Journal articles on the topic 'MOBILE STORAGE SHARING'

To see the other types of publications on this topic, follow the link: MOBILE STORAGE SHARING.

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'MOBILE STORAGE SHARING.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Jiang, Bing, Guo Yu Ma, Sheng Ma, and Jian Feng Xie. "Mobile Sync Client Design of Cloud Storage System." Applied Mechanics and Materials 464 (November 2013): 358–64. http://dx.doi.org/10.4028/www.scientific.net/amm.464.358.

Full text
Abstract:
This paper introduces the client design based on Android mobile sync of cloud storage system, including system architecture and its module design. Through the Android mobile sync client software, user can access the cloud server to implement some functions, such as upload and download, data backup and restore, file management and sharing in the distance. Under the LAN environment, the client system has successfully completed the tests of both function module and assembly verification. The results show that the whole system runs in good condition.
APA, Harvard, Vancouver, ISO, and other styles
2

Delbracio, Mauricio, Damien Kelly, Michael S. Brown, and Peyman Milanfar. "Mobile Computational Photography: A Tour." Annual Review of Vision Science 7, no. 1 (September 15, 2021): 571–604. http://dx.doi.org/10.1146/annurev-vision-093019-115521.

Full text
Abstract:
The first mobile camera phone was sold only 20 years ago, when taking pictures with one's phone was an oddity, and sharing pictures online was unheard of. Today, the smartphone is more camera than phone. How did this happen? This transformation was enabled by advances in computational photography—the science and engineering of making great images from small-form-factor, mobile cameras. Modern algorithmic and computing advances, including machine learning, have changed the rules of photography, bringing to it new modes of capture, postprocessing, storage, and sharing. In this review, we give a brief history of mobile computational photography and describe some of the key technological components, including burst photography, noise reduction, and super-resolution. At each step, we can draw naive parallels to the human visual system.
APA, Harvard, Vancouver, ISO, and other styles
3

Zhang, En, Peiyan Yuan, and Jiao Du. "Verifiable Rational Secret Sharing Scheme in Mobile Networks." Mobile Information Systems 2015 (2015): 1–7. http://dx.doi.org/10.1155/2015/462345.

Full text
Abstract:
With the development of mobile network, lots of people now have access to mobile phones and the mobile networks give users ubiquitous connectivity. However, smart phones and tablets are poor in computational resources such as memory size, processor speed, and disk capacity. So far, all existing rational secret sharing schemes cannot be suitable for mobile networks. In this paper, we propose a verifiable rational secret sharing scheme in mobile networks. The scheme provides a noninteractively verifiable proof for the correctness of participants’ share and handshake protocol is not necessary; there is no need for certificate generation, propagation, and storage in the scheme, which is more suitable for devices with limited size and processing power; in the scheme, every participant uses her encryption on number of each round as the secret share and the dealer does not have to distribute any secret share; every participant cannot gain more by deviating the protocol, so rational participant has an incentive to abide by the protocol; finally, every participant can obtain the secret fairly (means that either everyone receives the secret, or else no one does) in mobile networks. The scheme is coalition-resilient and the security of our scheme relies on a computational assumption.
APA, Harvard, Vancouver, ISO, and other styles
4

Komen, Leah. "“Here you can use it”: Understanding mobile phone sharing and the concerns it elicits in rural Kenya." for(e)dialogue 1, no. 1 (March 16, 2016): 52–65. http://dx.doi.org/10.29311/for(e)dialogue.v1i1.532.

Full text
Abstract:
Globally, mobile phones are mostly used as personal items largely due to their data storage and services provision. However, various features enable mobile phone sharing and this subverts the notion of a single individual use. In cultures where communal sharing is valued and seen as normal, it is natural for mobile phones to be incorporated into other traditionally shared support systems, such as meetings summoned by elders, which involve social, economic, cultural and political activities. This paper draws on a recent doctoral thesis to examine the role of mobile telephony in the social transformation and development of Marakwet, a sub-ethnic group of the Kalenjin community in the Rift Valley region of western Kenya. The paper argues that the adoption and domestication of mobile telephony is both innovative and a source of problems for the Marakwet, depending on how the device is used in everyday life. The paper shows that while mobile phone sharing amongst the Marakwet is the most preferred practice, privacy and data security are key concerns among users.
APA, Harvard, Vancouver, ISO, and other styles
5

Hu, Han, Yonggang Wen, and Dusit Niyato. "Public Cloud Storage-Assisted Mobile Social Video Sharing: A Supermodular Game Approach." IEEE Journal on Selected Areas in Communications 35, no. 3 (March 2017): 545–56. http://dx.doi.org/10.1109/jsac.2017.2659478.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Daradkeh, Yousef Ibrahim, Mujahed ALdhaifallah, and Dmitry Namiot. "Mobile Clouds for Smart Cities." International Journal of Online Engineering (iJOE) 13, no. 01 (January 18, 2017): 76. http://dx.doi.org/10.3991/ijoe.v13i01.6320.

Full text
Abstract:
This paper is devoted to mobile cloud services in Smart City projects. As per mobile cloud computing paradigm, the data processing and storage are moved from the mobile device to a cloud. In the same time, Smart City services typically contain a set of applications with data sharing options. Most of the services in Smart Cities are actually mashups combined data from several sources. This means that access to all available data is vital to the services. And the mobile cloud is vital because the mobile terminals are one of the main sources for data gathering. In our work, we discuss criteria for selecting mobile cloud services.
APA, Harvard, Vancouver, ISO, and other styles
7

Kasai, Hiroyuki. "Implementation of distributed mobile storage and location-based message sharing among smart phones." ACM SIGMOBILE Mobile Computing and Communications Review 16, no. 4 (February 4, 2013): 20–21. http://dx.doi.org/10.1145/2436196.2436208.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Najwa, Nina Fadilah, Muhammad Ariful Furqon, and Eki Saputra. "Ulasan Literatur: Faktor-Faktor yang Mempengaruhi Adopsi Mobile Cloud Computing pada Mahasiswa." Ultimatics : Jurnal Teknik Informatika 12, no. 2 (December 29, 2020): 72–79. http://dx.doi.org/10.31937/ti.v12i2.1836.

Full text
Abstract:
Mobile Cloud Computing provides cloud storage services to users inside a cloud. This study focuses on the factors that influence the adoption of mobile cloud storage usage in the higher education. The research methods used in this study include: (1) problem formulation; (2) literature search; and (3) formulation of factors for adopting mobile cloud computing (4) validation and reliability test. The results obtained is a conceptual model that can be tested empirically. The main five factors are: (1) knowledge sharing variables; (2) Perceived usefulness variable (3) trust variable; (4) the attitude towards variable; and (5) the variable of behavioral intention of use. Each variable formulated in the conceptual model will be developed into items that are measurement indicators. The research contribution is in the form of a research model that is useful for empirical research on the factors of adoption of the use of Mobile Cloud Computing in the education sector.
APA, Harvard, Vancouver, ISO, and other styles
9

D, Uma Nandhini, Udhayakumar S, Latha Tamilselvan, and Silviya Nancy J. "Client Aware Scalable Cloudlet to Augment Edge Computing with Mobile Cloud Migration Service." International Journal of Interactive Mobile Technologies (iJIM) 14, no. 12 (July 31, 2020): 165. http://dx.doi.org/10.3991/ijim.v14i12.14407.

