Suggested Topics within your search.
Suggested Topics within your search.
- Cloud computing 2
- Information technology 2
- Internet in public administration 2
- Public administration 2
- COMPUTERS / Internet / General 1
- Computer graphics 1
- Computer networks 1
- Computer scheduling 1
- Computer systems 1
- Digital techniques 1
- Distributed processing 1
- Electronic data processing 1
- Image processing 1
- MATHEMATICS / General 1
- MATHEMATICS / Number Systems 1
- Management 1
- Parallel programs (Computer programs) 1
- Photography 1
- Technique 1
- Watercolor painting 1
-
561
Traceable and undeniable ciphertext-policy attribute-based encryption for cloud storage service
Published 2019-04-01“…Ciphertext-policy attribute-based encryption is a promising mechanism with fine-grained access control for cloud storage system. However, there is a long-lasting problem of key abuse that a user may share its decryption key and a semi-honest authority may illegally issue decryption keys for unauthorized users for profits. …”
Get full text
Article -
562
Searchable encryption scheme based on attribute policy hiding in a cloud environment
Published 2022-04-01“…Attribute-based searchable encryption technology can achieve fine-grained access control of data, but the existing searchable encryption scheme, keyword search, access control and file encryption are basically performed separately, causing the attacker to directly skip the access policy for keyword index matching and file decryption.Besides, the data owners in the existing schemes need to pass the key of the encrypted file to the user in a secure channel, which increases the cost of the data owner.Furthermore, most tree-based access control policies are open and easy to cause privacy leakage.Therefore, based on the LSSS (linear secret sharing schemes) access architecture, the searchable encryption scheme based on attribute policy hiding in a cloud environment was proposed.Through the embedding of policy secret values into keyword encryption and file storage encryption, the combination of access control, keyword search and file encryption were realized.The aggregate key technology enables users to decrypt files without interacting with the data owner, reducing the burden of key management and increasing storage space by approximately 30%.The experimental results and security analysis show that the proposed scheme guarantees the security of stored data, privacy of access strategy and non-connectivity of trap gate.Compared with the existing mainstream scheme, the retrieval efficiency of the proposed scheme has improved to more than 20%.…”
Get full text
Article -
563
An optimal workflow scheduling in IoT-fog-cloud system for minimizing time and energy
Published 2025-01-01Subjects: “…Fog-cloud computing…”
Get full text
Article -
564
A Hybrid Method for Short-Term Host Utilization Prediction in Cloud Computing
Published 2019-01-01“…Dynamic resource scheduling is a critical activity to guarantee quality of service (QoS) in cloud computing. One challenging problem is how to predict future host utilization in real time. …”
Get full text
Article -
565
Retracted: Adaptive Language Processing Based on Deep Learning in Cloud Computing Platform
Published 2024-01-01Get full text
Article -
566
Service Outsourcing Character Oriented Privacy Conflict Detection Method in Cloud Computing
Published 2014-01-01“…Cloud computing has provided services for users as a software paradigm. …”
Get full text
Article -
567
A Review about Internet of Things (IoT) integration with Cloud Computing with a Limelight on Security
Published 2024-01-01Subjects: “…Cloud Computing, IoT, IoT Security, Cyber Security, Cloud Attacks, Cloud Attacks Prevention…”
Get full text
Article -
568
Application of SDN deployment in large-scale public cloud across different resource pools
Published 2018-06-01Subjects: “…cloud computing…”
Get full text
Article -
569
Cloud-based map alignment strategies for multi-robot FastSLAM 2.0
Published 2019-03-01“…This article proposes an efficient architecture for cloud-based cooperative simultaneous localization and mapping to parallelize its complex steps via the multiprocessor (computing nodes) and free the robots from all of the computation efforts. …”
Get full text
Article -
570
Pavement Potholes Quantification: A Study Based on 3D Point Cloud Analysis
Published 2025-01-01Subjects: “…three-dimensional point cloud…”
Get full text
Article -
571
Alarm information association scheme of cloud resource pool based on big data analysis
Published 2020-10-01Subjects: “…cloud resource pool…”
Get full text
Article -
572
Research on River-lake Demarcation Technology Fusing Radar Point Cloud andOrthophoto
Published 2020-01-01Subjects: Get full text
Article -
573
Quantifying the Turbulent Entrainment‐Mixing Processes Based on Z‐LWC Relationships of Cloud Droplets
Published 2025-01-01“…Abstract Turbulent entrainment‐mixing processes profoundly influence the relationship between radar reflectivity factor and liquid water content (Z‐LWC) of cloud droplets. However, quantification of the entrainment‐mixing mechanisms based on the Z‐LWC relationship is still lacking. …”
Get full text
Article -
574
Deep Convolutional Network Based Machine Intelligence Model for Satellite Cloud Image Classification
Published 2023-03-01“…In this article, a classification approach is proposed using Deep Convolutional Neural Network (DCNN), comprising numerous layers, which extract the features through a downsampling process for classifying satellite cloud images. DCNN is trained marvelously on cloud images with an impressive amount of prediction accuracy. …”
Get full text
Article -
575
Contribution of Cloud Accounting to Employment and Economic Growth: An Evaluation from Nigerian Public Sector
Published 2024-03-01Subjects: “…Cloud accounting…”
Get full text
Article -
576
Development of a Cloud-Point Extraction Method for Cobalt Determination in Natural Water Samples
Published 2013-01-01“…A new, simple, and versatile cloud-point extraction (CPE) methodology has been developed for the separation and preconcentration of cobalt. …”
Get full text
Article -
577
Local-non-local complementary learning network for 3D point cloud analysis
Published 2025-01-01Subjects: “…Point cloud…”
Get full text
Article -
578
Collaborative security assessment of cloud-edge-device distributed systems based on order parameters
Published 2024-06-01Subjects: “…cloud-edge-device…”
Get full text
Article -
579
Construction contemplation of cloud platform for domestic password service based on quantum secret communication
Published 2018-07-01Subjects: Get full text
Article -
580
A Profile Based Network Intrusion Detection and Prevention System for Securing Cloud Environment
Published 2013-03-01“…Cloud computing provides network based access to computing and data storage services on a pay per usage model. …”
Get full text
Article