首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 46 毫秒
1.
余文斌  郑宝玉  赵生妹 《信号处理》2014,30(12):1473-1478
假设多个用户分别根据各自持有的函数对共享数据进行计算,用户之间采用互相通信的方式完成一个共同的目标任务。本文基于一个通用的判别函数模型,给出对于上述任务,采用经典最优算法下的经典通信复杂度。然后,以Grover算法为基础,文中构造了适用于前述任务的量子分布式算法,并给出相应的量子通信复杂度。研究表明,量子算法的性能取决于函数定义域与用户数的无穷大阶的差距。量子通信复杂度较之经典情形最多将会有二次级别的降低。   相似文献   

2.
段新东  马建峰 《通信学报》2011,32(5):169-174
提出了一种高效的可信网络存储协议,协议只需两轮交互就实现了服务器与用户间的身份认证和密钥协商,同时在协议的第一轮交互中实现了对客户端平台身份的认证和平台完整性校验,改进了原来系统服务器遭受攻击易导致整个系统瘫痪的缺点,提高了系统的可靠性和协议的执行效率,在此基础上建立了用户与智能磁盘间的安全信道。最后利用CK模型证明了协议是SK安全的,用户与磁盘间的信道是安全信道,提高了系统数据的保密性、完整性和不可抵赖性。  相似文献   

3.
《电信技术》2008,(3):72
HP公司近日发布一款专为中型企业设计的、易于管理的虚拟磁盘阵列,可使客户在使用存储区域网络(SAN)时降低成本和复杂度。HP Storage Works 4400企业虚拟阵列(EVA4400)提供了高性能和可用性特性、虚拟化能力以及先进的软件配置,是中型企业的理想选择,尤其是满足企业在SNA环境中用经济的方式管理大量数据的需求。  相似文献   

4.
可计算的图像复杂度评价是让计算机模拟人类视觉感知,从而对图像视觉复杂度进行决策的研究,该研究属于多学科交叉的创新性研究课题,在图像工程领域具有重要意义.本文针对可计算的图像复杂度评价方法进行了全面的梳理和分析,文中首先回顾了图像复杂度的应用领域,并详细阐述了图像复杂度评价方法,从信息论、图像压缩理论、图像特征分析、眼动数据等方面进行总结;随后,着重阐述基于图像特征的图像复杂度评价方法中所使用的图像特征;归纳图像复杂度建模中的分类和回归问题;最后,总结当前图像视觉复杂度评价方法存在的问题和挑战,展望图像复杂度的计算化发展方向.  相似文献   

5.
刘伟峰  庄奕琪  郭锋   《电子器件》2007,30(5):1670-1672
在研究了离散余弦变换的频域分辨率与时域分辨率的转换关系的基础上,提出了一种基于自适应降阶IDCT的低复杂度视频解码方法.根据DCT系数块中非零系数的个数,对DCT系数进行自适应降采样.对降采样后的DCT系数块进行降阶的IDCT变换,再对变换后的块在时域中进行线性插值,最终实现解码.降阶IDCT处理降低的解码时间弥补了插值耗费的时间,还使解码的整体复杂度降低.测试结果表明,该方法解码时间可以节省60%-80%,而PSNR损失仅为0.3~0.7dB.  相似文献   

6.
本文着重介绍了软件复杂度的历史,现状及测试方法。特别提到了McCabe复杂度,Halstead复杂度,Line Count复杂度的原理、优点及应用。  相似文献   

7.
随着计算机可重构器件的飞速发展以及迅速普及,其内部存储内容可以实现全面共享的可重构计算机软硬件通信已经隧慢地变成世界计算机领域所瞩目的一个问题。由于可重构器件不单单具备硬件电路所拥有的超高计算效率,还可以与此同时具备可进行多次分段编程等硬件电路所不具备的特点,硬件任务以及软件任务近似相等的这一概念逐渐在计算机系统设计的过程中普及开来,共享存储可以以比较灵活的方式来进行一些十分复杂缜密的大型运算工作,并且还打破了常规在设计的过程中将计算机的软硬件协同设计模块进行了大型的修改,这为计算机领域带来了十分巨大的改变。  相似文献   