Full text
Abstract:
<p class="0abstract">Computing with mobile is still in its infancy due to its limitations of computational power, battery lifetime and storage capacity. These limitations hinder the growth of mobile computing, which in-turn affects the growth of computationally intensive applications developed for the mobile devices. So in-order to help execute complex applications within the mobile device, mobile cloud computing (MCC) emerged as a feasible solution. The job of offloading the task to the cloud data center for storage and execution from the mobile seems to gain popularity, however, issues related to network bandwidth, loss of mobile data connectivity, and connection setup does not augment well to extend the benefits offered by MCC. Cloudlet servers filled this gab by assisting the mobile cloud environment as an edge device, offering compute power to the connected devices with high speed wireless LAN connectivity. Implementation constraints of cloudlet faces severe challenges in-terms of its storage, network sharing, and VM provisioning. Moreover, the number of connected devices of the cloudlet and its load conditions vary drastically leading to unexpected bottleneck, in which case the availability to server becomes an issue. Therefore, a scalable cloudlet, Client Aware Scalable Cloudlet (CASC) is proposed with linear regression analysis, predicting the knowledge of expected load conditions for provisioning new virtual machines and to perform resource migration.</p>
APA, Harvard, Vancouver, ISO, and other styles
10

N.K, Sreelesh, and Santhosh Kumar B J. "An Advanced Hierarchical Attribute Based Encryption Access Control in Mobile Cloud Computing." International Journal of Engineering & Technology 7, no. 3.10 (July 15, 2018): 18. http://dx.doi.org/10.14419/ijet.v7i3.10.15621.

Full text
Abstract:
Cloud computing is a revolutionary computing technique, by which computing resources are provided dynamically via Internet is widely popular. Since the most attractive part of cloud computing is computation outsourcing, it is far beyond enough to just conduct access control. Unfortunately, the data in the cloud is out of user’s control in most cases, privacy risks would rise dramatically due to the access of unauthorized users. The security of the data is the major concern. Coordinating mobile devices into cloud computing is a rising but encouraging illustration. The coordination happens in a cloud based multi-layered client information sharing condition. With the coordination of cloud computing with mobile devices may result in security issues such as information privacy and client rights.The proposed work makes use of a technology using Advanced Hierarchical Attribute Based Encryption (A-HABE) architecture, in which the data storage will be in hierarchical structure and the retrieval of data will also be in the form of access level. Data confidentiality should be guaranteed and the system should be resilient. The secure storage and sharing of data without the fear of an unauthorized access in the cloud can result in growth in many sectors.
APA, Harvard, Vancouver, ISO, and other styles
11

Khan, Abdul Nasir, M. L. Mat Kiah, Mazhar Ali, Sajjad A. Madani, Atta ur Rehman Khan, and Shahaboddin Shamshirband. "BSS: block-based sharing scheme for secure data storage services in mobile cloud environment." Journal of Supercomputing 70, no. 2 (August 7, 2014): 946–76. http://dx.doi.org/10.1007/s11227-014-1269-8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
12

Zhang, Jiawei, Jianfeng Ma, Teng Li, and Qi Jiang. "Efficient Hierarchical and Time-Sensitive Data Sharing with User Revocation in Mobile Crowdsensing." Security and Communication Networks 2021 (February 27, 2021): 1–17. http://dx.doi.org/10.1155/2021/6646445.

Full text
Abstract:
Recently, cloud-based mobile crowdsensing (MCS) has developed into a promising paradigm which can provide convenient data sensing, collection, storage, and sharing services for resource-constrained terminates. Nevertheless, it also inflicts many security concerns such as illegal access toward user secret and privacy. To protect shared data against unauthorized accesses, many studies on Ciphertext-Policy Attribute-Based Encryption (CP-ABE) have been proposed to achieve data sharing granularity. However, providing a scalable and time-sensitive data-sharing scheme across hierarchical users with compound attribute sets and revocability remains a big issue. In this paper, we investigate this challenge and propose a hierarchical and time-sensitive CP-ABE scheme, named HTR-DAC, which is characteristics of time-sensitive data access control with scalability, revocability, and high efficiency. Particularly, we propose a time-sensitive CP-ABE for hierarchical structured users with recursive attribute sets. Moreover, we design a robust revocable mechanism to achieve direct user revocation in our scheme. We also integrate verifiable outsourced decryption to improve efficiency and guarantee correctness in decryption procedure. Extensive security and performance analysis is presented to demonstrate the security requirement satisfaction and high efficiency for our data-sharing scheme in MCS.
APA, Harvard, Vancouver, ISO, and other styles
13

Liu, Qian, Junquan Gong, and Qilie Liu. "Blockchain-Assisted Reputation Management Scheme for Internet of Vehicles." Sensors 23, no. 10 (May 10, 2023): 4624. http://dx.doi.org/10.3390/s23104624.

Full text
Abstract:
With the rapid development of Internet of Vehicles (IoV), particularly the introduction of Mobile Edge Computing (MEC), vehicles can efficiently share data with one another. However, edge computing nodes are vulnerable to various network attacks, posing security risks to data storage and sharing. Moreover, the presence of abnormal vehicles during the sharing process poses significant security threats to the entire network. To address these issues, this paper proposes a novel reputation management scheme, which proposes an improved multi-source multi-weight subjective logic algorithm. This algorithm fuses the direct and indirect opinion feedback of nodes through the subjective logic trust model while considering factors such as event validity, familiarity, timeliness, and trajectory similarity. Vehicle reputation values are periodically updated, and abnormal vehicles are identified through reputation thresholds. Finally, blockchain technology is employed to ensure the security of data storage and sharing. By analyzing real vehicle trajectory datasets, the algorithm is proven to effectively improve the differentiation and detection rate of abnormal vehicles.
APA, Harvard, Vancouver, ISO, and other styles
14

Saleh, Wardah, and Shahrin Chowdhury. "RANSlicing: Towards Multi-Tenancy in 5G Radio Access Networks." International Journal of Wireless & Mobile Networks 14, no. 2 (April 30, 2022): 43–51. http://dx.doi.org/10.5121/ijwmn.2022.14204.

Full text
Abstract:
A significant purpose of 5G networks is allowing sharing resources among different network tenants such as service providers and Mobile Virtual network Operators. Numerous domains are taken in account regarding resource sharing containing different infrastructure (storage, compute and networking), Radio Access Network (RAN) and Radio Frequency (RF) spectrum. RAN and spectrum, transport. Spectrum sharing and RAN are anticipated as the fundamental part in multi-tenant 5G network. Nevertheless, there is a shortage of evaluation platforms to determine the number of benefits that can be acquired from multilevel spectrum sharing rather than single-level spectrum sharing. The work presented in this paper intend to address this issue by presenting a modified SimuLTE model is used for evaluating active RAN based on multi-tenant 5G networks. The result shows an understanding into the actual advantages of RAN slicing for multi-tenants in 5G networks.
APA, Harvard, Vancouver, ISO, and other styles
15

Kumar, Jeya Amantha, Vishnu Nagendran Kumar, Mageswaran Sanmugam, and Sharifah Osman. "Mobile Applications for Learning: Exploring Information Technology Undergraduates’ Preference in Malaysia." Journal of Computational and Theoretical Nanoscience 17, no. 2 (February 1, 2020): 1113–16. http://dx.doi.org/10.1166/jctn.2020.8775.

Full text
Abstract:
Mobile devices, mobile applications (apps), smartphones, tabs are all tools used in the proliferation of mobile learning. These devices have been influential in changing how students communicate and learn today hence revolutionizing the 21st-century classroom. A total of 79 Information Technology undergraduates from two higher education institutes participated in this study. Findings revealed that WhatsApp was the most used application for communicating and sharing learning contents with peers and lecturers. Respondents used YouTube and Internet browsers to access alternative learning contents and the least used applications were related to learning management (calendar and cloud storage). Furthermore, results indicated no significant difference between gender and academic year towards their perception and concurrently all students had a positive perception towards using mobile technology for teaching and learning.
APA, Harvard, Vancouver, ISO, and other styles
16

Park, Young-Hoon, Yejin Kim, and Junho Shim. "Blockchain-Based Privacy-Preserving System for Genomic Data Management Using Local Differential Privacy." Electronics 10, no. 23 (December 3, 2021): 3019. http://dx.doi.org/10.3390/electronics10233019.

