Showing 561 - 580 results of 2,372 for search '"cloud"', query time: 0.06s Refine Results
  1. 561

    Traceable and undeniable ciphertext-policy attribute-based encryption for cloud storage service by Gang Yu, Yongjuan Wang, Zhenfu Cao, Jian Lin, Xiangyu Wang

    Published 2019-04-01
    “…Ciphertext-policy attribute-based encryption is a promising mechanism with fine-grained access control for cloud storage system. However, there is a long-lasting problem of key abuse that a user may share its decryption key and a semi-honest authority may illegally issue decryption keys for unauthorized users for profits. …”
    Get full text
    Article
  2. 562

    Searchable encryption scheme based on attribute policy hiding in a cloud environment by Yihua ZHOU, Xinyu HU, Meiqi LI, Yuguang YANG

    Published 2022-04-01
    “…Attribute-based searchable encryption technology can achieve fine-grained access control of data, but the existing searchable encryption scheme, keyword search, access control and file encryption are basically performed separately, causing the attacker to directly skip the access policy for keyword index matching and file decryption.Besides, the data owners in the existing schemes need to pass the key of the encrypted file to the user in a secure channel, which increases the cost of the data owner.Furthermore, most tree-based access control policies are open and easy to cause privacy leakage.Therefore, based on the LSSS (linear secret sharing schemes) access architecture, the searchable encryption scheme based on attribute policy hiding in a cloud environment was proposed.Through the embedding of policy secret values into keyword encryption and file storage encryption, the combination of access control, keyword search and file encryption were realized.The aggregate key technology enables users to decrypt files without interacting with the data owner, reducing the burden of key management and increasing storage space by approximately 30%.The experimental results and security analysis show that the proposed scheme guarantees the security of stored data, privacy of access strategy and non-connectivity of trap gate.Compared with the existing mainstream scheme, the retrieval efficiency of the proposed scheme has improved to more than 20%.…”
    Get full text
    Article
  3. 563
  4. 564

    A Hybrid Method for Short-Term Host Utilization Prediction in Cloud Computing by Jing Chen, Yinglong Wang

    Published 2019-01-01
    “…Dynamic resource scheduling is a critical activity to guarantee quality of service (QoS) in cloud computing. One challenging problem is how to predict future host utilization in real time. …”
    Get full text
    Article
  5. 565
  6. 566

    Service Outsourcing Character Oriented Privacy Conflict Detection Method in Cloud Computing by Changbo Ke, Zhiqiu Huang, Weiwei Li, Yi Sun, Fangxiong Xiao

    Published 2014-01-01
    “…Cloud computing has provided services for users as a software paradigm. …”
    Get full text
    Article
  7. 567

    A Review about Internet of Things (IoT) integration with Cloud Computing with a Limelight on Security by Umm e Kulsoom, Syeda Faiza Nasim, Asma Qaiser, Sidra Aziz, Syeda Alishba Fatima

    Published 2024-01-01
    Subjects: “…Cloud Computing, IoT, IoT Security, Cyber Security, Cloud Attacks, Cloud Attacks Prevention…”
    Get full text
    Article
  8. 568
  9. 569

    Cloud-based map alignment strategies for multi-robot FastSLAM 2.0 by Shimaa S Ali, Abdallah Hammad, Adly S Tag Eldien

    Published 2019-03-01
    “…This article proposes an efficient architecture for cloud-based cooperative simultaneous localization and mapping to parallelize its complex steps via the multiprocessor (computing nodes) and free the robots from all of the computation efforts. …”
    Get full text
    Article
  10. 570

    Pavement Potholes Quantification: A Study Based on 3D Point Cloud Analysis by Qingzhen Sun, Lei Qiao, Yibo Shen

    Published 2025-01-01
    Subjects: “…three-dimensional point cloud…”
    Get full text
    Article
  11. 571
  12. 572
  13. 573

    Quantifying the Turbulent Entrainment‐Mixing Processes Based on Z‐LWC Relationships of Cloud Droplets by Shi Luo, Chunsong Lu, Yangang Liu, Haoran Li, Fengwei Zhang, Jingjing Lv, Lei Zhu, Xiaoqi Xu, Junjun Li, Xin He, Ying He, Sinan Gao, Xinlin Yang, Juan Gu, Xuemin Chen, Haining Sun

    Published 2025-01-01
    “…Abstract Turbulent entrainment‐mixing processes profoundly influence the relationship between radar reflectivity factor and liquid water content (Z‐LWC) of cloud droplets. However, quantification of the entrainment‐mixing mechanisms based on the Z‐LWC relationship is still lacking. …”
    Get full text
    Article
  14. 574

    Deep Convolutional Network Based Machine Intelligence Model for Satellite Cloud Image Classification by Kalyan Kumar Jena, Sourav Kumar Bhoi, Soumya Ranjan Nayak, Ranjit Panigrahi, Akash Kumar Bhoi

    Published 2023-03-01
    “…In this article, a classification approach is proposed using Deep Convolutional Neural Network (DCNN), comprising numerous layers, which extract the features through a downsampling process for classifying satellite cloud images. DCNN is trained marvelously on cloud images with an impressive amount of prediction accuracy. …”
    Get full text
    Article
  15. 575
  16. 576

    Development of a Cloud-Point Extraction Method for Cobalt Determination in Natural Water Samples by Mohammad Reza Jamali, Mohammad Gholinezhad, Saiedeh Balarostaghi, Reyhaneh Rahnama, Seyed Hojjat Allah Rahimi

    Published 2013-01-01
    “…A new, simple, and versatile cloud-point extraction (CPE) methodology has been developed for the separation and preconcentration of cobalt. …”
    Get full text
    Article
  17. 577
  18. 578
  19. 579
  20. 580

    A Profile Based Network Intrusion Detection and Prevention System for Securing Cloud Environment by Sanchika Gupta, Padam Kumar, Ajith Abraham

    Published 2013-03-01
    “…Cloud computing provides network based access to computing and data storage services on a pay per usage model. …”
    Get full text
    Article