distributed verification
Recently Published Documents


TOTAL DOCUMENTS

31
(FIVE YEARS 5)

H-INDEX

6
(FIVE YEARS 0)

2021 ◽  
Vol vol. 23, no. 3 (Distributed Computing and...) ◽  
Author(s):  
Laurent Feuilloley

A distributed graph algorithm is basically an algorithm where every node of a graph can look at its neighborhood at some distance in the graph and chose its output. As distributed environment are subject to faults, an important issue is to be able to check that the output is correct, or in general that the network is in proper configuration with respect to some predicate. One would like this checking to be very local, to avoid using too much resources. Unfortunately most predicates cannot be checked this way, and that is where certification comes into play. Local certification (also known as proof-labeling schemes, locally checkable proofs or distributed verification) consists in assigning labels to the nodes, that certify that the configuration is correct. There are several point of view on this topic: it can be seen as a part of self-stabilizing algorithms, as labeling problem, or as a non-deterministic distributed decision. This paper is an introduction to the domain of local certification, giving an overview of the history, the techniques and the current research directions.


2020 ◽  
Vol 39 (6) ◽  
pp. 8557-8564
Author(s):  
Mukta Jagdish ◽  
Amelec Viloria ◽  
Jesus Vargas ◽  
Omar Bonerge Pineda Lezama ◽  
David Ovallos-Gazabon

Cloud-based computation is known as the source architecture of the upcoming generation of IT enterprise. In context to up-coming trade solutions, the Information Technology sections are established under logical, personnel, and physical control, it transfers application software and large database to appropriate data centers, where security and management of database with services are not trustworthy fully. So this process may face many challenges towards society and organizations and that not been well understood over a while duration. This becomes one of the major challenges days today. So in this research, it focuses on security-based data storage using cloud, which plays one of the important aspects bases on qualities of services. To assure user data correctness in the cloud system, a flexible and effective distributed technique with two different salient features was examined by utilizing the token called homomorphic with erasure-coded data for distributed verification, based on this technique it achieved error data localization and integration of storage correctness. Also, it identifies server misbehaving, efficient, and security-based dynamic operations on data blocking such as data append, delete, and update methods. Performance analysis and security show the proposed method is more effective resilient and efficient against Byzantine failure, even server colluding attacks and malicious data modification attacks.


As the society is becoming more digitised day by day, we are being constantly introduced with advanced smart technologies that transpire changes in our lives. The blockchain technology and cryptocurrencies came in at the appropriate time which has provided pathways and security for many vulnerable internet-connected devices as the technology uses distributed verification of transactions. Due to their unique features, cryptocurrencies carry value on their own and now can be used for trading and transactions. In many established markets, transactions and trading in cryptocurencies have been growing and many have seen them as potential assets and investment option. Nevertheless, in many other countries, cryptocurrencies are not very popular and due to lack of awareness, many of their citizens are yet to own any cryptocurrencies. This study assessed the awareness of cryptocurrencies among selected Malaysian public and tested certain determinants and found almost three quarter of the respondents were aware of them but none is owning even one digital currency. Among the determinants, age group, ethnicity and occupation status were found to have influenced respondents’ awareness about cryptocurrencies. If it is an interest of the government to promote the use of cryptocurrencies, necessary exposure campaigns as well as guarantee of control and security should be made a priority.


Author(s):  
Anastacio Antolino-Hernández ◽  
Heberto Ferreira-Medina ◽  
Cristhian Torres-Millarez ◽  
Juan Carlos Olivares-Rojas

The project explores the use of digital documents as a response to the problems presented by physical documents, since they are at risk of partial or total loss.The solution is the digitalization that plays a very important role in society and the contemporary world. This helps sustainability and the preservation of natural resources.The security of the archives is a necessity that requires as solution to use the technology of public key infrastructure (PKI) to generate a digital document, besides registering the public and private keys of the personnel that has the legal power to sign them. These documents are stored on an official server and distributed among the registered hosts of the network. This certificatewill help to detect changes in an unauthorized way, when comparing the document with the original. In this phase of distributed verification, the Blockchain technology will be used.Then the proposal is to build a tool to generate digital documents, in addition to managing public keys, transaction logs and records. The use of Blockchain will allow to establish and configure a Peer to Peer (P2P) network for a secure exchange.


Automatica ◽  
2017 ◽  
Vol 78 ◽  
pp. 123-134 ◽  
Author(s):  
J. Frederico Carvalho ◽  
Sérgio Pequito ◽  
A. Pedro Aguiar ◽  
Soummya Kar ◽  
Karl H. Johansson

Author(s):  
R. MYTHILI ◽  
P. PRADHEEBA ◽  
P. RAJESHWARI ◽  
S. PADHMAVATHI

The end of this decade is marked by a paradigm shift of the industrial information technology towards a pay-peruse service business model known as cloud computing. Cloud data storage redefines the security issues targeted on customer’s outsourced data. To ensure the correctness of users’ data in the cloud, we propose an effective and flexible distributed scheme with two salient features, opposing to its predecessors. By utilizing the homomorphic token with distributed verification of raptor coded data, our scheme achieves the integration of storage correctness insurance and data error localization, i.e., the identification of misbehaving server(s).Using this new scheme it further support security and dynamic operations on data block. Our result shows that, our proposed model provides a secure storage for data in cloud.


Sign in / Sign up

Export Citation Format

Share Document