Full text
Abstract:
The advances made in genome technology have resulted in significant amounts of genomic data being generated at an increasing speed. As genomic data contain various privacy-sensitive information, security schemes that protect confidentiality and control access are essential. Many security techniques have been proposed to safeguard healthcare data. However, these techniques are inadequate for genomic data management because of their large size. Additionally, privacy problems due to the sharing of gene data are yet to be addressed. In this study, we propose a secure genomic data management system using blockchain and local differential privacy (LDP). The proposed system employs two types of storage: private storage for internal staff and semi-private storage for external users. In private storage, because encrypted gene data are stored, only internal employees can access the data. Meanwhile, in semi-private storage, gene data are irreversibly modified by LDP. Through LDP, different noises are added to each section of the genomic data. Therefore, even though the third party uses or exposes the shared data, the owner’s privacy is guaranteed. Furthermore, the access control for each storage is ensured by the blockchain, and the gene owner can trace the usage and sharing status using a decentralized application in a mobile device.
APA, Harvard, Vancouver, ISO, and other styles
17

Jin, Jiahui, Junzhou Luo, Yunhao Li, and Runqun Xiong. "COAST: A Cooperative Storage Framework for Mobile Transparent Computing Using Device-to-Device Data Sharing." IEEE Network 32, no. 1 (January 2018): 133–39. http://dx.doi.org/10.1109/mnet.2018.1700173.

Full text
APA, Harvard, Vancouver, ISO, and other styles
18

A. Abdulrahman, Safana, and M. F. Al-Gailani. "MOBILE CLOUD COMPUTING SERVICES AUTHENTICATION SCHEME." Iraqi Journal of Information and Communication Technology 5, no. 3 (December 30, 2022): 1–14. http://dx.doi.org/10.31987/ijict.5.3.201.

Full text
Abstract:
Because of the rapid growth of cloud computing and the expansion of mobile phone users in recent years, mobile cloud computing has attracted wide attention. In the mobile cloud, wireless computing networks are the basics of sharing data between mobile devices and cloud services. Since air is the communication medium, it must be properly protected; otherwise, it will be subject to a variety of security threats, for example, attacks from middle-man, identity tracking, etc... Furthermore, mobile devices are limited in storage, resources, and computing powers. Hence, designing an efficient and secure balance of authentication schemes is extremely important. First of all, a multi-factor authentication scheme based on biometric (fingerprint information), hash function, and fuzzy vault algorithm is presented in that paper. Secondly, the Validation and Analysis tool of AVISPA Security was approved. Thirdly, the security of the scheme proposed is compared to other related schemes.
APA, Harvard, Vancouver, ISO, and other styles
19

Hahn, Changhee, Hyunsoo Kwon, and Junbeom Hur. "Efficient Attribute-Based Secure Data Sharing with Hidden Policies and Traceability in Mobile Health Networks." Mobile Information Systems 2016 (2016): 1–13. http://dx.doi.org/10.1155/2016/6545873.

Full text
Abstract:
Mobile health (also written as mHealth) provisions the practice of public health supported by mobile devices. mHealth systems let patients and healthcare providers collect and share sensitive information, such as electronic and personal health records (EHRs) at any time, allowing more rapid convergence to optimal treatment. Key to achieving this is securely sharing data by providing enhanced access control and reliability. Typically, such sharing follows policies that depend on patient and physician preferences defined by a set of attributes. In mHealth systems, not only the data but also the policies for sharing it may be sensitive since they directly contain sensitive information which can reveal the underlying data protected by the policy. Also, since the policies usually incur linearly increasing communication costs, mHealth is inapplicable to resource-constrained environments. Lastly, access privileges may be publicly known to users, so a malicious user could illegally share his access privileges without the risk of being traced. In this paper, we propose an efficient attribute-based secure data sharing scheme in mHealth. The proposed scheme guarantees a hidden policy, constant-sized ciphertexts, and traces, with security analyses. The computation cost to the user is reduced by delegating approximately 50% of the decryption operations to the more powerful storage systems.
APA, Harvard, Vancouver, ISO, and other styles
20

Nguyen, Tri, Tien-Dung Nguyen, Van Nguyen, Xuan-Qui Pham, and Eui-Nam Huh. "Cost-Effective Resource Sharing in an Internet of Vehicles-Employed Mobile Edge Computing Environment." Symmetry 10, no. 11 (November 5, 2018): 594. http://dx.doi.org/10.3390/sym10110594.

Full text
Abstract:
By bringing the computation and storage resources close proximity to the mobile network edge, mobile edge computing (MEC) is a key enabling technology for satisfying the Internet of Vehicles (IoV) infotainment applications’ requirements, e.g., video streaming service (VSA). However, the explosive growth of mobile video traffic brings challenges for video streaming providers (VSPs). One known issue is that a huge traffic burden on the vehicular network leads to increasing VSP costs for providing VSA to mobile users (i.e., autonomous vehicles). To address this issue, an efficient resource sharing scheme between underutilized vehicular resources is a promising solution to reduce the cost of serving VSA in the vehicular network. Therefore, we propose a new VSA model based on the lower cost of obtaining data from vehicles and then minimize the VSP’s cost. By using existing data resources from nearby vehicles, our proposal can reduce the cost of providing video service to mobile users. Specifically, we formulate our problem as mixed integer nonlinear programming (MINP) in order to calculate the total payment of the VSP. In addition, we introduce an incentive mechanism to encourage users to rent its resources. Our solution represents a strategy to optimize the VSP serving cost under the quality of service (QoS) requirements. Simulation results demonstrate that our proposed mechanism is possible to achieve up to 21% and 11% cost-savings in terms of the request arrival rate and vehicle speed, in comparison with other existing schemes, respectively.
APA, Harvard, Vancouver, ISO, and other styles
21

Sugumar, B., and M. Ramakrishnan. "Key Escrow with Elliptic Curve Cryptography – Conceptual Framework for Distributed Mobile Networks." Indonesian Journal of Electrical Engineering and Computer Science 11, no. 3 (September 1, 2018): 1060. http://dx.doi.org/10.11591/ijeecs.v11.i3.pp1060-1067.

Full text
Abstract:
In the large scale distributive environment involving mobile network, metadata server and storage applications, the data access and the security measures are of paramount importance. In parallel application processing, data is distributed across multiple servers and storage location. Ensuring confidentiality and availability of the data to the authorised users at the appropriate time involves high level of encryption algorithms, key management schemes and security algorithms. In this paper, key escrow scheme is implemented with the light weighted symmetric algorithm, elliptic curve cryptography in the distributed environment. Key escrow centre is established along with the metadata server and the encryption keys are segmented and shared among the multiple sub agents using Shamir threshold sharing scheme. The implementation of Key Escrow mechanism with Elliptical Curve Cryptography provides wide range of flexibility and confidentiality in the distributed environment. It also eliminates private secret sub key problem and thereby ensuring better security.
APA, Harvard, Vancouver, ISO, and other styles
22

Liu, Xueyan, Yukun Luo, and Xiaotao Yang. "Traceable Attribute-Based Secure Data Sharing with Hidden Policies in Mobile Health Networks." Mobile Information Systems 2020 (August 3, 2020): 1–12. http://dx.doi.org/10.1155/2020/3984048.

