期刊文献+
共找到110篇文章
< 1 2 6 >
每页显示 20 50 100
Can whole steps of grain production be outsourced? Empirical analysis based on the three provinces of Jiangsu,Jilin,and Sichuan in China
1
作者 Jiacheng Liu Shengzhi Mao +1 位作者 Qiufen Zheng Zhigang Xu 《Journal of Integrative Agriculture》 SCIE CSCD 2024年第1期336-347,共12页
Certain outsourcing services for agricultural management in China,such as pest control in grain production,have experienced prolonged sluggishness,contrasting with the relatively high level of outsourcing services obs... Certain outsourcing services for agricultural management in China,such as pest control in grain production,have experienced prolonged sluggishness,contrasting with the relatively high level of outsourcing services observed in harvesting,land preparation,and sowing.This study examines the feasibility of implementing whole-step outsourcing in grain production by conducting a case study of rice and maize production in Jiangsu,Jilin,and Sichuan provinces in China.The provision of outsourcing services hinges on two essential conditions:technological advancements fostering specialized production and economies of scale,coupled with a market size sufficient to realize the aforementioned potential economies of scale.The results showed that outsourcing pest control or harvesting services had varying economies of scale.The outsourcing services in pest control were less common than in harvesting services,and their marginal growth space of the economies of scale with technological change was also smaller.Determined by the operational characteristics of pest control itself,the market scale of its professional services is small.Therefore,achieving the whole-step outsourcing of grain production necessitates not only technological innovation but also effective policy interventions to overcome the constraints of market scale.Such interventions include(1)optimizing crop layouts between planning regions and reducing land fragmentation and(2)supplying timely and effective inter-regional agricultural information for service providers aided by information technology. 展开更多
关键词 outsourcing services economy of scale technical conditions market scale
下载PDF
Outsourced Privacy-Preserving kNN Classifier Model Based on Multi-Key Homomorphic Encryption
2
作者 Chen Wang Jian Xu +2 位作者 Jiarun Li Yan Dong Nitin Naik 《Intelligent Automation & Soft Computing》 SCIE 2023年第8期1421-1436,共16页
Outsourcing the k-Nearest Neighbor(kNN)classifier to the cloud is useful,yet it will lead to serious privacy leakage due to sensitive outsourced data and models.In this paper,we design,implement and evaluate a new sys... Outsourcing the k-Nearest Neighbor(kNN)classifier to the cloud is useful,yet it will lead to serious privacy leakage due to sensitive outsourced data and models.In this paper,we design,implement and evaluate a new system employing an outsourced privacy-preserving kNN Classifier Model based on Multi-Key Homomorphic Encryption(kNNCM-MKHE).We firstly propose a security protocol based on Multi-key Brakerski-Gentry-Vaikuntanathan(BGV)for collaborative evaluation of the kNN classifier provided by multiple model owners.Analyze the operations of kNN and extract basic operations,such as addition,multiplication,and comparison.It supports the computation of encrypted data with different public keys.At the same time,we further design a new scheme that outsources evaluation works to a third-party evaluator who should not have access to the models and data.In the evaluation process,each model owner encrypts the model and uploads the encrypted models to the evaluator.After receiving encrypted the kNN classifier and the user’s inputs,the evaluator calculated the aggregated results.The evaluator will perform a secure computing protocol to aggregate the number of each class label.Then,it sends the class labels with their associated counts to the user.Each model owner and user encrypt the result together.No information will be disclosed to the evaluator.The experimental results show that our new system can securely allow multiple model owners to delegate the evaluation of kNN classifier. 展开更多
关键词 outsourced privacy-preserving multi-key HE machine learning KNN
下载PDF
A secure outsourced Turing- equivalent computation scheme against semi-honest workers using fully homomorphic encryption
3
作者 方昊 胡爱群 《Journal of Southeast University(English Edition)》 EI CAS 2016年第3期267-271,共5页