8.
李景峰  潘恒  郭卫锋 《通信学报》2013,34(Z1):235-239
针对EPC信息服务存在的安全问题,提出一种EPC信息服务安全通信方案ESCM,方案使用数字签名、消息认证码等安全机制,实现了分属查询应用程序和外域EPCIS服务器之间的相互认证服务与密钥协商服务,能够保护EPCIS通信的机密性和完整性。利用Canetti-Krawczyk模型证明了ESCM方案是会话密钥安全的。此外,性能分析表明该方案的通信开销、计算开销较少,适合EPC网络特性。  相似文献   

9.
Turbo均衡是一种通过反复均衡和信道译码来提高接收性能的迭代接收机算法。通常的Turbo均衡算法采用均衡与软输出译码的迭代运算,由于均衡和译码的重复计算,使得复杂度大大提高。文中提出了2种降低复杂度的Turbo均衡器:第一种采用软判决维特比译码,第二种采用软输入硬输出的维特比译码。通过仿真表明,这2种算法在几乎没有损失接收性能的情况下,大大降低了计算复杂度,并且第二种的性能要好于第一种。  相似文献   

10.
随着信息技术的不断完善和发展,计算机已经成为生活和工作当中不可缺少的一部分,借助计算机进行数据的处理和优化,能够在很大程度上提高信息处理的效率.在计算机进行数据处理的过程当中,人们对于计算机处理数据的效率以及使用性能有了越来越多的要求.所以可重构器件得到了快速的发展,共享存储可重构计算机软硬件通信逐渐成为国际计算机领域新的风向标.可重构器件不仅能够实现多编程任务,同时还具有良好的硬件电路计算效率高的性能,使修正工作更加的灵活,并且还能够使软件任务和硬件任务同时共存于同一设计系统当中,实现信息的共享和通信,打破了传统计算机软硬件不能协同设计的问题.本文将对共享存储可重构计算机软硬件通信进行详细的探讨.  相似文献   

11.
李小勇  杨月华 《中国通信》2011,8(6):108-116
Nowadays , an increasing number of persons choose to outsource their computing demands and storage demands to the Cloud. In order to ensure the integrity of the data in the untrusted Cloud, especially the dynamic files which can be updated online, we propose an improved dynamic provable data possession model. We use some homomorphic tags to verify the integrity of the file and use some hash values generated by some secret values and tags to prevent replay attack and forgery attack. Compared with previous works , our proposal reduces the computational and communication complexity from O (logn ) to O (1). We did some experiments to ensure this improvement and extended the model to file sharing situation.  相似文献   

12.
    
To resist the attacks from the malicious Cloud service providers and the organizer, an integrality verification of completeness and zero‐knowledge property (IVCZKP) scheme for multi‐Cloud environment is proposed. First, the bilinear pairing maps are adopted as a basis of theoretical support for IVCZKP scheme. Second, the change of file blocks is recorded, and the hash value of each block is generated through the index‐hash table in the verification process. Finally, the hash value of each block is updated through this index‐hash table to support the dynamic updates to user's data, such as data modification, data insertion, and data deletion. Compared with the original scheme, IVCZKP scheme can resist the forgery attacks and has the completeness and zero‐knowledge property. Theory analysis and the experimental results show that this scheme can reduce the computation time and has more performance on integrity verification in multi‐Cloud environment.  相似文献   

13.
    
To satisfy the requirements of identity authentication and data possession proven in the cloud application scenarios,a provable data possession scheme with authentication was proposed.Based on data tag signature and randomness reusing,the proposed scheme could accomplish several issues with three interactions,including the possession proof of cloud data,the mutual authentication between user and cloud computing server,the session key agreement and confirmation.Compared to the simple combination of authentication key agreement and provable data possession schemes,the proposed scheme has less computation and interactions,and better provable securities.In the random oracle model,the security proof of the proposed scheme is given under the computational Diffie-Hellman assumption.  相似文献   

14.
付伟  叶清  陈泽茂  吴晓平 《通信学报》2012,33(Z2):201-206
数据的持有性证明允许用户随时知道其数据是否仍然有效地保存在云存储平台中,以及是否可以随时、随地获取到该数据,这是云存储安全中的一个重要的挑战性问题。介绍了数据持有性证明的模型和衡量指标体系,分析了3种证明方案,并全面比较了6种常见的方法,最后给出了未来需要注意的研究方向。  相似文献   

