- 1、有哪些信誉好的足球投注网站(book118)网站文档一经付费(服务费),不意味着购买了该文档的版权,仅供个人/单位学习、研究之用,不得用于商业用途,未经授权,严禁复制、发行、汇编、翻译或者网络传播等,侵权必究。。
- 2、本站所有内容均由合作方或网友上传,本站不对文档的完整性、权威性及其观点立场正确性做任何保证或承诺!文档内容仅供研究参考,付费前请自行鉴别。如您付费,意味着您自己接受本站规则且自行承担风险,本站不退款、不进行额外附加服务;查看《如何避免下载的几个坑》。如果您已付费下载过本站文档,您可以点击 这里二次下载。
- 3、如文档侵犯商业秘密、侵犯著作权、侵犯人身权等,请点击“版权申诉”(推荐),也可以打举报电话:400-050-0827(电话支持时间:9:00-18:30)。
- 4、该文档为VIP文档,如果想要下载,成为VIP会员后,下载免费。
- 5、成为VIP后,下载本文档将扣除1次下载权益。下载后,不支持退款、换文档。如有疑问请联系我们。
- 6、成为VIP后,您将拥有八大权益,权益包括:VIP文档下载权益、阅读免打扰、文档格式转换、高级专利检索、专属身份标志、高级客服、多端互通、版权登记。
- 7、VIP文档为合作方或网友上传,每下载1次, 网站将根据用户上传文档的质量评分、类型等,对文档贡献者给予高额补贴、流量扶持。如果你也想贡献VIP文档。上传文档
查看更多
云存储中一种抗窃听攻击的弱安全再生码WeaklySecure-中国云计算
36 5 Vol.36 No.5 2014 5 Journal of Electronics Information Technology May 2014 * ( 410073) All-or-Nothing All-or-Nothing TP393; TP309 A 1009-5896(2014)05-1221-08 DOI: 10.3724/SP.J.1146.2013.01035 Weakly Secure Regenerating Codes for Cloud Storage against Eavesdropper Liu Jian Wang Hui-mei Xian Ming Huang Kun (State Key Laboratory of Complex Electromagnetic Environment Effects on Electronics and Information System, National University of Defense Technology, Changsha 410073, China) Abstract: Erasure codes and regenerating codes can guarantee data reliability, but fail to provide data confidential when some nodes are observed by eavesdropper. Thus, two regenerating code schemes satisfying the security property against the eavesdropper are proposed in this paper. Combining the All-or-Nothing transform and exact repair regenerating codes, the proposed schemes not only ensure that an intruder eavesdropping limited number of nodes are unable to obtain any meaningful information about the original data symbols, but also provide data reliability with low repair bandwidth. Furthermore, a general construction method is presented, and the security is proved, and the performance of the proposed scheme is evaluated by a serial of experiments. The result shows that the proposed schemes achieve faster encode/decode procedures and better secrecy capacity compared with other secure regenerating coding schemes or threshold storage schemes. Key words: Cloud storage; Regenerating codes; Security; Eavesdropper; All-or-Nothing transform [4] 1
您可能关注的文档
最近下载
- GB_T5783-2016六角头螺栓全螺纹.docx VIP
- 川教版(2024)七年级上册信息科技全册教案.docx
- (公共基础知识)河北省机关事业单位工人技能等级考试.docx VIP
- DONA NOBIS PACEM 3 VOCES(莫扎特)原版 正谱 五线谱 钢琴谱.pdf VIP
- 加气站安全现状评价报告 .pdf VIP
- PLC控制系统合同协议书.pdf VIP
- 7 1 第七讲地面变形地质灾害 地裂缝.ppt VIP
- 职业卫生评价考试真题.pdf VIP
- DB50_T1816-2025功能型无人车自动驾驶功能场地试验方法及要求.docx VIP
- 06G901-1混凝土结构施工钢筋排布规则与构造详图(现浇混凝土框架、剪力墙、框架-剪力墙).pdf
文档评论(0)