A scheme that can realize homomorphic Turing- equivalent privacy-preserving computations is proposed, where the encoding of the Turing machine is independent of its inputs and running time. Several extended private in... A scheme that can realize homomorphic Turing- equivalent privacy-preserving computations is proposed, where the encoding of the Turing machine is independent of its inputs and running time. Several extended private information retrieval protocols based on fully homomorphic encryption are designed, so that the reading and writing of the tape of the Turing machine, as well as the evaluation of the transition function of the Turing machine, can be performed by the permitted Boolean circuits of fully homomorphic encryption schemes. This scheme overwhelms the Turing-machine-to- circuit conversion approach, which also implements the Turing-equivalent computation. The encoding of a Turing- machine-to-circuit conversion approach is dependent on both the input data and the worst-case runtime. The proposed scheme efficiently provides the confidentiality of both program and data of the delegator in the delegator-worker model of outsourced computation against semi-honest workers. 展开更多
关键词 Turing machine fully homomorphic encryption outsourced computation
下载PDF
TPTVer: A Trusted Third Party Based Trusted Verifier for Multi-Layered Outsourced Big Data System in Cloud Environment 被引量:3
4
作者 Jing Zhan Xudong Fan +2 位作者 Lei Cai Yaqi Gao Junxi Zhuang 《China Communications》 SCIE CSCD 2018年第2期122-137,共16页
Cloud computing is very useful for big data owner who doesn't want to manage IT infrastructure and big data technique details. However, it is hard for big data owner to trust multi-layer outsourced big data system... Cloud computing is very useful for big data owner who doesn't want to manage IT infrastructure and big data technique details. However, it is hard for big data owner to trust multi-layer outsourced big data system in cloud environment and to verify which outsourced service leads to the problem. Similarly, the cloud service provider cannot simply trust the data computation applications. At last,the verification data itself may also leak the sensitive information from the cloud service provider and data owner. We propose a new three-level definition of the verification, threat model, corresponding trusted policies based on different roles for outsourced big data system in cloud. We also provide two policy enforcement methods for building trusted data computation environment by measuring both the Map Reduce application and its behaviors based on trusted computing and aspect-oriented programming. To prevent sensitive information leakage from verification process,we provide a privacy-preserved verification method. Finally, we implement the TPTVer, a Trusted third Party based Trusted Verifier as a proof of concept system. Our evaluation and analysis show that TPTVer can provide trusted verification for multi-layered outsourced big data system in the cloud with low overhead. 展开更多
关键词 big data security outsourced ser-vice security MapReduce behavior trustedverification trusted third party
下载PDF
A Scheme for Verifying the Integrity of Outsourced Data
5
作者 WANG Xiaoming YU Fang +2 位作者 LIN Yanchun GAN Qingqing WU Daini 《China Communications》 SCIE CSCD 2015年第11期188-195,共8页
Unauthorized tampering with outsourced data can result in significant losses for both data owner and users.Data integrity therefore becomes an important factor in outsourced data systems.In this paper,we address this ... Unauthorized tampering with outsourced data can result in significant losses for both data owner and users.Data integrity therefore becomes an important factor in outsourced data systems.In this paper,we address this problem and propose a scheme for verifying the integrity of outsourced data.We first propose a new authenticated data structure for authenticating membership queries in sets based on accumulators,and then show how to apply it to the problem of verifying the integrity of outsourced data.We also prove that our scheme is secure under the q-strong DiffieHellman assumption.More importantly,our scheme has the constant cost communication,meanwhile keeping other complexity measures constant.Compared to previous schemes based on accumulators,our scheme reduces update cost and so improves previous schemes based on accumulators.In addition,the experimental comparison shows that our scheme outperforms the previous schemes. 展开更多
关键词 outsourced DATA authenticated datastructure DATA INTEGRITY CONSTANT COMPLEXITY
下载PDF
(r,QI)-Transform:Reversible Data Anonymity Based on Numeric Type of Data in Outsourced Database
6
作者 Iuon-Chang Lin Yang-Te Lee Chen-Yang Cheng 《Journal of Electronic Science and Technology》 CAS CSCD 2017年第3期222-230,共9页
