21 results on '"Storage Protection"'
Search Results
2. A method for acoustic storage pest detection and its challenges.
- Author
-
Müller-Blenkle, Christina, Simon, Ulrich, Meyer, Ralf, Szallies, Isabell, Lorenz, Daniela, Prozell, Sabine, Schöller, Matthias, and Adler, Cornel S.
- Subjects
- *
INSECT sounds , *GRAIN storage , *SOUND recordings , *AGRICULTURE , *PESTS - Abstract
Insects in grain can cause serious problems, not only because they feed on the grains. Mass reproduction also causes additional moisture and heat due to the insects' metabolism. This leads to favourable conditions for moulds, which can cause major losses and the formation of mycotoxins. It is therefore important to detect and treat an infestation at an early stage. The "Beetle Sound Tube" system was developed as an acoustic early detection system for insects in grain, which makes it possible to detect even very low levels of infestation and inform the storekeeper by e-mail. The acoustic system remains in the grain during the storage period, and permanently records insect sounds. Challenges were encountered in the development of this acoustic monitoring system, such as analysing very quiet insect sounds in a noisy agricultural environment. In addition, the amount of data collected and the speed of analysis had to be optimised to achieve justin- time detection of insects. The acoustic tube system was developed for silos, flat stores and big bags and is therefore widely applicable. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
3. A method for acoustic storage pest detection and its challenges
- Author
-
Christina Müller-Blenkle, Ulrich Simon, Ralf Meyer, Isabell Szallies, Daniela Lorenz, Sabine Prozell, Matthias Schöller, and Cornel S. Adler
- Subjects
Storage protection ,acoustics ,early detection ,insects ,"Beetle Sound Tube ,Agriculture (General) ,S1-972 - Abstract
Insects in grain can cause serious problems, not only because they feed on the grains. Mass reproduction also causes additional moisture and heat due to the insects' metabolism. This leads to favourable conditions for moulds, which can cause major losses and the formation of mycotoxins. It is therefore important to detect and treat an infestation at an early stage. The "Beetle Sound Tube" system was developed as an acoustic early detection system for insects in grain, which makes it possible to detect even very low levels of infestation and inform the storekeeper by e-mail. The acoustic system remains in the grain during the storage period, and permanently records insect sounds. Challenges were encountered in the development of this acoustic monitoring system, such as analysing very quiet insect sounds in a noisy agricultural environment. In addition, the amount of data collected and the speed of analysis had to be optimised to achieve just-in-time detection of insects. The acoustic tube system was developed for silos, flat stores and big bags and is therefore widely applicable.
- Published
- 2023
- Full Text
- View/download PDF
4. Modern Family: A Revocable Hybrid Encryption Scheme Based on Attribute-Based Encryption, Symmetric Searchable Encryption and SGX
- Author
-
Bakas, Alexandros, Michalas, Antonis, Akan, Ozgur, Editorial Board Member, Bellavista, Paolo, Editorial Board Member, Cao, Jiannong, Editorial Board Member, Coulson, Geoffrey, Editorial Board Member, Dressler, Falko, Editorial Board Member, Ferrari, Domenico, Editorial Board Member, Gerla, Mario, Editorial Board Member, Kobayashi, Hisashi, Editorial Board Member, Palazzo, Sergio, Editorial Board Member, Sahni, Sartaj, Editorial Board Member, Shen, Xuemin (Sherman), Editorial Board Member, Stan, Mircea, Editorial Board Member, Jia, Xiaohua, Editorial Board Member, Zomaya, Albert Y., Editorial Board Member, Chen, Songqing, editor, Choo, Kim-Kwang Raymond, editor, Fu, Xinwen, editor, Lou, Wenjing, editor, and Mohaisen, Aziz, editor
- Published
- 2019
- Full Text
- View/download PDF
5. MicroSCOPE: Enabling Access Control in Searchable Encryption with the Use of Attribute-Based Encryption and SGX
- Author
-
Michalas, Antonis, Bakas, Alexandros, Dang, Hai-Van, Zalitko, Alexandr, Goos, Gerhard, Founding Editor, Hartmanis, Juris, Founding Editor, Bertino, Elisa, Editorial Board Member, Gao, Wen, Editorial Board Member, Steffen, Bernhard, Editorial Board Member, Woeginger, Gerhard, Editorial Board Member, Yung, Moti, Editorial Board Member, Askarov, Aslan, editor, Hansen, René Rydhof, editor, and Rafnsson, Willard, editor