Full text
Abstract:
The growing need to store, share, and manage medical and health records has resulted in electronic medical health sharing system (mHealth), which provides intelligent medical treatment for people. Attribute-based encryption (ABE) is regarded as a new cryptology to enhance fine-grained access control over encrypted sharing data in mHealth. However, some existing attribute-based mHealth systems not only violate the one-to-many application characteristics of attribute-based encryption mechanism but also destroy the anonymity of user. In this study, an efficient scheme is proposed to tackle the above defaults and offer two-way anonymity of data owner and data user by introducing a pseudoidentity. The computation of hidden access policy is reduced by removing the bilinear pairing, whereas the interaction between cloud storage and data user is avoided to save bandwidth during trapdoor generation. We also consider the temporal factor of the uploaded information by introducing access validity. Security and performance analyses show that the proposed scheme is efficient without reducing security.
APA, Harvard, Vancouver, ISO, and other styles
23

Gershon, Ilana, and Amy Gonzales. "You got a hole in your belly and a phone in your hand: How US government phone subsidies shape the search for employment." New Media & Society 23, no. 4 (April 2021): 853–71. http://dx.doi.org/10.1177/1461444820954184.

Full text
Abstract:
Many of the tasks involved in looking for a job these days involve sharing and storing digital data. Digital technology is now required for job seekers to research employers, store resumes, complete applications, and schedule interviews. What is the employment process for people who are living on the poverty line, without reliable access to the Internet or mobile phones? We focus on technology maintenance, the continuous work required to stay digitally connected, to understand how low-income job seekers in northern California manage the circulation and storage of information. We incorporate the concept of delegation from Latour to explore how people consciously consider who or what entities are responsible for technology maintenance, as this varies by government policies related to digital subsidies. This article draws novel connections between the influence of government policy on technology maintenance and how both the policies and digital inequalities shape impoverished job seekers’ choices around sharing and storage practices.
APA, Harvard, Vancouver, ISO, and other styles
24

Sethia, Divyashikha, and Raj Sahu. "Efficient ECC-Based CP-ABE Scheme With Constant-Sized Key and Scalable User Revocation." International Journal of Information Security and Privacy 16, no. 1 (January 1, 2022): 1–19. http://dx.doi.org/10.4018/ijisp.311468.

Full text
Abstract:
A lightweight encryption technique with low storage overheads is essential to secure data access from Resrouce-Constrained Devices (RCD). It must protect against unsolicited users with scalable user revocation with uninterrupted access to valid users. A user must be able to access RCD over low-energy wireless communication interfaces through a user reader device (mobile). Attribute-based encryption is an efficient technique for securely sharing sensitive data with multiple stakeholders without the requirement of sharing multiple security keys. This paper proposes a novel ECC-based scalable user revocation (EASER) ciphertext policy attribute-based encryption (CP-ABE) encryption scheme to secure and selectively share data from RCD with multiple stakeholders. It is based on ECC, with lower decryption time and constant-sized secret keys with low storage overhead. EASER extends Odelu et al.'s ECC-based CP-ABE scheme for scalable user revocation and mitigates a proven key-collusion attack. It is suitable for securing RCD and provides secure, selective access from a user reader device.
APA, Harvard, Vancouver, ISO, and other styles
25

Kumar, Narotam, and Prof Dr Bhuvana J. "Shielded Identity Based Data and Contour Sharing for Mobile Healthcare Through Cloud Computing." International Journal for Research in Applied Science and Engineering Technology 10, no. 2 (February 28, 2022): 1250–53. http://dx.doi.org/10.22214/ijraset.2022.40497.

Full text
Abstract:
Abstract: Cloud computing and social networks are changing the way healthcare provides by providing real-time data sharing in a cost-effective way. However, the issue of data security is one of the key barriers to the widespread use of social networking services (MHSN), as health information is considered extremely sensitive. In this paper, we introduce a secure data sharing and MHSN profile matching scheme on a cloud computer. Patients can extract their encrypted health records from cloud storage via identity-based broadcast encryption (IBBE), and share them with a team of physicians in a safe and effective manner. Then we introduce a conditional data-based encryption component, which allows physicians who satisfy the pre-defined conditions in ciphertext to authorize cloud platform to convert ciphertext into a new ciphertext-based encryption system. without disclosing any sensitive information. The paper will also provide insight into data security policies that may authorize certain administrators to have read-only capabilities for all device parameters and read / write specific set of commands. Each administrator may have a different access profile introduction.
APA, Harvard, Vancouver, ISO, and other styles
26

Volk, Mojca, Janez Sterle, and Urban Sedlar. "Safety and Privacy Considerations for Mobile Application Design in Digital Healthcare." International Journal of Distributed Sensor Networks 2015 (2015): 1–12. http://dx.doi.org/10.1155/2015/549420.

Full text
Abstract:
This paper presents a case study on security and privacy implications on the design of a mobile application in digital health, the DeStress Assistant (DeSA) app, which utilizes sensing technologies and capabilities of the Internet of Things (IoT). An analysis of the applicable legislative framework is provided and selected challenges encountered during the app design are discussed, which are related with the practical implications of provisions of the international and national legislation for software applications in general as well as medical devices and handling of sensitive data in particular. We provide insights into design choices, including different possible scenarios for classification of a mobile app as a medical device and the pertaining legal risks the app developer is faced with as a consequence of possible legal obligations, and different possibilities of specifying the intended use. Also, we propose two designs of a mechanism that enables secure sharing of the patient’s health-related observations from the DeSA app with a medical professional within a treatment context. The first mechanism provides secure submission of health-related observations into a hospital information system, whereas the second mechanism enables secure short-term sharing of observations without storage.
APA, Harvard, Vancouver, ISO, and other styles
27

Firdaus, Muhammad, Sandi Rahmadika, and Kyung-Hyune Rhee. "Decentralized Trusted Data Sharing Management on Internet of Vehicle Edge Computing (IoVEC) Networks Using Consortium Blockchain." Sensors 21, no. 7 (March 31, 2021): 2410. http://dx.doi.org/10.3390/s21072410.

Full text
Abstract:
The emergence of the Internet of Vehicles (IoV) aims to facilitate the next generation of intelligent transportation system (ITS) applications by combining smart vehicles and the internet to improve traffic safety and efficiency. On the other hand, mobile edge computing (MEC) technology provides enormous storage resources with powerful computing on the edge networks. Hence, the idea of IoV edge computing (IoVEC) networks has grown to be an assuring paradigm with various opportunities to advance massive data storage, data sharing, and computing processing close to vehicles. However, the participant’s vehicle may be unwilling to share their data since the data-sharing system still relies on a centralized server approach with the potential risk of data leakage and privacy security. In addition, vehicles have difficulty evaluating the credibility of the messages they received because of untrusted environments. To address these challenges, we propose consortium blockchain and smart contracts to accomplish a decentralized trusted data sharing management system in IoVEC. This system allows vehicles to validate the credibility of messages from their neighboring by generating a reputation rating. Moreover, the incentive mechanism is utilized to trigger the vehicles to store and share their data honestly; thus, they will obtain certain rewards from the system. Simulation results substantially display an efficient network performance along with forming an appropriate incentive model to reach a decentralized trusted data sharing management of IoVEC networks.
APA, Harvard, Vancouver, ISO, and other styles
28

Wang, Zelin, Xiaoning Wei, and Jiansheng Pan. "Research on IRP of Perishable Products Based on Mobile Data Sharing Environment." International Journal of Cognitive Informatics and Natural Intelligence 15, no. 2 (April 2021): 139–57. http://dx.doi.org/10.4018/ijcini.20210401.oa10.