An outsource database is a database service provided by cloud computing companies.Using the outsource database can reduce the hardware and software's cost and also get more efficient and reliable data processing capa... An outsource database is a database service provided by cloud computing companies.Using the outsource database can reduce the hardware and software's cost and also get more efficient and reliable data processing capacity.However,the outsource database still has some challenges.If the service provider does not have sufficient confidence,there is the possibility of data leakage.The data may has user's privacy,so data leakage may cause data privacy leak.Based on this factor,to protect the privacy of data in the outsource database becomes very important.In the past,scholars have proposed k-anonymity to protect data privacy in the database.It lets data become anonymous to avoid data privacy leak.But k-anonymity has some problems,it is irreversible,and easier to be attacked by homogeneity attack and background knowledge attack.Later on,scholars have proposed some studies to solve homogeneity attack and background knowledge attack.But their studies still cannot recover back to the original data.In this paper,we propose a data anonymity method.It can be reversible and also prevent those two attacks.Our study is based on the proposed r-transform.It can be used on the numeric type of attributes in the outsource database.In the experiment,we discussed the time required to anonymize and recover data.Furthermore,we investigated the defense against homogeneous attack and background knowledge attack.At the end,we summarized the proposed method and future researches. 展开更多
关键词 Index Terms--Cloud database data anonymity database privacy outsource database REVERSIBLE
下载PDF
DBT-PDP:Provable data possession with outsourced data batch transfer based on blockchain
7
作者 Chengming Yi Hua Zhang +1 位作者 Weiming Sun Jun Ding 《High-Confidence Computing》 EI 2024年第2期62-72,共11页
In the scenario of large-scale data ownership transactions,existing data integrity auditing schemes are faced with security risks from malicious third-party auditors and are inefficient in both calculation and communi... In the scenario of large-scale data ownership transactions,existing data integrity auditing schemes are faced with security risks from malicious third-party auditors and are inefficient in both calculation and communication,which greatly affects their practicability.This paper proposes a data integrity audit scheme based on blockchain where data ownership can be traded in batches.A data tag structure which supports data ownership batch transaction is adopted in our scheme.The update process of data tag does not involve the unique information of each data,so that any user can complete ownership transactions of multiple data in a single transaction through a single transaction auxiliary information.At the same time,smart contract is introduced into our scheme to perform data integrity audit belongs to third-party auditors,therefore our scheme can free from potential security risks of malicious third-party auditors.Safety analysis shows that our scheme is proved to be safe under the stochastic prediction model and k-CEIDH hypothesis.Compared with similar schemes,the experiment shows that communication overhead and computing time of data ownership transaction in our scheme is lower.Meanwhile,the communication overhead and computing time of our scheme is similar to that of similar schemes in data integrity audit. 展开更多
关键词 Data integrity Cloud outsourcing audit Data ownership batch transaction Blockchain Smart contract
下载PDF
SEOT: Secure dynamic searchable encryption with outsourced ownership transfer
8
作者 Jianwei LI Xiaoming WANG Qingqing GAN 《Frontiers of Computer Science》 SCIE EI CSCD 2023年第5期165-177,共13页
When one enterprise acquires another,the electronic data of the acquired enterprise will be transferred to the acquiring enterprise.In particular,if the data system of acquired enterprise contains a searchable encrypt... When one enterprise acquires another,the electronic data of the acquired enterprise will be transferred to the acquiring enterprise.In particular,if the data system of acquired enterprise contains a searchable encryption mechanism,the corresponding searchability will also be transferred.In this paper,we introduce the concept of Searchable Encryption with Ownership Transfer(SEOT),and propose a secure SEOT scheme.Based on the new structure of polling pool,our proposed searchable encryption scheme not only achieves efficient transfer of outsourced data,but also implements secure transfer of data searchability.Moreover,we optimize the storage cost for user to a desirable value.We prove our scheme can achieve the secure characteristics,then carry out the performance evaluation and experiments.The results demonstrate that our scheme is superior in efficiency and practicability. 展开更多