- Published
- 2019
- Full Text
- View/download PDF
6. Data Storage Protection of Community Medical Internet of Things
- Author
-
Zhang, Ziyang, Chen, Fulong, Ye, Heping, Zhu, Junru, Zhang, Cheng, Liu, Chao, Akan, Ozgur, Series editor, Bellavista, Paolo, Series editor, Cao, Jiannong, Series editor, Coulson, Geoffrey, Series editor, Dressler, Falko, Series editor, Ferrari, Domenico, Series editor, Gerla, Mario, Series editor, Kobayashi, Hisashi, Series editor, Palazzo, Sergio, Series editor, Sahni, Sartaj, Series editor, Shen, Xuemin Sherman, Series editor, Stan, Mircea, Series editor, Xiaohua, Jia, Series editor, Zomaya, Albert Y., Series editor, Wan, Jiafu, editor, Lin, Kai, editor, Zeng, Delu, editor, Li, Jin, editor, Xiang, Yang, editor, Liao, Xiaofeng, editor, Huang, Jiwu, editor, and Liu, Zheli, editor
- Published
- 2018
- Full Text
- View/download PDF
7. Storage Protection
- Author
-
Fujimoto, Kazuhisa, Kitsuregawa, Masaru, Section Editor, Liu, Ling, editor, and Özsu, M. Tamer, editor
- Published
- 2018
- Full Text
- View/download PDF
8. An improved Fully Homomorphic Encryption model based on N-Primes.
- Author
-
Mohammed, Mohammed Anwar and Abed, Fadhil Salman
- Subjects
CLOUD storage ,PRIME numbers ,CLOUD computing ,DATA encryption ,MATHEMATICAL models - Abstract
Cloud computing is the provision of computing services over the internet, which provides unlimited computing capabilities to its users. Cloud Service Providers (CSP) in the distanced places helps the users such as businesses and individuals to use its software and hardware means. The physical distance between the users and providers allows third parties to be capable of accessing the data which threats the privacy of the users. Thus, its security is the main concern when it comes to transform data from a locally owned storage to cloud storage. Cloud providers are required to save an encrypted version of user's data on their storage. The traditional encryption schemes have been used for data encryption prior to sending them to the provider. Thought, the secret key has to be provided by the users to the server so as to decrypt the information prior to the requirement of calculations. Therefore, the traditional cryptographic schemes cannot be used to process cloud's data. After the encryption of the information data are revealed to calculation in clouds, so confidentiality is not guaranteed and this result in difficulty in using cloud. In Homomorphic Encryptions calculation on ciphertext can be performed with no need for decryption. This paper, develops and designs a new mathematical model to achieve the characteristics of the Fully Homomorphic Encryption. The proposed model's security depends on the problem of Factorization the integers to their primary numbers. In this paper, instead of dealing with two prime numbers it is expanded to deal with n prime numbers. The security of the presumptive algorithm to be more efficient in front of the security challenges facing cloud computing. What distinguishes this proposed system is that it deals with the explicit text after converting it to the ASCII code instead of converting it to the binary system as it is in the existing systems, thus providing speed in the encryption process and returns the encryption. [ABSTRACT FROM AUTHOR]
- Published
- 2019
- Full Text
- View/download PDF
9. Storage Protection
- Author
-
Wada, Kenichi, LIU, LING, editor, and ÖZSU, M. TAMER, editor
- Published
- 2009
- Full Text
- View/download PDF
10. Modern Family: A Revocable Hybrid Encryption Scheme Based on Attribute-Based Encryption, Symmetric Searchable Encryption and SGX
- Author
-
Antonis Michalas and Alexandros Bakas
- Subjects
Computer science ,Cloud computing ,Access control ,Data_CODINGANDINFORMATIONTHEORY ,0102 computer and information sciences ,02 engineering and technology ,Encryption ,01 natural sciences ,Cloud Security ,0202 electrical engineering, electronic engineering, information engineering ,Hybrid cryptosystem ,Attribute-Based Encryption ,Policies ,Storage Protection ,Cloud computing security ,Revocation ,business.industry ,Access Control ,Symmetric Searchable Encryption ,010201 computation theory & mathematics ,Hybrid Encryption ,020201 artificial intelligence & image processing ,Attribute-based encryption ,business ,Cloud storage ,Computer network - Abstract