15.
在云存储环境下,如何高效、动态地完成对多用户多副本数据的完整性验证是一个挑战性问题。基于双线性代数映射的签名机制和多分支认证树特性,提出了一种新的多用户多副本数据持有性证明方案。该方案通过使用随机掩码技术对密文进行处理确保数据隐私性,采用多分支认证树来提高数据分块的签名效率,能够支持数据动态更新操作。此外,引入第三方审计者对多用户多副本数据进行批量审计以减少计算开销。最后,分析表明本方案具有较高的安全性和效率。  相似文献   

16.
    
More and more users choose to transfer their applications and data into the cloud.Data security is a key issue for cloud storage systems.To ensure the integrity and validity of the data stored in the cloud,provable data possession (PDP) scheme is particularly important.In order to verify whether the cloud storage service provider had stored the data of the user completely,a scheme on the basis of NRPDP (non-repudiable PDP) was improved and extended,and a data retention scheme based on public authentication and private authentication was proposed.The scheme can verify the trustworthiness of the service provider and the user in the cloud storage at the same time,which satisfies the non-repudiation of the verification.The theory proves the non-repudiation of the proposed scheme.The experiment proves that the efficiency of each stage is better than that of the existing single public verification method or private authentication method.  相似文献   

17.
Cloud computing and storage services allow clients to move their data center and applications to centralized large data centers and thus avoid the burden of local data storage and maintenance.However,this poses new challenges related to creating secure and reliable data storage over unreliable service providers.In this study,we address the problem of ensuring the integrity of data storage in cloud computing.In particular,we consider methods for reducing the burden of generating a constant amount of metadata at the client side.By exploiting some good attributes of the bilinear group,we can devise a simple and efficient audit service for public verification of untrusted and outsourced storage,which can be important for achieving widespread deployment of cloud computing.Whereas many prior studies on ensuring remote data integrity did not consider the burden of generating verification metadata at the client side,the objective of this study is to resolve this issue.Moreover,our scheme also supports data dynamics and public verifiability.Extensive security and performance analysis shows that the proposed scheme is highly efficient and provably secure.  相似文献   

18.
Cloud computing and storage services allow clients to move their data center and applications to centralized large data centers and thus avoid the burden of local data storage and maintenance. However, this poses new challenges related to creating secure and reliable data storage over unreliable service providers. In this study, we address the problem of ensuring the integrity of data storage in cloud computing. In particular, we consider methods for reducing the burden of generating a constant amount of metadata at the client side. By exploiting some good attributes of the bilinear group, we can devise a simple and efficient audit service for public verification of untrusted and outsourced storage, which can be important for achieving widespread deployment of cloud computing. Whereas many prior studies on ensuring remote data integrity did not consider the burden of generating verification metadata at the client side, the objective of this study is to resolve this issue. Moreover, our scheme also supports data dynamics and public verifiability. Extensive security and performance analysis shows that the proposed scheme is highly efficient and provably secure.  相似文献   

19.
针对云计算中数据位置验证存在的共谋攻击,本文提出了抗共谋攻击的数据位置验证协议.首先给出了数据位置验证的系统模型,分析了安全威胁,并给出了数据位置验证的安全定义.随后,将安全定位协议与数据持有性证明协议相结合,设计了一维空间下的数据位置验证协议,并证明了所提协议满足安全定义且能抵御共谋攻击.在一维协议基础之上,构建了三维空间下的数据位置验证协议.最后,在三维空间下将本文所提协议与Lost协议和Geoproof协议进行了性能的测试和比较.结果表明所提协议能够验证服务器具体位置且能抵御共谋攻击.  相似文献   

20.
视频监控系统对海量视频数据存储和智能视频分析的需求日益突出.针对系统硬件计算能力有限,用户需求的多样性,系统扩展性复杂等问题,云存储技术有很大突破.通过虚拟化技术构建资源池,使用Hadoop分布式文件系统存储海量视频数据,使用Map/Reduce编程模型实现大数据并行计算,为用户提供实时视频监控和智能视频分析服务.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号