关键词 cloud computing ownership transfer searchable encryption forward secure outsourced computation
原文传递
Lightning-fast and privacy-preserving outsourced computation in the cloud 被引量:1
9
作者 Ximeng Liu Robert H.Deng +1 位作者 Pengfei Wu Yang Yang 《Cybersecurity》 CSCD 2020年第1期1-21,共21页
In this paper,we propose a framework for lightning-fast privacy-preserving outsourced computation framework in the cloud,which we refer to as LightCom.Using LightCom,a user can securely achieve the outsource data stor... In this paper,we propose a framework for lightning-fast privacy-preserving outsourced computation framework in the cloud,which we refer to as LightCom.Using LightCom,a user can securely achieve the outsource data storage and fast,secure data processing in a single cloud server different from the existing multi-server outsourced computation model.Specifically,we first present a general secure computation framework for LightCom under the cloud server equipped with multiple Trusted Processing Units(TPUs),which face the side-channel attack.Under the LightCom,we design two specified fast processing toolkits,which allow the user to achieve the commonly-used secure integer computation and secure floating-point computation against the side-channel information leakage of TPUs,respectively.Furthermore,our LightCom can also guarantee access pattern protection during the data processing and achieve private user information retrieve after the computation.We prove that the proposed LightCom can successfully achieve the goal of single cloud outsourced data processing to avoid the extra computation server and trusted computation server,and demonstrate the utility and the efficiency of LightCom using simulations. 展开更多
关键词 PRIVACY-PRESERVING Secure outsourced computation Homomorphic encryption Secret sharing technique Against side-channel attack
原文传递
Strategic Contracting for Software Upgrade Outsourcing in Industry 4.0
10
作者 Cheng Wang Zhuowei Zheng 《Computer Modeling in Engineering & Sciences》 SCIE EI 2024年第2期1563-1592,共30页
The advent of Industry 4.0 has compelled businesses to adopt digital approaches that combine software toenhance production efficiency. In this rapidly evolving market, software development is an ongoing process thatmu... The advent of Industry 4.0 has compelled businesses to adopt digital approaches that combine software toenhance production efficiency. In this rapidly evolving market, software development is an ongoing process thatmust be tailored to meet the dynamic needs of enterprises. However, internal research and development can beprohibitively expensive, driving many enterprises to outsource software development and upgrades to externalservice providers. This paper presents a software upgrade outsourcing model for enterprises and service providersthat accounts for the impact of market fluctuations on software adaptability. To mitigate the risk of adverseselection due to asymmetric information about the service provider’s cost and asymmetric information aboutthe enterprise’s revenues, we propose pay-per-time and revenue-sharing contracts in two distinct informationasymmetry scenarios. These two contracts specify the time and transfer payments for software upgrades. Througha comparative analysis of the optimal solutions under the two contracts and centralized decision-making withfull-information, we examine the characteristics of the solutions under two information asymmetry scenarios andanalyze the incentive effects of the two contracts on the various stakeholders. Overall, our study offers valuableinsights for firms seeking to optimize their outsourcing strategies and maximize their returns on investment insoftware upgrades. 展开更多
关键词 Software upgrade outsourcing the principal-agent information asymmetry reverse selection contract design
下载PDF
Trusted Certified Auditor Using Cryptography for Secure Data Outsourcing and Privacy Preservation in Fog-Enabled VANETs
11
作者 Nagaraju Pacharla K.Srinivasa Reddy 《Computers, Materials & Continua》 SCIE EI 2024年第5期3089-3110,共22页
