Security Policy of Data in Enterprise Data Trusteeship Database

2011 ◽  
Vol 187 ◽  
pp. 358-361
Author(s):  
Hua Jiang ◽  
Jing Wen

As the low maintenance cost of data trusteeship, more and more medium-size and small size enterprises choose data trusteeship service. Data is valuable fortune of enterprise, security of enterprise data must be guaranteed in the condition of together using a same host. Data security includes data transmission security, data storage security and confidentiality security. The paper discusses the security problem and coping strategy of database data in a data trusteeship environment. Two-phase sub-keys encryption algorithm is used to encrypt the data and also analysis its usability and security. The realized method is further presented. The algorithm solves the data security problem of database in a data trusteeship environment effectively and further enhances the security of database data.

2014 ◽  
Vol 912-914 ◽  
pp. 1160-1163
Author(s):  
Ning Wang

Cloud computer technology is one of current hot areas of the development of the information technology, and the data storage service based on the cloud is developing rapidly, which makes more and more enterprises and individuals enjoy the efficiency, convenience as well as low cost supplied by cloud storage. However, at the same time, the security problem of cloud storage arouses users' attention. This paper firstly expounds the basic information and system of cloud storage, then analyses the status quo of the development of cloud storage, and finally offers some preventive strategies based on cloud storage security.


2018 ◽  
Vol 7 (3.3) ◽  
pp. 110
Author(s):  
C Veena ◽  
Dr M. Hanumanthappa

Cloud computing is an indispensable technology for any business organization, such as banking, e-commerce, etc. Although technology has advantages in many areas; The protection of stored data is a major concern for all stakeholders in the architecture. Provide data security with respect to network security, control strategies and access to the service, data storage. Despite the efforts of service providers to build customer trust in data security, users need a passion for using technology for their business skills. Homomorphism coding is a data protection technique in which tasks can be performed on encrypted data themselves. In this article, we present an exploration of new homomorphism encryption methods with respect to data security and their use in cloud computing.  


Author(s):  
Takashi Hibiki

The article “One-dimensional drift-flux correlations for two-phase flow in medium-size channels” written by Takashi Hibiki, was originally published electronically on the publisher’s internet portal (currently SpringerLink) on 17 April 2019 without open access. After publication in Volume 1, Issue 2, page 85–100, the author(s) decided to opt for Open Choice and to make the article an open access publication. Therefore, the copyright of the article has been changed to © The Author(s) 2020 and the article is forthwith distributed under the terms of the Creative Commons Attribution 4.0 International License (http://creativecommons.org/licenses/by/4.0/), which permits use, duplication, adaptation, distribution and reproduction in any medium or format, as long as you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons license, and indicate if changes were made.


2014 ◽  
Vol 971-973 ◽  
pp. 1684-1687
Author(s):  
Xiu Juan Sun

this article from the various security threats facing the computer network, systematically introduces the network security technology. And in view of the campus network security issues, firstly analyzes the hidden dangers to the safety of network system in colleges and universities, and then from the build two aspects of security defense system and strengthen the safety management design of the campus network security policy. This paper study, the first thing I learned the main threat to the network security problem, and use the knowledge of security network security problems are analyzed. Secondly, based on the research of the network technology, campus network will also be faced with the security threat. Finally, the idea of established with P2DR model to establish campus network security defense system. And it is concluded that the building of a set of effective network security defense system is the solution Campus network main threats and hidden trouble of necessary ways and measures.


Author(s):  
Fanny Pinto Delgado ◽  
Ziyou Song ◽  
Heath F. Hofmann ◽  
Jing Sun

Abstract Permanent Magnet Synchronous Machines (PMSMs) have been preferred for high-performance applications due to their high torque density, high power density, high control accuracy, and high efficiency over a wide operating range. During operation, monitoring the PMSM’s health condition is crucial for detecting any anomalies so that performance degradation, maintenance/downtime costs, and safety hazards can be avoided. In particular, demagnetization of PMSMs can lead to not only degraded performance but also high maintenance cost as they are the most expensive components in a PMSM. In this paper, an equivalent two-phase model for surface-mount permanent magnet (SMPM) machines under permanent magnet demagnetization is formulated and a parameter estimator is proposed for condition monitoring purposes. The performance of the proposed estimator is investigated through analysis and simulation under different conditions, and compared with a parameter estimator based on the standard SMPM machine model. In terms of information that can be extracted for fault diagnosis and condition monitoring, the proposed estimator exhibits advantages over the standard-model-based estimator as it can differentiate between uniform demagnetization over all poles and asymmetric demagnetization between north and south poles.


Author(s):  
Chandrakala B M ◽  
S C Lingareddy

<p>In recent days, data sharing has provided the flexibility to share the data, store the data, and perform operation on data virtually as well as cost effectively. Data sharing in cloud is one of the feature, which is being popular and widely accepted. However, the concern here is to ensure the data security and this has led the researcher to research in this area. To provide the security several Proxy re-encryption scheme has been introduced, however all these method lacks of efficiency. Hence In this paper, we propose a scheme known as ALBC (Adaptive Lattice Based Cryptography), this scheme follows the two phase i.e. encryption and Re-encryption. Encryption phase has few algorithms such as Key_Gen, Enc, Dec. Similarly ALBC Re-Enc has five algorithm i.e. Key_Gen, Key_ReGen,  Enc, Re-Enc, Dec. our algorithm not only provides the security but also solves the problem of RL(Ring-learning) with errors problems. In order to evaluate, our algorithm is compared with the existing model in terms of encryption time, decryption time, re-encryption time, key generation  and key regeneration by varying the various key size. When we observe the comparative analysis, it is observed that our algorithm outperforms the existing algorithm.</p>


Author(s):  
Shunyu Chang ◽  
Yanquan Geng ◽  
Yongda Yan

AbstractAs one of the most widely used nanofabrication methods, the atomic force microscopy (AFM) tip-based nanomachining technique offers important advantages, including nanoscale manipulation accuracy, low maintenance cost, and flexible experimental operation. This technique has been applied to one-, two-, and even three-dimensional nanomachining patterns on thin films made of polymers, metals, and two-dimensional materials. These structures are widely used in the fields of nanooptics, nanoelectronics, data storage, super lubrication, and so forth. Moreover, they are believed to have a wide application in other fields, and their possible industrialization may be realized in the future. In this work, the current state of the research into the use of the AFM tip-based nanomachining method in thin-film machining is presented. First, the state of the structures machined on thin films is reviewed according to the type of thin-film materials (i.e., polymers, metals, and two-dimensional materials). Second, the related applications of tip-based nanomachining to film machining are presented. Finally, the current situation of this area and its potential development direction are discussed. This review is expected to enrich the understanding of the research status of the use of the tip-based nanomachining method in thin-film machining and ultimately broaden its application.


Author(s):  
Brian T. Contos ◽  
William P. Crowell ◽  
Colby DeRodeff ◽  
Dan Dunkel ◽  
Eric Cole ◽  
...  

Sign in / Sign up

Export Citation Format

Share Document