Full text
Abstract:
Inventory routing problem (IRP) has always been a hot issue. Due to its particularity, perishable products have high requirements for inventory and transportation. In order to reduce the losses of perishable goods and improve the storage efficiency of perishable goods, based on the general inventory path problem, this paper further has studied the IRP of perishable goods. In addition, in the process of product distribution and transportation, there are a lot of real-time product information generated dynamically. These real-time mobile data must be shared by the whole distribution network, which will also dynamically affect the efficiency of IRP research. On the basis of some assumptions, the mathematical model has been established with inventory and vehicle as constraints and the total cost of the system as the objective. In view of the particularity of perishable inventory path problem, this paper proposed an improved differential evolution algorithm (IDE) to improve the differential evolution algorithm from two aspects. Firstly, the population has been initialized by gridding and the greedy local optimization algorithm has been used to assist the differential evolution algorithm, with these measures to improve the convergence speed of the algorithm. Then, the accuracy of the algorithm is improved by the adaptive scaling factor, two evolution modes and changing the constraints of the problem. Then the improved algorithm has been used to solve the inventory path problem. The results of numerical experiments show that the algorithm is effective and feasible and can improve the accuracy and speed up the convergence of the algorithm.
APA, Harvard, Vancouver, ISO, and other styles
29

Jerald Nirmal Kumar S., Jerald Nirmal Kumar S., Ravimaran S., and Sathish A. "Robust Security With Strong Authentication in Mobile Cloud Computing Based on Trefoil Congruity Framework." Journal of Organizational and End User Computing 33, no. 6 (November 2021): 1–28. http://dx.doi.org/10.4018/joeuc.20211101.oa11.

Full text
Abstract:
In the mobile cloud computing era, the sharing of secured large-scale data which have major challenges. From an existing quantum based security mechanism randomly chosen the photon detector which creates small length of qubits so it cannot provide much security in MCC also data storage in the cloud server doesn’t guarantees the lossless back up and data recovery as well attains more computation complex during secure access of stored data. Therefore to solve those issues a unique combination of the Trefoil Congruity framework is proposed which consist Quantum Key Fibo Privacy Approach (QKFPA) performing the quantum key generation for encrypt and decrypt the data with the aid of Fibonacci chain-slanting matrix. Based on that quantum key data is uploaded, then secured data should be stored, ultra-widely distributed data transfer mechanism does the scrambling with sorting the stored data by implementing novel HS-DRT technique that improves the lossless backup and recovery of data storage.
APA, Harvard, Vancouver, ISO, and other styles
30

El-Sofany, Hosam, and Samir Abou El-Seoud. "A Novel Model for Securing Mobile-based Systems against DDoS Attacks in Cloud Computing Environment." International Journal of Interactive Mobile Technologies (iJIM) 13, no. 01 (January 29, 2019): 85. http://dx.doi.org/10.3991/ijim.v13i01.9900.

Full text
Abstract:
the increasing growth of mobile devices technology and Mobile-based systems with the emerging of cloud computing technology, created a Mobile Cloud Computing field to be the recent future technology for different wireless services. The development of Mobile-based system under cloud computing environment solve some performance and environment related issues include: bandwidth, storage capacity, availability, scalability and heterogeneity. The Mobile-based cloud computing apps are different comparing to mobile computing apps, since in the first model the devices run cloud based web applications not as mobile computing native apps. Services of Mobile-based systems via cloud are accessing and sharing through internet connection thus they are open for attacker to attack on its security. Distributed Denial of Service (DDoS) attacks can cause a big problem in mobile cloud computing security. The main objective of DDoS attacks is to infect wireless devises resources (e.g., software applications, wireless network, etc.) and make them unavailable to the authorized user. In DDoS, the attacker tries to overload the Mobile-based service with traffic. The main objective of this research paper is to introduce novel model for securing Mobile-based systems against DDoS attacks. Efficiency and performance analysis evaluations of the proposed model are presented. The feedbacks of the experimental results were highly promising, for protecting mobile-based cloud computing systems against DDoS attacks.
APA, Harvard, Vancouver, ISO, and other styles
31

Kasi, Mumraiz Khan, Sarah Abu Ghazalah, Raja Naeem Akram, and Damien Sauveron. "Secure Mobile Edge Server Placement Using Multi-Agent Reinforcement Learning." Electronics 10, no. 17 (August 30, 2021): 2098. http://dx.doi.org/10.3390/electronics10172098.

Full text
Abstract:
Mobile edge computing is capable of providing high data processing capabilities while ensuring low latency constraints of low power wireless networks, such as the industrial internet of things. However, optimally placing edge servers (providing storage and computation services to user equipment) is still a challenge. To optimally place mobile edge servers in a wireless network, such that network latency is minimized and load balancing is performed on edge servers, we propose a multi-agent reinforcement learning (RL) solution to solve a formulated mobile edge server placement problem. The RL agents are designed to learn the dynamics of the environment and adapt a joint action policy resulting in the minimization of network latency and balancing the load on edge servers. To ensure that the action policy adapted by RL agents maximized the overall network performance indicators, we propose the sharing of information, such as the latency experienced from each server and the load of each server to other RL agents in the network. Experiment results are obtained to analyze the effectiveness of the proposed solution. Although the sharing of information makes the proposed solution obtain a network-wide maximation of overall network performance at the same time it makes it susceptible to different kinds of security attacks. To further investigate the security issues arising from the proposed solution, we provide a detailed analysis of the types of security attacks possible and their countermeasures.
APA, Harvard, Vancouver, ISO, and other styles
32

Huang, Qinlong, Licheng Wang, and Yixian Yang. "Secure and Privacy-Preserving Data Sharing and Collaboration in Mobile Healthcare Social Networks of Smart Cities." Security and Communication Networks 2017 (2017): 1–12. http://dx.doi.org/10.1155/2017/6426495.

Full text
Abstract:
Mobile healthcare social networks (MHSN) integrated with connected medical sensors and cloud-based health data storage provide preventive and curative health services in smart cities. The fusion of social data together with real-time health data facilitates a novel paradigm of healthcare big data analysis. However, the collaboration of healthcare and social network service providers may pose a series of security and privacy issues. In this paper, we propose a secure health and social data sharing and collaboration scheme in MHSN. To preserve the data privacy, we realize secure and fine-grained health data and social data sharing with attribute-based encryption and identity-based broadcast encryption techniques, respectively, which allows patients to share their private personal data securely. In order to achieve enhanced data collaboration, we allow the healthcare analyzers to access both the reencrypted health data and the social data with authorization from the data owner based on proxy reencryption. Specifically, most of the health data encryption and decryption computations are outsourced from resource-constrained mobile devices to a health cloud, and the decryption of the healthcare analyzer incurs a low cost. The security and performance analysis results show the security and efficiency of our scheme.
APA, Harvard, Vancouver, ISO, and other styles
33

Liu, Yang, Zhaoxiang Yu, and Hua Sun. "Treatment Effect of Type 2 Diabetes Patients in Outpatient Department Based on Blockchain Electronic Mobile Medical App." Journal of Healthcare Engineering 2021 (March 1, 2021): 1–12. http://dx.doi.org/10.1155/2021/6693810.

