Optimal Data Sharing with Forward Security
نویسندگان
چکیده
منابع مشابه
Survey on Forward Security for Authentic and Anonymous Data Sharing with Auditing Integrity
Large amount of data sharing has never been less demanding to the advances of cloud computing, and a precise examination on the shared data gives a variety of advantages to both the society and individuals. Data sharing to an expansive number of members must consider a few issues, including effectiveness, data integrity and protection of data owner. Ring signature is a promising contender to de...
متن کاملSharing Data for Public Security
Data sharing is a valuable tool for improving security. It allows integrating information from multiple sources to better identify and respond to global security threats. On the other side, sharing of data is limited by privacy and confidentiality. A possible solution is removing or obfuscating part of the data before release (anonymization), and, to this scope, various masking algorithms have ...
متن کاملForward Exponential Performances: Pricing and Optimal Risk Sharing
In a Markovian stochastic volatility model, we consider financial agents whose investment criteria are modelled by forward exponential performance processes. The problem of contingent claim indifference valuation is first addressed and a number of properties are proved and discussed. Special attention is given to the comparison between the forward exponential and the backward exponential utilit...
متن کاملImproving Data Sharing Security in Cloud Computing
Cloud computing has emerged as a new computing paradigm where all IT infrastructure can be outsourced and working as on premise. It offers numerous advantages both for customers and providers and especially at the cost level that is typically low compared to buying your own resources, configuring and managing them. One of the tremendous services is the data sharing and the data storage. Custome...
متن کاملImproving Data Security in Crypto-based Data Sharing with Third Party Auditing
The encryption standard provides key assumption to the analytical with the recent adoption and diffusion of the data sharing paradigm in distributed systems such as online social escrow problem. The key generation center could decrypt any messages addressed to specific users networks or cloud computing, there have been increasing demands and concerns for distributed data security. One of the mo...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: International Journal of Computer Applications
سال: 2016
ISSN: 0975-8887
DOI: 10.5120/ijca2016911892