Showing 181 - 200 results of 2,372 for search '"cloud"', query time: 0.06s Refine Results
  1. 181

    Two-Cloud-Servers-Assisted Secure Outsourcing Multiparty Computation by Yi Sun, Qiaoyan Wen, Yudong Zhang, Hua Zhang, Zhengping Jin, Wenmin Li

    Published 2014-01-01
    “…We focus on how to securely outsource computation task to the cloud and propose a secure outsourcing multiparty computation protocol on lattice-based encrypted data in two-cloud-servers scenario. …”
    Get full text
    Article
  2. 182

    Data integrity verification based on model cloud federation of TPA by Junfeng TIAN, Tianle LI

    Published 2018-08-01
    “…Aiming at the untrustworthiness of third-party auditor (TPA) in the publicity verification model,a data integrity verification model based on the cloud federation of TPA was proposed.Firstly,the cloud federation of TPA’s architecture was designed and the main functional components and function of the system platform was defined.The federation could manage and control the TPA cloud members.Secondly,TPA was designed in detail by using trusted computing technology and blockchain technology to ensure the credibility of the TPA execution environment and workflow.Finally,the data integrity verification model was built by using cloud federation of TPA.The correctness,security and effectiveness of the model were analyzed theoretically and experimentally.…”
    Get full text
    Article
  3. 183
  4. 184
  5. 185
  6. 186
  7. 187

    Cloud Based Metalearning System for Predictive Modeling of Biomedical Data by Milan Vukićević, Sandro Radovanović, Miloš Milovanović, Miroslav Minović

    Published 2014-01-01
    “…This problem is addressed by proposing a cloud based system that integrates metalearning framework for ranking and selection of best predictive algorithms for data at hand and open source big data technologies for analysis of biomedical data.…”
    Get full text
    Article
  8. 188
  9. 189
  10. 190
  11. 191
  12. 192

    Hadoop cloud platform user dynamic access control model by Hong-yu YANG, Ling-xian MENG

    Published 2017-09-01
    Subjects: “…cloud platform…”
    Get full text
    Article
  13. 193

    Cloud microphysical response to entrainment of dry air containing aerosols by Jae Min Yeom, Hamed Fahandezh Sadi, Jesse C. Anderson, Fan Yang, Will Cantrell, Raymond A. Shaw

    Published 2025-01-01
    “…Aerosol particles entrained at cloud top and edge can affect cloud microphysical and macrophysical properties, but the process is still poorly understood. …”
    Get full text
    Article
  14. 194
  15. 195

    Characterizing the role of vehicular cloud computing in road traffic management by Iftikhar Ahmad, Rafidah Md Noor, Ihsan Ali, Muhammad Imran, Athanasios Vasilakos

    Published 2017-05-01
    “…Vehicular cloud computing is envisioned to deliver services that provide traffic safety and efficiency to vehicles. …”
    Get full text
    Article
  16. 196
  17. 197

    NETWORK VIRTUALIZATION PERFORMANCE ANALYSIS ON OPENSTACK CLOUD COMPUTING INFRASTRUCTURES by Võ Nhân Văn, Lê Minh Chí, Nguyễn Quốc Long, Lê Đắc Nhường

    Published 2016-06-01
    “…Cloud computing has become popular in IT technology because of its advantages that focus on flexible, scaling, resources and services which help customers easy to build their own on-demand IT system easily. …”
    Get full text
    Article
  18. 198

    A quantifiable cloud computing platform security evaluation model by Jian XU, Li JIN

    Published 2020-07-01
    Subjects: “…cloud computing…”
    Get full text
    Article
  19. 199

    Cloud data anonymous assured deletion approach based on blockchain by Shuangxing WANG, Jintang LUO, Lisha SHUAI, Jiamin ZHANG, Min ZHANG, Xiaolong YANG

    Published 2021-03-01
    “…The previous assured deletion schemes ignored that the privacy is threated by the relevance between data and user identity, exposing user behavior to the cloud service provider or attackers.Aiming at the above problems, an assured deletion approach based on blockchain was proposed.The improved linkable ring signature scheme was adopted to make user achieve anonymous assured deletion by setting specific link symbol in the signature.Moreover, the blockchain technology was leveraged to guarantee the nonrepudiation of assured deletion.Theoretical analysis and experimental results show that the proposed approach can meet the assured deletion requirements of user data in cloud storage, and its anonymity can effectively prevent attackers from tracking and analyzing user behavior.…”
    Get full text
    Article
  20. 200