Full text
Abstract:
As the pace of people’s lives accelerates, there are more and more diabetic patients. This research mainly explores the treatment effect of type 2 diabetic patients based on blockchain electronic mobile medical app. Considering that it is more realistic to adopt an off-chain storage solution, the blockchain-based medical data sharing platform in this study adopts an off-chain storage solution. Only key information is stored in the blockchain network, and all medical data will be in the cloud space. For storage, cloud storage uses Aliyun’s OSS storage service, which can be expanded infinitely. The cloud operation module is responsible for all operations that interact with cloud storage. The chain code can call the cloud operation module to upload the user’s encrypted medical data and user ID to Alibaba Cloud’s OSS. The chain code will return the storage address of the medical data and the authorized access address is sent to the blockchain network for consensus on the chain. The message processing module provides information processing functions such as chat information processing, APP use reminders, and health tips. The indicator recording module includes indicator recording functions including 6 indicators of blood sugar, medication, diet, weight, exercise, and sleep. The main function of the indicator analysis module is to display the curve trends of the 6 indicators recorded by the patient in three days, one week, and one month. Comparing the change range of the mean value of glycosylated hemoglobin at the beginning and end of the two groups of patients, it can be found that the change range of glycosylated hemoglobin in the intervention group is −6.04%, while the change range of the control group is only −3.26%. The impact of the mobile medical app designed in this study will indeed be reflected in the patient’s blood sugar control and help patients to better control blood sugar.
APA, Harvard, Vancouver, ISO, and other styles
34

Vaarzon-Morel, Petronella, Linda Barwick, and Jennifer Green. "Sharing and storing digital cultural records in Central Australian Indigenous communities." New Media & Society 23, no. 4 (April 2021): 692–714. http://dx.doi.org/10.1177/1461444820954201.

Full text
Abstract:
This article considers how Indigenous peoples in Central Australia share and keep digital records of events and cultural knowledge in a period of rapid technological change. To date, research has focused upon the development of digital archives and platforms that reflect Indigenous epistemologies and incorporation of protocols governing access to information. Yet there is scant research on how individuals with little access to such media share and hold—or not, as the case may be—digital cultural information. After surveying current enabling infrastructures in Central Australia, we examine how materials are held and shared when people do not have easy access to databases and the Internet. We analyze examples of practices of sharing materials to draw out issues that arise in managing storage and circulation of cultural records via Universal Serial Bus (USB) flash drives, mobile phones, and other devices. We consider how the affordances of various platforms support, extend, and/or challenge Indigenous socialities and ontologies.
APA, Harvard, Vancouver, ISO, and other styles
35

Munmun, Farha Akhter, Adeeba Anis, and Md Shohrab Hossain. "A Comprehensive Comparison between Cloud Computing and Mobile Edge Computing." International Journal of Research and Innovation in Applied Science 07, no. 07 (2022): 66–71. http://dx.doi.org/10.51584/ijrias.2022.7705.

Full text
Abstract:
Cloud computing provides a user-convenient, low-expense, and powerful computing platform for sharing resources like online storage, applications, and software through the internet. But with the exponential growth of the Internet of Things (IoT) devices and massive amounts of private data in the network, the centralized and conventional architecture of cloud computing has become a bottleneck because of limited bandwidth and resources. At the same time security is also an open concern for cloud computing. Hence, Mobile Edge Computing (MEC) is an extended architecture of cloud computing that enables data processing and storing at the edge of mobile networks. Instead of having some unique features (distributed architecture, parallel processing, low latency), MEC has also brought some security threats and challenges. In this paper, a comprehensive comparison between cloud computing and MEC has been presented in terms of features and security threats. Also, the security mechanisms for handling the threats are analyzed.
APA, Harvard, Vancouver, ISO, and other styles
36

Labrador, Hugo González, Georgios Alexandropoulos, Enrico Bocchi, Diogo Castro, Belinda Chan, Cristian Contescu, Massimo Lamanna, et al. "CERNBox: the CERN cloud storage hub." EPJ Web of Conferences 214 (2019): 04038. http://dx.doi.org/10.1051/epjconf/201921404038.

Full text
Abstract:
CERNBox is the CERN cloud storage hub. It allows synchronizing and sharing files on all major desktop and mobile platforms (Linux, Windows, MacOSX, Android, iOS) aiming to provide universal access and offline availability to any data stored in the CERN EOS infrastructure. With more than 16000 users registered in the system, CERNBox has responded to the high demand in our diverse community to an easily and accessible cloud storage solution that also provides integration with other CERN services for big science: visualization tools, interactive data analysis and real-time collaborative editing. Collaborative authoring of documents is now becoming standard practice with public cloud services, and within CERNBox we are looking into several options: from the collaborative editing of shared office documents with different solutions (Microsoft, OnlyOffice, Collabora) to integrating mark-down as well as LaTeX editors, to exploring the evolution of Jupyter Notebooks towards collaborative editing, where the latter leverages on the existing SWAN Physics analysis service. We report on our experience managing this technology and applicable use-cases, also in a broader scientific and research context and its future evolution with highlights on the current development status and future road map. In particular we will highlight the future move to an architecture based on micro services to easily adapt and evolve the service to the technology and usage evolution, notably to unify CERN home directory services.
APA, Harvard, Vancouver, ISO, and other styles
37

Bai, Jiangtao, and Wei Pan. "The Construction Method of Historical Geographic Information System Based on Mobile Network." Mobile Information Systems 2022 (August 30, 2022): 1–10. http://dx.doi.org/10.1155/2022/7392478.

Full text
Abstract:
The research of historical geography is inseparable from the construction of historical geographic information systems, but the traditional construction method of historical geographic information systems has certain technical defects in the storage, management, analysis, and data sharing of historical geographic data. Therefore, more innovative and advanced construction methods of historical geographic information systems are needed to continuously improve the construction of historical geographic information systems, to promote the development of historical geographic information research. In contemporary society, a more excellent historical geographic information system construction method is inseparable from the support of science and technology. With the continuous development of science and technology, mobile network technology has emerged. As a combination of mobile communication and the Internet, mobile network has strong functional advantages. It has developed rapidly in recent years and has great market development potential. This paper aims to study the construction method of historical geographic information systems based on mobile network. Combined with the data collection algorithm of mobile network, the historical geographic information system construction experiment was carried out. The experiment concluded that the information integrity of the historical geographic information system constructed based on the mobile network is 18.2% higher than that of the historical geographic information system constructed using traditional methods. This shows that mobile network technology has a certain positive effect on the construction of historical geographic information systems.
APA, Harvard, Vancouver, ISO, and other styles
38

Htun, Khaing Sandar. "Cost Effective for Erlang Traffic of Mobile Learning Over the Clouds." International Journal of E-Services and Mobile Applications 6, no. 2 (April 2014): 1–11. http://dx.doi.org/10.4018/ijesma.2014040101.

Full text
Abstract:
The progression of technology in this up-to-the-minute era keeps on booming rapidly from time to time (Aljabre, 2012). Cloud computing is the today's latest trend which offers unlimited and flexible shared storage server in a computer system. It can be used by any organizations and institutions. It provides services anytime anywhere. It gives user satisfaction because it enhances efficiency, preserves resource utilization, and improves information sharing. This technology is very beneficial to mobile learners as it helps eliminate problems of distance barrier and the access to education in different geographical locations. Software licensing and manpower training are no longer needed with this latest technology. However real-time applications have constraint with their response time. This paper investigates the cost effective for Erlang traffic of Mobile Learning over the clouds. Throughputs over cost are analyzed. The analysis results that although Google Cloud offers a poor performance but it is the most cost effective compared to the other four clouds.
APA, Harvard, Vancouver, ISO, and other styles
39

Premalatha, M., and G. Baskaran. "Bootstrap Based Large Scale Data Processing Using Cluster." International Journal of Advance Research and Innovation 3, no. 2 (2015): 36–39. http://dx.doi.org/10.51976/ijari.321509.