With the recent technological developments,massive vehicular ad hoc networks(VANETs)have been established,enabling numerous vehicles and their respective Road Side Unit(RSU)components to communicate with oneanother.Th... With the recent technological developments,massive vehicular ad hoc networks(VANETs)have been established,enabling numerous vehicles and their respective Road Side Unit(RSU)components to communicate with oneanother.The best way to enhance traffic flow for vehicles and traffic management departments is to share thedata they receive.There needs to be more protection for the VANET systems.An effective and safe methodof outsourcing is suggested,which reduces computation costs by achieving data security using a homomorphicmapping based on the conjugate operation of matrices.This research proposes a VANET-based data outsourcingsystem to fix the issues.To keep data outsourcing secure,the suggested model takes cryptography models intoaccount.Fog will keep the generated keys for the purpose of vehicle authentication.For controlling and overseeingthe outsourced data while preserving privacy,the suggested approach considers the Trusted Certified Auditor(TCA).Using the secret key,TCA can identify the genuine identity of VANETs when harmful messages aredetected.The proposed model develops a TCA-based unique static vehicle labeling system using cryptography(TCA-USVLC)for secure data outsourcing and privacy preservation in VANETs.The proposed model calculatesthe trust of vehicles in 16 ms for an average of 180 vehicles and achieves 98.6%accuracy for data encryption toprovide security.The proposedmodel achieved 98.5%accuracy in data outsourcing and 98.6%accuracy in privacypreservation in fog-enabled VANETs.Elliptical curve cryptography models can be applied in the future for betterencryption and decryption rates with lightweight cryptography operations. 展开更多
关键词 Vehicular ad-hoc networks data outsourcing privacy preservation CRYPTOGRAPHY keys trusted certified auditors data security
下载PDF
Access control scheme with tracing for outsourced databases
12
作者 Xiaoming WANG Guoxiang YAO 《Frontiers of Computer Science》 SCIE EI CSCD 2012年第6期677-685,共9页
To manage dynamic access control and deter pi- rate attacks on outsourced databases, a dynamic access control scheme with tracing is proposed. In our scheme, we introduce the traitor tracing idea into outsource databa... To manage dynamic access control and deter pi- rate attacks on outsourced databases, a dynamic access control scheme with tracing is proposed. In our scheme, we introduce the traitor tracing idea into outsource databases, and employ a polynomial function and filter function as the basic means of constructing encryption and decryption procedures to reduce computation, communication, and storage overheads. Compared to previous access control schemes for outsourced databases, our scheme can not only protect sensitive data from leaking and perform scalable encryption at the server side without shipping the outsourced data back to the data owner when group membership is changed, but also provide trace-and-revoke features. When malicious users clone and sell their decryption keys for profit, our scheme can trace the decryption keys to the malicious users and revoke them. Furthermore, our scheme avoids massive message exchanges for establishing the decryption key between the data owner and the user. Compared to previously proposed publickey traitor tracing schemes, our scheme can simultaneously achieve full collusion resistance, full recoverability, full revocation, and black-box traceability. The proof of security and analysis of performance show that our scheme is secure and efficient. 展开更多
关键词 outsourced databases access control malicious user tracing adding and revoking users
原文传递
Lightning-fast and privacy-preserving outsourced computation in the cloud
13
作者 Ximeng Liu Robert HDeng +1 位作者 Pengfei Wu Yang Yang 《Cybersecurity》 2018年第1期48-68,共21页
In this paper,we propose a framework for lightning-fast privacy-preserving outsourced computation framework in the cloud,which we refer to as LightCom.Using LightCom,a user can securely achieve the outsource data stor... In this paper,we propose a framework for lightning-fast privacy-preserving outsourced computation framework in the cloud,which we refer to as LightCom.Using LightCom,a user can securely achieve the outsource data storage and fast,secure data processing in a single cloud server different from the existing multi-server outsourced computation model.Specifically,we first present a general secure computation framework for LightCom under the cloud server equipped with multiple Trusted Processing Units(TPUs),which face the side-channel attack.Under the LightCom,we design two specified fast processing toolkits,which allow the user to achieve the commonly-used secure integer computation and secure floating-point computation against the side-channel information leakage of TPUs,respectively.Furthermore,our LightCom can also guarantee access pattern protection during the data processing and achieve private user information retrieve after the computation.We prove that the proposed LightCom can successfully achieve the goal of single cloud outsourced data processing to avoid the extra computation server and trusted computation server,and demonstrate the utility and the efficiency of LightCom using simulations. 展开更多
关键词 PRIVACY-PRESERVING Secure outsourced computation Homomorphic encryption Secret sharing technique Against side-channel attack
原文传递
Research on the Status Quo and Countermeasures of Human Resource Management Outsourcing in China’s Pharmaceutical Enterprises
14
作者 Wang Jianing Wang Shuling 《Asian Journal of Social Pharmacy》 2024年第1期64-71,共8页
Objective To explore the current situation of human resource management outsourcing in China’s pharmaceutical enterprises,and to put forward some suggestions for enterprises and the government.Methods The current sit... Objective To explore the current situation of human resource management outsourcing in China’s pharmaceutical enterprises,and to put forward some suggestions for enterprises and the government.Methods The current situation of human resource management outsourcing in China’s pharmaceutical enterprises was analyzed through the method of literature research.Results and Conclusion At present,the status of human resource management outsourcing in China’s pharmaceutical companies is that the level of human resource outsourcing companies is not high,and there are no relevant industry norms and laws.The information asymmetry between pharmaceutical enterprises and outsourcing companies results in adverse selection and moral hazard.Besides,the different culture of pharmaceutical enterprises and outsourcing companies leads to inefficient communication between enterprises and employee.To solve these problems,the government should promote and improve industry norms and laws to regulate the market.In addition,enterprises should clarify the motivation for outsourcing and make good decision on the outsourcing content.Meanwhile,enterprises should strengthen communication with employees to eliminate employees’concerns. 展开更多
关键词 pharmaceutical enterprise human resource management outsourcing countermeasure research
下载PDF
CAPACITY ALLOCATION AND COORDINATION ISSUES FOR THE TIMELY PROCESSING OF OUTSOURCED OPERATIONS 被引量:1
15
作者 Tolga Aydinliyim Xiaoqiang Cai George L.Vairaktarakis 《Journal of Systems Science and Systems Engineering》 SCIE EI CSCD 2014年第3期300-312,共13页
We consider dynamic capacity booking problems faced by multiple manufacturers each outsourcing certain operations to a common third-party firm. Each manufacturer, upon observing the current state of the third-party sc... We consider dynamic capacity booking problems faced by multiple manufacturers each outsourcing certain operations to a common third-party firm. Each manufacturer, upon observing the current state of the third-party schedule, books capacity with the objective to jointly minimize holding costs that result from early deliveries, tardiness penalties due to late deliveries, and third-party capacity booking costs. When making a reservation, each manufacturer evaluates two alternative courses of action: (i) reserving capacity not yet utilized by other manufactures who booked earlier; or (ii) forming a coalition with a subset or all of other manufacturers to achieve a schedule minimizing coalition costs, i.e., a centralized schedule for that coalition. The latter practice surely benefits the coalition as a whole; however, some manufacturers may incur higher costs if their operations are either pushed back too much, or delivered too early. For this reason, a cost allocation scheme making each manufacturer no worse than they would be when acting differently (i.e., participating in a smaller coalition or acting on their own behalf,) must accompany centralized scheduling for the coalition. We model this relationship among the manufacturers as a cooperative game with transferable utility, and present optimal and/or heuristic algorithms to attain individually and eoalitionally optimal schedules as well as a linear program formulation to find a core allocation of the manufacturers' costs. 展开更多
关键词 OUTSOURCING SCHEDULING capacity allocation cooperative games
原文传递
Towards privacy-preserving dynamic deep packet inspection over outsourced 被引量:2
16
作者 Chunxiao Li Yu Guo Xia Wang 《High-Confidence Computing》 2022年第1期1-8,共8页