Secure cloud storage is considered as one of the most important issues that both businesses and end-users take into account before moving their private data to the cloud. Lately, we have seen some interesting approaches that are based either on the promising concept of Symmetric Searchable Encryption (SSE) or on the well-studied field of Attribute-Based Encryption (ABE). In the first case, researchers are trying to design protocols where users' data will be protected from both internal and external attacks without paying the necessary attention to the problem of user revocation. In the second case, existing approaches address the problem of revocation. However, the overall efficiency of these systems is compromised since the proposed protocols are solely based on ABE schemes and the size of the produced ciphertexts and the time required to decrypt grows with the complexity of the access formula. In this paper, we propose a hybrid encryption scheme that combines both SSE and ABE by utilizing the advantages of both these techniques. In contrast to many approaches, we design a revocation mechanism that is completely separated from the ABE scheme and solely based on the functionality offered by SGX.
- Published
- 2019
- Full Text
- View/download PDF
11. storage protection
- Author
-
Weik, Martin H. and Weik, Martin H.
- Published
- 2001
- Full Text
- View/download PDF
12. Domain based storage protection with secure access control for the cloud
- Author
-
Antonis Michalas, Christian Gehrmann, and Nicolae Paladi
- Subjects
Storage Protection ,Computer and Information Sciences ,Cloud computing security ,business.industry ,Computer science ,computer.internet_protocol ,Data_MISCELLANEOUS ,IaaS ,Data- och informationsvetenskap ,Access control ,Cloud computing ,Trusted Computing ,Cloud Computing ,Computer security ,computer.software_genre ,Data sharing ,Security ,Isolation (database systems) ,business ,computer ,XML ,Protection mechanism - Abstract
Cloud computing has evolved from a promising concept to one of the fastest growing segments of the IT industry. However, many businesses and individuals continue to view cloud computing as a technology that risks exposing their data to unauthorized users. We introduce a data confidentiality and integrity protection mechanism for Infrastructure-as-a-Service (IaaS) clouds, which relies on trusted computing principles to provide transparent storage isolation between IaaS clients. We also address the absence of reliable data sharing mechanisms, by providing an XML-based language framework which enables clients of IaaS clouds to securely share data and clearly define access rights granted to peers. The proposed improvements have been prototyped as a code extension for a popular cloud platform. InfraCloud
- Published
- 2014
13. Security Aspects of e-Health Systems Migration to the Cloud
- Author
-
Antonis Michalas, Nicolae Paladi, and Christian Gehrmann
- Subjects
Storage Protection ,Computer and Information Sciences ,Cloud computing security ,business.industry ,Computer science ,Best practice ,EHR Protection ,Cloud computing ,Data- och informationsvetenskap ,Cloud Computing ,Computer security ,computer.software_genre ,Server ,Management system ,e-Health ,Security ,Confidentiality ,business ,computer ,Healthcare system ,Protection mechanism - Abstract
As adoption of e-health solutions advances, new computing paradigms — such as cloud computing — bring the potential to improve efficiency in managing medical health records and help reduce costs. However, these opportunities introduce new security risks which can not be ignored. Based on our experience with deploying part of the Swedish electronic health records management system in an infrastructure cloud, we make an overview of major requirements that must be considered when migrating e-health systems to the cloud. Furthermore, we describe in-depth a new attack vector inherent to cloud deployments and present a novel data confidentiality and integrity protection mechanism for infrastructure clouds. This contribution aims to encourage exchange of best practices and lessons learned in migrating public e-health systems to the cloud.