Full text
Abstract:
Cloud computing is model in which large groups of remote servers are networked to allow centralized data storage and online access to computer services or resources. Clouds can be classified as public, private. A corporate network is a group of computers, connected together in a building or in a particular area, which are all owned by the same. The corporate network is often used for sharing information among the participating companies and facilitating collaboration in a certain industry sector where companies share a common interest, there is so challenges and some security issues appeared .So in the proposed System it implement the Best Peer++, a system which delivers elastic data sharing services for corporate network applications in the cloud based on Best Peer—a peer-to-peer (P2P) based data management platform. A data management platform is the backbone of data-driven marketing, and serves as a unifying platform to collect, organize, and activate your first- and third-party audience data from any source, including online, offline, or mobile. A true Data Management Platform should have the ability to collect unstructured audience data from any source, including mobile web and app, web analytic tools, CRM, point of sale, social, online video, and other available offline data sources.
APA, Harvard, Vancouver, ISO, and other styles
40

Ikhlasa, Tazkia Nurul, and Suryadi Suryadi. "THE EFFECT OF VLOG CONTENT YOUTUBE MEDIA ON LEARNING ENGLISH." IJIET (International Journal of Indonesian Education and Teaching) 7, no. 1 (December 27, 2022): 33–40. http://dx.doi.org/10.24071/ijiet.v7i1.5315.

Full text
Abstract:
The proliferation of mobile devices and online storage space has led to an explosion of learning resources, one of which is the video-sharing site YOUTUBE. There are several types of content/videos in this application, one of which is English-based Daily Vlog content. The aims of this study are (1) to find out to what extent the content of YouTube vlogs affects English mastery, and (2) to identify the types of content that have the greatest impact on English language development. For what purpose do you watch YouTube vlogs? 3. Quantitative methods are used in this study. Quantitative studies involve the collection and analysis of numerical data to characterize phenomena, identify relationships, or test hypotheses. One of these tools is a student questionnaire. To calculate the final results, researchers use SPPS (Statistical Package for the social sciences). Research shows that vlog content on the video-sharing site YouTube has a considerable impact on student's ability to understand English.
APA, Harvard, Vancouver, ISO, and other styles
41

Jung, Kye-Dong, Seok-Jae Moon, and Jin-Mook Kim. "Data access control method for multimedia content data sharing and security based on XMDR-DAI in mobile cloud storage." Multimedia Tools and Applications 76, no. 19 (October 13, 2016): 19983–99. http://dx.doi.org/10.1007/s11042-016-4016-8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
42

Cherbal, Sarra, and Imen Barouchi. "ZRR-P2P: Zone-Based Mechanism for Data Replication and Research Optimization in Unstructured P2P Systems." Ingénierie des systèmes d information 26, no. 1 (February 28, 2021): 23–32. http://dx.doi.org/10.18280/isi.260103.

Full text
Abstract:
Peer-to-peer systems (P2P) have enjoyed great popularity in terms of sharing content in distributed environments. In mobile P2P networks, how to improve the efficiency of the resource lookup has been an important topic of research. Among the existing solutions, we find lookup mechanisms based on data replication that can increase data availability and reduce search latency. On the other side, these solutions have certain limits such as in the selection of resources to be replicated and in increasing the storage space of peers with additional data. Therefore, this work ZRR-P2P (Zone-based mechanism for data Replication and Research optimization in P2P) comes with the aim of partitioning the network zone on sub-zones and of replicating popular data shared in the network. Thus, in order to improve the research process without increasing storage space of peers. The simulation results show that our strategy manages to increase data availability and improve the search process in terms of hops count and search latency, while avoiding increasing the storage space of peers.
APA, Harvard, Vancouver, ISO, and other styles
43

Zhang, Hui, and Fang Zuo. "Construction of Digital Teaching Resources of British and American Literature Using Few-Shot Learning and Cloud Computing." Computational Intelligence and Neuroscience 2022 (June 26, 2022): 1–10. http://dx.doi.org/10.1155/2022/4526128.

Full text
Abstract:
British and American literature is a compulsory course for English majors in Chinese colleges and universities. It plays an important role in cultivating students’ aesthetic consciousness and moral cultivation, improving students’ humanistic quality and cultural taste, and shaping students’ complete personalities. With the rapid development of cloud technology and mobile Internet technology, mobile learning based on mobile devices will become an important direction of mobile Internet technology applications. Based on cloud computing, this paper studies the construction of digital teaching resources of the British and American literature. Through the experiment on the learning simplicity of literature courses for English majors, it is found that during the learning period of 40 people, the average proportion of the most difficult is 16.3%, the average proportion of the second difficult is 35.2%, and the average proportion of the easier is 18.5%. Compared with the next difficulty, the proportion of difficulty is the highest, followed by the easy and finally the most difficult. As one of the core technologies of cloud computing, data split storage technology adopts measures such as isomorphism and interchangeability of computing nodes, redundant storage, and multicopy fault tolerance to ensure the high security and reliability of user data and users do not have to worry about data loss and virus invasion. As a new generation of technical means, cloud computing can realize the unified management and scheduling of distributed and heterogeneous resources and provide a new development direction for promoting the coconstruction and sharing of the British and American literature digital teaching platforms in higher vocational colleges and truly realizing national learning and lifelong learning.
APA, Harvard, Vancouver, ISO, and other styles
44

Alam, Md Shahin, and Seyed Ali Arefifar. "IoT-Based Mobile Energy Storage Operation in Multi-MG Power Distribution Systems to Enhance System Resiliency." Energies 15, no. 1 (January 3, 2022): 314. http://dx.doi.org/10.3390/en15010314.

Full text
Abstract:
Multi-microgrids have gained interest in academics and industry in recent years. Multi-microgrid (MG) allows the integration of different distributed energy resources (DERs), including intermittent renewables and controllable local generators, and provides a more flexible, reliable, and efficient power grid. This research formulates and proposes a solution for finding optimal location and operation of mobile energy storage (MES) in multi-MG power distribution systems (PDS) with different resources during extreme events to maximize system resiliency. For this purpose, a multi-stage event-based system resiliency index is defined and the impact of the Internet of things (IoT) application in MES operation in multi-MG systems is investigated. Moreover, the demand and price uncertainty impact on multi-MG operational performance indices is presented. This research uses a popular PG & E 69-bus multi-MG power distribution network for simulation and case studies. A new hybrid PSO-TS optimization algorithm is constructed for the simulations to better understand the contributions of MES units and different DERs and IoT on the operational aspects of a multi-MG system. The results obtained from the simulations illustrate that optimal operation of MES and other energy resources, along with the corresponding energy sharing strategies, significantly improves the distribution system operational performance.
APA, Harvard, Vancouver, ISO, and other styles
45

Wang, Xu. "Research on Methods to Accelerate the Speed of Data Input Based on Library Computer Management System." Applied Mechanics and Materials 687-691 (November 2014): 1724–27. http://dx.doi.org/10.4028/www.scientific.net/amm.687-691.1724.

Full text
Abstract:
With the development of network technology, communication technology and computer technology, the library circle has raised the climax of building the digital library. In this paper, it is necessary to establish human-machine interactive library management information system based on information technology, computer technology, networking technology to combine information, management with system, and to make library function maximal, service optimal and management canonical. Speed up data entry is one of the core aspects, and rapid data input is the main function of the library management system. After discussing the principles and methods of data input, OPAC systems and bar code technology can satisfy the requirements. Data input and output: the library can easily achieve all business input and output data; data storage and transfer: The database structure is reasonable, rational distribution, and store a variety of data makes the library all business data secure storage and mobile, highly centralized data management and sharing.
APA, Harvard, Vancouver, ISO, and other styles
46

Wei, Jianghong, Xinyi Huang, Wenfen Liu, and Xuexian Hu. "Cost-Effective and Scalable Data Sharing in Cloud Storage Using Hierarchical Attribute-Based Encryption with Forward Security." International Journal of Foundations of Computer Science 28, no. 07 (November 2017): 843–68. http://dx.doi.org/10.1142/s0129054117500289.