The prosperity of network function virtualization(NFV)pushes forward the paradigm of migrating in-house middleboxes to third-party providers,i.e.,software(virtualized)middlebox services.A lot of enterprises have outso... The prosperity of network function virtualization(NFV)pushes forward the paradigm of migrating in-house middleboxes to third-party providers,i.e.,software(virtualized)middlebox services.A lot of enterprises have outsourced traffic processing such as deep packet inspection(DPI),traffic classification,and load balancing to middleboxes provided by cloud providers.However,if the traffic is forwarded to the cloud provider without careful processing,it will cause privacy leakage,as the cloud provider has all the rights to access the data.To solve the security issue,recent efforts are made to design secure middleboxes that can directly conduct network functions over encrypted traffic and middlebox rules.However,security concerns from dynamic operations like dynamic DPI and rule updates are still not yet fully addressed.In this paper,we propose a privacy-preserving dynamic DPI scheme with forward privacy for outsourced middleboxes.Our design can enable cloud side middlebox to conduct secure packet inspection over encrypted traffic data.Besides,the middlebox providers cannot analyze the relationship between the newly added rules and the previous data.Several recent papers have proven that it is a strong property that resist adaptive attacks.Furthermore,we design a general method to inspect stateful packets while still ensuring the state privacy protection.We formally define and prove the security of our design.Finally,we implement a system prototype and analyze the performance from experimental aspects.The evaluation results demonstrate our scheme is effective and efficient. 展开更多
关键词 DPI outsourcing Network function virtualization Dynamic searchable symmetric encryption
下载PDF
Verifiable Auditing Protocol with Proxy Re-Encryption for Outsourced Databases in Cloud
17
作者 GAO Ziyuan WANG Baocang +2 位作者 LIU Hequn LU Ke ZHAN Yu 《Wuhan University Journal of Natural Sciences》 CAS CSCD 2018年第2期120-128,共9页
As a new computing paradigm, outsourcing computing provides inexpensive, on-demand, convenient storage and computing services for cloud clients. For the security of outsourcing databases to the cloud, it is important ... As a new computing paradigm, outsourcing computing provides inexpensive, on-demand, convenient storage and computing services for cloud clients. For the security of outsourcing databases to the cloud, it is important to allow the user to verify the query results returned by the cloud server. So far, tremendous efforts have been carried out to study secure outsourcing computing. The existing scheme supports that the user can detect the correctness and completeness of the query results even if the cloud server returns an empty set. However, since the data owner performs the database encryption operations and uploads the encrypted database to the cloud server, they require the user to request the data owner to decrypt the query results. In this paper, we propose a new scheme, which can accurately verify the search results. Meanwhile, the users can decrypt the query results independently. Furthermore, the proposed scheme supports a large number of data owners to upload their encrypted database to the cloud server, and it can efficiently verify the query results. Besides, we can prove that our proposed solution can achieve the desired security properties. 展开更多
关键词 outsourcing computing verifiable auditing proxyre-encryption bilinear aggregate signature
原文传递
Comprehensive evaluation of key management hierarchies for outsourced data
18
作者 Naveen Kumar Anish Mathuria 《Cybersecurity》 CSCD 2019年第1期150-166,共17页
Key management is an essential component of a cryptographic access control system with a large number of resources.It manages the secret keys assigned to the system entities in such a way that only authorized users ca... Key management is an essential component of a cryptographic access control system with a large number of resources.It manages the secret keys assigned to the system entities in such a way that only authorized users can access a resource.Read access control allows read access of a resource by the authorized users and disallows others.An important objective of a key management is to reduce the secret key storage with each authorized user.To this end,there exist two prominent types of key management hierarchy with single key storage per user used for read access control in data outsourcing scenario:user-based and resource-based.In this work,we analyze the two types of hierarchy with respect to static hierarchy characteristics and dynamic operations such as adding or revoking user authorization.Our analysis shows that the resource-based hierarchies can be a better candidate which is not given equal emphasis in the literature.A new heuristic for minimizing the key management hierarchy is introduced that makes it practical in use even for a large number of users and resources.The performance evaluation of dynamic operations such as adding or revoking a user’s read subscription is shown experimentally to support our analytical results. 展开更多