- Published
- 2014
14. Domain based storage protection with secure access control for the cloud
- Abstract
Cloud computing has evolved from a promising concept to one of the fastest growing segments of the IT industry. However, many businesses and individuals continue to view cloud computing as a technology that risks exposing their data to unauthorized users. We introduce a data confidentiality and integrity protection mechanism for Infrastructure-as-a-Service (IaaS) clouds, which relies on trusted computing principles to provide transparent storage isolation between IaaS clients. We also address the absence of reliable data sharing mechanisms, by providing an XML-based language framework which enables clients of IaaS clouds to securely share data and clearly define access rights granted to peers. The proposed improvements have been prototyped as a code extension for a popular cloud platform., InfraCloud
- Published
- 2014
- Full Text
- View/download PDF
15. Security Aspects of e-Health Systems Migration to the Cloud
- Abstract
As adoption of e-health solutions advances, new computing paradigms - such as cloud computing - bring the potential to improve efficiency in managing medical health records and help reduce costs. However, these opportunities introduce new security risks which can not be ignored. Based on our experience with deploying part of the Swedish electronic health records management system in an infrastructure cloud, we make an overview of major requirements that must be considered when migrating e-health systems to the cloud. Furthermore, we describe in-depth a new attack vector inherent to cloud deployments and present a novel data confidentiality and integrity protection mechanism for infrastructure clouds. This contribution aims to encourage exchange of best practices and lessons learned in migrating public e-health systems to the cloud.
- Published
- 2014
- Full Text
- View/download PDF
16. Domain based storage protection with secure access control for the cloud
- Abstract
Cloud computing has evolved from a promising concept to one of the fastest growing segments of the IT industry. However, many businesses and individuals continue to view cloud computing as a technology that risks exposing their data to unauthorized users. We introduce a data confidentiality and integrity protection mechanism for Infrastructure-as-a-Service (IaaS) clouds, which relies on trusted computing principles to provide transparent storage isolation between IaaS clients. We also address the absence of reliable data sharing mechanisms, by providing an XML-based language framework which enables clients of IaaS clouds to securely share data and clearly define access rights granted to peers. The proposed improvements have been prototyped as a code extension for a popular cloud platform., InfraCloud
- Published
- 2014
- Full Text
- View/download PDF
17. Security Aspects of e-Health Systems Migration to the Cloud
- Abstract
As adoption of e-health solutions advances, new computing paradigms - such as cloud computing - bring the potential to improve efficiency in managing medical health records and help reduce costs. However, these opportunities introduce new security risks which can not be ignored. Based on our experience with deploying part of the Swedish electronic health records management system in an infrastructure cloud, we make an overview of major requirements that must be considered when migrating e-health systems to the cloud. Furthermore, we describe in-depth a new attack vector inherent to cloud deployments and present a novel data confidentiality and integrity protection mechanism for infrastructure clouds. This contribution aims to encourage exchange of best practices and lessons learned in migrating public e-health systems to the cloud.