Full text
Abstract:
Cloud storage greatly facilitates both individuals and organizations to share data over the Internet. However, there are several security issues that impede to outsource their data. Among various approaches introduced to overcome these issues, attribute-based encryption (ABE) provides secure and flexible access control on shared data, and thus is rather promising. But the original ABE is not adaptable to some special circumstances, where attributes are organized in a hierarchical structure, such as enterprises and official institutions. On the other hand, although the wide use of mobile devices enables users to conveniently access shared data anywhere and anytime, this also increases the risk of key exposure, which will result into unwanted exposure of the shared data. In this paper, we extend the functionality of the original ABE and enhance its security by providing key generation delegation and forward security. Consequently, the enhanced ABE meets applications of large organizations with hierarchies and minimizes the damage in the case of unexpected key exposures. Specifically speaking, we present a forward-secure ciphertext-policy hierarchical attribute-based encryption scheme in prime order bilinear groups, as a core building of attribute-based data sharing scheme. The security of the proposed scheme is proven in the standard model. We conduct experiments to demonstrate its efficiency and practicability.
APA, Harvard, Vancouver, ISO, and other styles
47

Li, Fengyin, Dongfeng Wang, Yilei Wang, Xiaomei Yu, Nan Wu, Jiguo Yu, and Huiyu Zhou. "Wireless Communications and Mobile Computing Blockchain-Based Trust Management in Distributed Internet of Things." Wireless Communications and Mobile Computing 2020 (December 19, 2020): 1–12. http://dx.doi.org/10.1155/2020/8864533.

Full text
Abstract:
The development of Internet of Things (IoT) and Mobile Edge Computing (MEC) has led to close cooperation between electronic devices. It requires strong reliability and trustworthiness of the devices involved in the communication. However, current trust mechanisms have the following issues: (1) heavily relying on a trusted third party, which may incur severe security issues if it is corrupted, and (2) malicious evaluations on the involved devices which may bias the trustrank of the devices. By introducing the concepts of risk management and blockchain into the trust mechanism, we here propose a blockchain-based trust mechanism for distributed IoT devices in this paper. In the proposed trust mechanism, trustrank is quantified by normative trust and risk measures, and a new storage structure is designed for the domain administration manager to identify and delete the malicious evaluations of the devices. Evidence shows that the proposed trust mechanism can ensure data sharing and integrity, in addition to its resistance against malicious attacks to the IoT devices.
APA, Harvard, Vancouver, ISO, and other styles
48

Li, Xi, Zehua Wang, Victor C. M. Leung, Hong Ji, Yiming Liu, and Heli Zhang. "Blockchain-empowered Data-driven Networks." ACM Computing Surveys 54, no. 3 (June 2021): 1–38. http://dx.doi.org/10.1145/3446373.

Full text
Abstract:
The paths leading to future networks are pointing towards a data-driven paradigm to better cater to the explosive growth of mobile services as well as the increasing heterogeneity of mobile devices, many of which generate and consume large volumes and variety of data. These paths are also hampered by significant challenges in terms of security, privacy, services provisioning, and network management. Blockchain, which is a technology for building distributed ledgers that provide an immutable log of transactions recorded in a distributed network, has become prominent recently as the underlying technology of cryptocurrencies and is revolutionizing data storage and processing in computer network systems. For future data-driven networks (DDNs), blockchain is considered as a promising solution to enable the secure storage, sharing, and analytics of data, privacy protection for users, robust, trustworthy network control, and decentralized routing and resource managements. However, many important challenges and open issues remain to be addressed before blockchain can be deployed widely to enable future DDNs. In this article, we present a survey on the existing research works on the application of blockchain technologies in computer networks and identify challenges and potential solutions in the applications of blockchains in future DDNs. We identify application scenarios in which future blockchain-empowered DDNs could improve the efficiency and security, and generally the effectiveness of network services.
APA, Harvard, Vancouver, ISO, and other styles
49

Gupta, Chaitanya, Ishita Johri, Kathiravan Srinivasan, Yuh-Chung Hu, Saeed Mian Qaisar, and Kuo-Yi Huang. "A Systematic Review on Machine Learning and Deep Learning Models for Electronic Information Security in Mobile Networks." Sensors 22, no. 5 (March 4, 2022): 2017. http://dx.doi.org/10.3390/s22052017.

Full text
Abstract:
Today’s advancements in wireless communication technologies have resulted in a tremendous volume of data being generated. Most of our information is part of a widespread network that connects various devices across the globe. The capabilities of electronic devices are also increasing day by day, which leads to more generation and sharing of information. Similarly, as mobile network topologies become more diverse and complicated, the incidence of security breaches has increased. It has hampered the uptake of smart mobile apps and services, which has been accentuated by the large variety of platforms that provide data, storage, computation, and application services to end-users. It becomes necessary in such scenarios to protect data and check its use and misuse. According to the research, an artificial intelligence-based security model should assure the secrecy, integrity, and authenticity of the system, its equipment, and the protocols that control the network, independent of its generation, in order to deal with such a complicated network. The open difficulties that mobile networks still face, such as unauthorised network scanning, fraud links, and so on, have been thoroughly examined. Numerous ML and DL techniques that can be utilised to create a secure environment, as well as various cyber security threats, are discussed. We address the necessity to develop new approaches to provide high security of electronic data in mobile networks because the possibilities for increasing mobile network security are inexhaustible.
APA, Harvard, Vancouver, ISO, and other styles
50

Chen, Chin-Ling, Jiaxin Yang, Woei-Jiunn Tsaur, Wei Weng, Chih-Ming Wu, and Xiaojun Wei. "Enterprise Data Sharing with Privacy-Preserved Based on Hyperledger Fabric Blockchain in IIOT’s Application." Sensors 22, no. 3 (February 2, 2022): 1146. http://dx.doi.org/10.3390/s22031146.

Full text
Abstract:
Internet of Things (IoT) technology is now widely used in energy, healthcare, services, transportation, and other fields. With the increase in industrial equipment (e.g., smart mobile terminals, sensors, and other embedded devices) in the Internet of Things and the advent of Industry 4.0, there has been an explosion of data generated that is characterized by a high volume but small size. How to manage and protect sensitive private data in data sharing has become an urgent issue for enterprises. Traditional data sharing and storage relies on trusted third-party platforms or distributed cloud storage, but these approaches run the risk of single-node failure, and third parties and cloud storage providers can be vulnerable to attacks that can lead to data theft. To solve these problems, this paper proposes a Hyperledger Fabric blockchain-based secure data transfer scheme for enterprises in the Industrial Internet of Things (IIOT). We store raw data in the IIoT in the InterPlanetary File System (IPFS) network after encryption and store the Keyword-index table we designed in Hyperledger Fabric blockchain, and enterprises share the data by querying the Keyword-index table. We use Fabric’s channel mechanism combined with our designed Chaincode to achieve privacy protection and efficient data transmission while using the Elliptic Curve Digital Signature Algorithm (ECDSA) to ensure data integrity. Finally, we performed security analysis and experiments on the proposed scheme, and the results show that overall the data transfer performance in the IPFS network is generally better than the traditional network, In the case of transferring 5 MB file size data, the transmission speed and latency of IPFS are 19.23 mb/s and 0.26 s, respectively, and the IPFS network is almost 4 times faster than the TCP/IP network while taking only a quarter of the time, which is more advantageous when transferring small files, such as data in the IIOT. In addition, our scheme outperforms the blockchain systems mainly used today in terms of both throughput, latency, and system overhead. The average throughput of our solution can reach 110 tps (transactions are executed per second), and the minimum throughput in experimental tests can reach 101 tps.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography