Results 1 - 10
of
49
An Approach for Data Integrity Checking and Data Recovery in Cloud Data Storage
"... Abstract-Cloud Data Storage is an attractive mean for storing and managing the outsourced data. As data are remotely stored, user is not aware of any security threat. Data modification can done by the untrusted server, unauthorized user or by some malicious activity. So user needs to be ensured that ..."
Abstract
- Add to MetaCart
the metadata of constant size. It stores the metadata as the metadata of file adversary cannot access it. As file size of uploaded file is same as the original file results less communication overhead. Keywords- Cloud Data Storage, integrity checking,Network Coding, Data Recovery
TO CODE OR NOT TO CODE
, 2002
"... de nationalité suisse et originaire de Zurich (ZH) et Lucerne (LU) acceptée sur proposition du jury: ..."
Abstract
- Add to MetaCart
de nationalité suisse et originaire de Zurich (ZH) et Lucerne (LU) acceptée sur proposition du jury:
PolyUnpack: Automating the Hidden-Code Extraction of
"... Modern malware often hide the malicious portion of their program code by making it appear as data at compiletime and transforming it back into executable code at runtime. This obfuscation technique poses obstacles to researchers who want to understand the malicious behavior of new or unknown malware ..."
Abstract
- Add to MetaCart
malware instance can be made self-identifying when its runtime execution is checked against its static code model. In deriving our technique, we formally define the unpack-executing behavior that such malware exhibits and devise an algorithm for identifying and extracting its hidden-code. We also provide
A Graph Pattern Matching Approach to Software Architecture Recovery £
"... This paper presents a technique for recovering the high level design of legacy software systems based on pattern matching and user defined architectural patterns. Architectural patterns are represented using a description language that is mapped to an attributed relational graph and allows to specif ..."
Abstract
- Add to MetaCart
to specify the legacy system components and their data and control flow interactions. Such pattern descriptions are viewed as queries that are applied against an entity-relation graph that represents information extracted from the source code of the software system. A multi-phase branch and bound search
A Graph Pattern Matching Approach to Software Architecture Recovery
"... This paper presents a technique for recovering the high level design of legacy software systems based on pattern matching and user defined architectural patterns. Architectural patterns are represented using a description language that is mapped to an attributed relational graph and allows to specif ..."
Abstract
- Add to MetaCart
to specify the legacy system components and their data and control flow interactions. Such pattern descriptions are viewed as queries that are applied against an entity-relation graph that represents information extracted from the source code of the software system. A multi-phase branch and bound search
Enabling Data Reliability Security in Regenerating- Coding-based Cloud Storage
"... To protect outsourced information in cloud storage con to corruptions, adding defect acceptance to cloud storage, along side well-organized information responsibleness read-through and recovery procedures, becomes crucial. Make codes offer defect acceptance by marking information across multiple ser ..."
Abstract
- Add to MetaCart
servers, whereas mistreatment less restore transfer than established removal codes throughout failure recovery. Therefore, we tend to study the matter of remotely checking the responsibleness of regenerating-coded information con to corruptions underneath a real-life cloud storage setting. we tend
Survey on Efficient Data Integrity Techniques for Distributed Cloud Storage
"... Recent advances have given rise to the popularityand success of cloud computing. Cloud storage enables users to remotely store their data and enjoy the on-demand high quality cloud applications without the burden of local hardware and software management. It moves the application software and databa ..."
Abstract
- Add to MetaCart
, and efficient recovery for cloud storage becomes critical. Therefore, we study the problem of remotely checking the integrity of regenerating-coded data against corruptions under a real-life cloud storage setting. In this paper surveys the various protocols to check cloud data integrity and compares them based
Scalability Services in Cloud Computing Using Eyeos
"... Abstract: Cloud storage enables users to remotely store their data and benefit of the demand high quality cloud applications without the difficulty of local hardware and software management. Though the benefits are clear, such a service is also reliable to the users ’ physical possession of their ou ..."
Abstract
- Add to MetaCart
of their outsourced data, which inevitably poses new security risks towards the recovery of the data in cloud. In order to address this new problem and further achieve a secure and useful cloud storage service, we propose in this study a flexible distributed storage integrity mechanism, utilizing the homomorphic
unknown title
"... Sensor network software update management: a survey By Chih-Chieh Han, Ram Kumar, Roy Shea and Mani Srivastava*,† Software management is a critical task in the system administration of enterprise-scale networks. Enterprise-scale networks that have traditionally comprised of large clusters of worksta ..."
Abstract
- Add to MetaCart
conceptual model for the software update tools in WSNs. Three components of this model that we study are the execution environment at the sensor nodes, the software distribution protocol in the network and optimization of transmitted updates. We present the design space of each component and discuss in
Secure Geographic Routing in Wireless Sensor Networks
, 2013
"... the non-exclusive right to publish the Work electronically and in a non-commercial purpose make it accessible on the Internet. The Author warrants that he/she is the author to the Work, and warrants that the Work does not contain text, pictures or other material that violates copyright law. The Auth ..."
Abstract
- Add to MetaCart
the non-exclusive right to publish the Work electronically and in a non-commercial purpose make it accessible on the Internet. The Author warrants that he/she is the author to the Work, and warrants that the Work does not contain text, pictures or other material that violates copyright law. The Author shall, when transferring the rights of the Work to a third party (for example a publisher or a company); acknowledge the third party about this agreement. If the Author has signed a copyright agreement with a third party regarding the Work, the Author warrants hereby that he/she has obtained any necessary permission from this third party to let Chalmers University of Technology and University of Gothenburg store the Work electronically and make it accessible on the Internet.
Results 1 - 10
of
49