- Published
- 2014
- Full Text
- View/download PDF
18. Domain-Based Storage Protection (DBSP) in Public Infrastructure Clouds
- Author
-
Christian Gehrmann, Nicolae Paladi, and Fredric Morenius
- Subjects
Public infrastructure ,Integrity protection ,Computer and Information Sciences ,Computer science ,Data confidentiality ,Data_MISCELLANEOUS ,Building blockes ,Public infrastructures ,Data- och informationsvetenskap ,Trusted Computing ,Trusted computing ,Computer security ,computer.software_genre ,Domain (software engineering) ,Infrastructure management ,Storage protection ,Infrastructure managements ,Confidentiality ,Relevance (information retrieval) ,Isolation (database systems) ,computer ,Protection mechanism - Abstract
Confidentiality and integrity of data in Infrastructure-as-a-Service (IaaS) environments increase in relevance as adoption of IaaS advances towards maturity. While current solutions assume a high degree of trust in IaaS provider staff and infrastructure management processes, earlier incidents have demon- strated that neither are impeccable. In this paper we introduce Domain-Based Storage Protection (DBSP) a data confidentiality and integrity protection mechanism for IaaS environments, which relies on trusted computing principles to provide transparent storage isolation between IaaS clients. We describe the building blocks of this mechanism and provide a set of detailed protocols for generation and handling of keys for confidentiality and integrity pro- tection of data stored by guest VM instances. The protocols assume an untrusted IaaS provider and aim to prevent both malicious and accidental faulty config- urations that could lead to breach of data confidentiality and integrity in IaaS deployments. InfraCloud
- Published
- 2013
19. Domain-Based Storage Protection (DBSP) in Public Infrastructure Clouds
- Abstract
Confidentiality and integrity of data in Infrastructure-as-a-Service (IaaS) environments increase in relevance as adoption of IaaS advances towards maturity. While current solutions assume a high degree of trust in IaaS provider staff and infrastructure management processes, earlier incidents have demon- strated that neither are impeccable. In this paper we introduce Domain-Based Storage Protection (DBSP) a data confidentiality and integrity protection mechanism for IaaS environments, which relies on trusted computing principles to provide transparent storage isolation between IaaS clients. We describe the building blocks of this mechanism and provide a set of detailed protocols for generation and handling of keys for confidentiality and integrity pro- tection of data stored by guest VM instances. The protocols assume an untrusted IaaS provider and aim to prevent both malicious and accidental faulty config- urations that could lead to breach of data confidentiality and integrity in IaaS deployments., InfraCloud
- Published
- 2013
- Full Text
- View/download PDF
20. Domain-Based Storage Protection (DBSP) in Public Infrastructure Clouds
- Abstract
Confidentiality and integrity of data in Infrastructure-as-a-Service (IaaS) environments increase in relevance as adoption of IaaS advances towards maturity. While current solutions assume a high degree of trust in IaaS provider staff and infrastructure management processes, earlier incidents have demon- strated that neither are impeccable. In this paper we introduce Domain-Based Storage Protection (DBSP) a data confidentiality and integrity protection mechanism for IaaS environments, which relies on trusted computing principles to provide transparent storage isolation between IaaS clients. We describe the building blocks of this mechanism and provide a set of detailed protocols for generation and handling of keys for confidentiality and integrity pro- tection of data stored by guest VM instances. The protocols assume an untrusted IaaS provider and aim to prevent both malicious and accidental faulty config- urations that could lead to breach of data confidentiality and integrity in IaaS deployments., InfraCloud
- Published
- 2013
- Full Text
- View/download PDF
21. Domain-Based Storage Protection (DBSP) in Public Infrastructure Clouds
- Abstract
Confidentiality and integrity of data in Infrastructure-as-a-Service (IaaS) environments increase in relevance as adoption of IaaS advances towards maturity. While current solutions assume a high degree of trust in IaaS provider staff and infrastructure management processes, earlier incidents have demon- strated that neither are impeccable. In this paper we introduce Domain-Based Storage Protection (DBSP) a data confidentiality and integrity protection mechanism for IaaS environments, which relies on trusted computing principles to provide transparent storage isolation between IaaS clients. We describe the building blocks of this mechanism and provide a set of detailed protocols for generation and handling of keys for confidentiality and integrity pro- tection of data stored by guest VM instances. The protocols assume an untrusted IaaS provider and aim to prevent both malicious and accidental faulty config- urations that could lead to breach of data confidentiality and integrity in IaaS deployments., InfraCloud
- Published
- 2013
- Full Text
- View/download PDF
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.