yong Zhong ◽  
Ruxu Du ◽  
Ling Yin ◽  
Yang Ding

In this paper, we investigate the hydrodynamics of swimmers with three caudal fins: a round one corresponding to snakehead fish ( Channidae), an indented one corresponding to saithe ( Pollachius virens), and a lunate one corresponding to tuna ( Thunnus thynnus). A direct numerical simulation (DNS) approach with a self-propelled fish model was adopted. The simulation results show that the caudal fin transitions from a pushing/suction combined propulsive mechanism to a suction-dominated propulsive mechanism with increasing aspect ratio ( AR). Interestingly, different from a previous finding that suction-based propulsion leads to high efficiency in animal swimming, this study shows that the utilization of suction-based propulsion by a high- AR caudal fin reduces swimming efficiency. Therefore, the suction-based propulsive mechanism does not necessarily lead to high efficiency, while other factors might play a role. Further analysis shows that the large lateral momentum transferred to the flow due to the high depth of the high- AR caudal fin leads to the lowest efficiency despite the most significant suction.


Instruments ◽  
2021 ◽  
Vol 5 (2) ◽  
pp. 17
Author(s):  
Eldred Lee ◽  
Kaitlin M. Anagnost ◽  
Zhehui Wang ◽  
Michael R. James ◽  
Eric R. Fossum ◽  
...  

High-energy (>20 keV) X-ray photon detection at high quantum yield, high spatial resolution, and short response time has long been an important area of study in physics. Scintillation is a prevalent method but limited in various ways. Directly detecting high-energy X-ray photons has been a challenge to this day, mainly due to low photon-to-photoelectron conversion efficiencies. Commercially available state-of-the-art Si direct detection products such as the Si charge-coupled device (CCD) are inefficient for >10 keV photons. Here, we present Monte Carlo simulation results and analyses to introduce a highly effective yet simple high-energy X-ray detection concept with significantly enhanced photon-to-electron conversion efficiencies composed of two layers: a top high-Z photon energy attenuation layer (PAL) and a bottom Si detector. We use the principle of photon energy down conversion, where high-energy X-ray photon energies are attenuated down to ≤10 keV via inelastic scattering suitable for efficient photoelectric absorption by Si. Our Monte Carlo simulation results demonstrate that a 10–30× increase in quantum yield can be achieved using PbTe PAL on Si, potentially advancing high-resolution, high-efficiency X-ray detection using PAL-enhanced Si CMOS image sensors.


2012 ◽  
Vol 503-504 ◽  
pp. 824-827
Author(s):  
Chun Qiang Jia ◽  
Wei Li ◽  
Ling Yu

To solve the problem of support speed of hydraulic support flipper, the match relations between the flipper throttle control and shearer cutting coal speed are analyzed, the AMESim simulation model of the throttle optimal control for hydraulic support flipper jack is established, the simulation results show that flipper can be supported timely by speed optimal control of flipper jack which improve the reliability of the system and provide certain theory basis to meet the miner safety and high efficiency production.


2022 ◽  
Author(s):  
Valentina Pavlova ◽  
Irina Saenkova ◽  
Yulia Shokina ◽  
Grigoriy Shokin

In this article, the results of the development of the functional fish culinary product “Thorny Skate and Cod Pie” are presented. A traditional recipe was used for making the yeast dough for the pie. The pie filling recipe was designed using Fuzzy Logic in the Matlab software package.Optimized parametersfor the selected sensory evaluation of the pie were calculated. On the basis of a priori information, key components of the filling (including the fraction of the fish components and skate meat) were chosen as the factors of interest. According to the simulation results, the optimal values werea 50/50 percentage for the first and the second factor respectively, and this providedthe maximum organoleptic assessment (five points on a five-point scale). The simulation results were compared with the results of the organoleptic evaluation of the pie made according to the optimized recipe, and their sufficient convergence was shown. The indicators of mass fraction of amine nitrogen and nitrogen of volatile bases was studied, as well as the microbiological safety indicators of flour fish culinary products, in accordance with the requirements of the Technical Regulations of the Eurasian Economic Union 040/2016 ”On the safety of fish products”. The results showed a high efficiency of the shock freezing of the semi-finished product, brought to semi-readiness, for long-term storage (120 days at a temperature no higher than minus 18 ∘C), without reducing the quality or safety of the pie. The product had a cholesterol content from 220 to 260 mg%, which allowed it to be classified as functional. The nutritional values of the product (mass fraction of protein, fat, carbohydrates, and amino acid composition) are presented. Keywords: thornyskate, functional product, pie with thornyskate and cod, shock freezing


2021 ◽  
Vol 18 (6) ◽  
pp. 9410-9429
Author(s):  
Qing Ye ◽  
◽  
Qiaojia Zhang ◽  
Sijie Liu ◽  
Kaiqiang Chen ◽  
...  

<abstract> <p>Video information is currently widely used in various fields. Compared with image and text data, video data has the characteristics of large data volume, strong data relevance, and large data redundancy, which makes traditional cryptographic systems no longer suitable for video encryption systems. The paper proposes a new chaotic system based on coupled map lattice (CML) and applies it to high efficiency video coding (HEVC) video encryption. The chaotic system logistic-iterative chaotic map with infinite collapses-coupled map lattice (L-ICMIC-CML), which is improved on the basis of the ICMIC system and combined with CML, generates stream ciphers and encrypts some syntax elements of HEVC. The experimental results show that the stream cipher generated by the L-ICMIC-CML system passes the SP800-22 Revla test and has strong randomness. Applying the stream cipher to the proposed HEVC encryption scheme, through the analysis of the encryption scheme's security, encryption time and encryption efficiency, it is better than other chaotic system encryption schemes. The video encryption system proposed in this paper is both safe and efficient.</p> </abstract>


2017 ◽  
Vol 54 ◽  
pp. 46-54 ◽  
Author(s):  
Liang Xue ◽  
Jianbing Ni ◽  
Yannan Li ◽  
Jian Shen

Sign in / Sign up

Export Citation Format

Share Document