关键词 Key management hierarchy Data outsourcing Access control
原文传递
Comprehensive evaluation of key management hierarchies for outsourced data
19
作者 Naveen Kumar Anish Mathuria 《Cybersecurity》 2018年第1期425-441,共17页
Key management is an essential component of a cryptographic access control system with a large number of resources.It manages the secret keys assigned to the system entities in such a way that only authorized users ca... Key management is an essential component of a cryptographic access control system with a large number of resources.It manages the secret keys assigned to the system entities in such a way that only authorized users can access a resource.Read access control allows read access of a resource by the authorized users and disallows others.An important objective of a key management is to reduce the secret key storage with each authorized user.To this end,there exist two prominent types of key management hierarchy with single key storage per user used for read access control in data outsourcing scenario:user-based and resource-based.In this work,we analyze the two types of hierarchy with respect to static hierarchy characteristics and dynamic operations such as adding or revoking user authorization.Our analysis shows that the resource-based hierarchies can be a better candidate which is not given equal emphasis in the literature.A new heuristic for minimizing the key management hierarchy is introduced that makes it practical in use even for a large number of users and resources.The performance evaluation of dynamic operations such as adding or revoking a user’s read subscription is shown experimentally to support our analytical results. 展开更多
关键词 Key management hierarchy Data outsourcing Access control
原文传递
Breeding against mycorrhizal symbiosis:Modern cotton (Gossypium hirsutum L.) varieties perform more poorly than older varieties except at very high phosphorus supply levels 被引量:1
20
作者 WANG Xin-xin ZHANG Min +2 位作者 SHENG Jian-dong FENG Gu Thomas W.KUYPER 《Journal of Integrative Agriculture》 SCIE CAS CSCD 2023年第3期701-715,共15页
Cotton (Gossypium hirsutum L.) is an importantfiber cash crop,but its root traits related to phosphorus (P) acquisition,including mycorrhizal root traits,are poorly understood.Eight cotton varieties bred in northweste... Cotton (Gossypium hirsutum L.) is an importantfiber cash crop,but its root traits related to phosphorus (P) acquisition,including mycorrhizal root traits,are poorly understood.Eight cotton varieties bred in northwestern China that were released between 1950 and 2013 were grown in pots with or without one arbuscular mycorrhizal fungal (AMF) species(Funneliformis mosseae) at three P supply levels (0,50 and 300 mg P as KH_(2)PO_(4)kg^(-1)).Eleven root traits were measured and calculated after 7 wk of growth.The more recent accessions had smaller root diameters,acquired less P and produced less biomass,indicating an (inadvertent) varietal selection for thinner roots that provided less cortical space for AMF,which then increased the need for a high P fertilizer level.At the two lower P levels,the mycorrhizal plants acquired more P and produced more biomass than non-mycorrhizal plants (3.2 vs.0.9 mg P per plant;1.8 vs.0.9 g biomass per plant at P_(0);14.5 vs.1.7 mg P per plant;and 4.7 vs.1.6 g biomass per plant at P_(50)).At the highest P level,the mycorrhizal plants acquired more P than non-mycorrhizal plants (18.8 vs.13.4 mg per P plant),but there was no difference in biomass (6.2 vs.6.3 g per plant).At the intermediate P level,root diameter was significantly positively correlated with shoot biomass,P concentration and the P content of mycorrhizal plants.The results of our study support the importance of the outsourcing model of P acquisition in the root economics space framework.Inadvertent varietal selection in the last decades,resulting in thinner roots and a lower benefit from AMF,has led to a lower productivity of cotton varieties at moderate P supply (i.e.,when mycorrhizal,the average biomass of older varieties 5.0 g per plant vs.biomass of newer varieties 4.4 g per plant),indicating the need to rethink cotton breeding efforts in order to achieve high yields without very high P input.One feasible way to solve the problem of inadvertent varietal selection for cotton is to be aware of the trade-offs between the root do-it-yourself strategy and the outsourcing towards AMF strategy,and to consider both morphological and mycorrhizal root traits when breeding cotton varieties. 展开更多
关键词 cotton varieties plant breeding arbuscular mycorrhizal fungi root economics space OUTSOURCING phosphorus acquisition
下载PDF
上一页 1 2 6 下一页 到第
使用帮助 返回顶部