본문 바로가기 주메뉴 바로가기
국회도서관 홈으로 정보검색 소장정보 검색

초록보기

Today distributed data storage service are being widely used. However lack of proper means of security makes the user data vulnerable. In this work, we propose a Randomized Block Size (RBS) model for secure data storage in distributed environments. The model work with multifold block sizes encrypted with the Chinese Remainder Theorem-based RSA (C-RSA) technique for end-to-end security of multimedia data. The proposed RBS model has a key generation phase (KGP) for constructing asymmetric keys, and a rand generation phase (RGP) for applying optimal asymmetric encryption padding (OAEP) to the original message. The experimental results obtained with text and image files show that the post encryption file size is not much affected, and data is efficiently encrypted while storing at the distributed storage server (DSS). The parameters such as ciphertext size, encryption time, and throughput have been considered for performance evaluation, whereas statistical analysis like similarity measurement, correlation coefficient, histogram, and entropy analysis uses to check image pixels deviation. The number of pixels change rate (NPCR) and unified averaged changed intensity (UACI) were used to check the strength of the proposed encryption technique. The proposed model is robust with high resilience against eavesdropping, insider attack, and chosen-plaintext attack.

권호기사

권호기사 목록 테이블로 기사명, 저자명, 페이지, 원문, 기사목차 순으로 되어있습니다.
기사명 저자명 페이지 원문 목차
KI-HABS : key information guided hierarchical abstractive summarization Mengli Zhang, Gang Zhou, Wanting Yu, Wenfen Liu p. 4275-4291
(An) improved vibe algorithm of moving target extraction for night infrared surveillance video Zhiqiang Feng, Xiaogang Wang, Zhongfan Yang, Shaojie Guo, Xingzhong Xiong p. 4292-4307
Study on machine learning techniques for malware classification and detection Jaewoong Moon, Subin Kim, Jaeseung Song, Kyungshin Kim p. 4308-4325
Generative adversarial networks for single image with high quality image Liquan Zhao, Yupeng Zhang p. 4326-4344
Privacy-preserving and communication-efficient convolutional neural network prediction framework in mobile cloud computing Yanan Bai, Yong Feng, Wenyuan Wu p. 4345-4363
(An) efficient service function chains orchestration algorithm for mobile edge computing Xiulei Wang, Bo Xu, Fenglin Jin p. 4364-4384
(A) learning-based power control scheme for edge-based ehealth IoT systems Haoru Su, Xiaoming Yuan, Yujie Tang, Rui Tian, Enchang Sun, Hairong Yan p. 4385-4399
Design and implementation of a personal health record platform based on patient-consent blockchain technology Heongkyun Kim, Sang Min Lee, Hyunwoo Kwon, Eunmin Kim p. 4400-4419
Lightweight multiple scale-patch dehazing network for real-world hazy image Juan Wang, Chang Ding, Minghu Wu, Yuanyuan Liu, Guanhai Chen p. 4420-4438
Dual attention based image pyramid network for object detection Xiang Dong, Feng Liu, Huihui Bai, Yao Zhao p. 4439-4455
(A) new framework for person re-identification : integrated level feature pattern (ILEP) V.Manimaran, K.G.Srinivasagan, S.Gokul, I.Jeena Jacob, S.Baburenagarajan p. 4456-4475
(A) multi-category task for bitrate interval prediction with the target perceptual quality Zhenwei Yang, Liquan Shen p. 4476-4491
Sensor density for full-view problem in heterogeneous deployed camera sensor networks Zhimin Liu, Guiyan Jiang p. 4492-4507
Randomized block size (RBS) model for secure data storage in distributed server Keshav Sinha, Partha Paul, Amritanjali p. 4508-4530
(A) quantitative assessment method of network information security vulnerability detection risk based on the meta feature system of network security data Weiwei Lin, Chaofan Yang, Zeqing Zhang, Xingsi Xue, Reiko Haga p. 4531-4544
(A) distributed fog-based access control architecture for IoT Seham Alnefaie, Asma Cherif, Suhair Alshehri p. 4545-4566
Analytical approximation algorithm for the inverse of the power of the incomplete gamma function based on extreme value theory Shanshan Wu, Guobing Hu, Li Yang, Bin Gu p. 4567-4583
ODPM channel estimation method using multiple MRC and new reliability test in IEEE 802.11p systems with receive diversity Sungmook Lim, Gihoon Ryu, Kyunbyoung Ko p. 4584-4599
Advanced energy detector with correlated multiple antennas Sungtae Kim, Sungmook Lim p. 4600-4616
Spatial reuse in IEEE 802.11ax : whether and how to use in practice Deqing Zhu, Shenji Luan p. 4617-4632