【摘 要】
:
To solve the security problems in single-cloud storage,multi-cloud storage system has been put forward in some literatures.However,when using multi-cloud,a user needs to be authenticated by different
【机 构】
:
Nankai-Baidu Joint Lab,College of Computer and Control Engineering,Nankai University,Tianjin 300071,
【出 处】
:
2014全国理论计算机科学学术年会
论文部分内容阅读
To solve the security problems in single-cloud storage,multi-cloud storage system has been put forward in some literatures.However,when using multi-cloud,a user needs to be authenticated by different cloud storage services,which is a time-consuming and tedious process.To avoid this,we propose a framework to store the authentication tokens of multiple cloud services securely.When the first time a user uses the multi-cloud storage system and finishes authorization to all cloud storage services involved,the encrypted tokens are entrusted to the framework.When the user using the multi-cloud storage system again,the tokens are retrieved and decrypted and then used to complete authentication to the cloud storage services.By this way,user experience is enhanced without loss of security.We design and implement a local secure token management scheme and a server-based scheme,and verify the two schemes in a multi-cloud storage system.
其他文献
It is well-known that model combination can improve prediction performance of regression model.We investigate the model combination of Support Vector Regression (SVR) with regularization path in this
This paper designed a kind of optimization algorithm for image registration.By combining with cultural particle swarm optimization (CPSO),a novel image registration algorithm is outlined in this paper
Profinite topology plays a key role in formal languages.Depending on the fact that Boolean algebra of regular languages is in one-to-one correspondence to clopen of profinite topological space,we prov
To further explore the up-to techniques for bisimulation in the coalgebra setting,we investigate a special kind of functor,i.e.,product functor in this paper.Specifically,when F is the product of n su
Motivated by a previous work showing a new NP-complete decision problem,the Multistage graph Simple Path problem (MSP) possesses a novel polynomial-time heuristic algorithm,which has undergone extensi
Spatio-Temporal properties are the intrinsic properties of Cyber-Physical System(CPS),the correlation in space and time between computing and physical entities should be fully considered in CPS modeli
With the rapid development of cloud computing,how to effectively improve the utilization of computing resources in a cloud becomes a difficult problem.Therefore,a large number of distributed and paral
Considering poor quality and high noise in medical data,we propose an ensemble classifier based on support vector machine (SVM) and apply this classifier to health identification.Health identification
An L(2,1)-labeling of a graph G is an assignment of nonnegative integers to the vertices of G such that adjacent vertices get numbers at least two apart,and vertices at distance two get distinct numbe
We investigate the unbalanced cut problems.A cut (A;B) is called unbalanced if the size of its smaller side is at most k (called k-size) or exactly k (called Ek-size),where k is an input parameter.An