One method of storing information
نویسنده
چکیده
Formulate the problem as follows. Split a file into n pieces so that it can be restored without any m parts (1<=m<=n). Such problems are called problems secret sharing. There exists a set of methods for solving such problems, but they all require a fairly large number of calculations applied to the problem posed above. The proposed method does not require calculations, and requires only the operations of the division of the file into equal (nearly equal) parts and gluing them in a certain order in one or more files.
منابع مشابه
A Method for Protecting Access Pattern in Outsourced Data
Protecting the information access pattern, which means preventing the disclosure of data and structural details of databases, is very important in working with data, especially in the cases of outsourced databases and databases with Internet access. The protection of the information access pattern indicates that mere data confidentiality is not sufficient and the privacy of queries and accesses...
متن کاملIdentification and Prioritization of Factors Contributing in Cloud Service Selection Using Fuzzy Best-worst Method (FBWM)
The introduction of cloud computing techniques revolutionized the current of information processing and storing. Cloud computing as a competitive edge provides easy and automated access to the vast ocean of resources through standard network mechanisms to businesses and organizations. Due to the vast diversity of service providers and their respective variety of available services with differen...
متن کاملAn Advanced Hybrid Honeypot for Providing Effective Resistance in Automatic Network Generation
Increasing usage of Internet and computer networks by individuals and organizations and also attackers’ usage of new methods and tools in an attempt to endanger network security, have led to the emergence of a wide range of threats to networks. A honeypot is one of the basic techniques employed for network security improvement. It is basically designed to be attacked so as to get the attackers’...
متن کاملA Novel Method for VANET Improvement using Cloud Computing
In this paper, we present a novel algorithm for VANET using cloud computing. We accomplish processing, routing and traffic control in a centralized and parallel way by adding one or more server to the network. Each car or node is considered a Client, in such a manner that routing, traffic control, getting information from client and data processing and storing are performed by one or more serve...
متن کاملF-STONE: A Fast Real-Time DDOS Attack Detection Method Using an Improved Historical Memory Management
Distributed Denial of Service (DDoS) is a common attack in recent years that can deplete the bandwidth of victim nodes by flooding packets. Based on the type and quantity of traffic used for the attack and the exploited vulnerability of the target, DDoS attacks are grouped into three categories as Volumetric attacks, Protocol attacks and Application attacks. The volumetric attack, which the pro...
متن کاملانتخاب فناوری مناسب نگهداشت و نابودسازی پسماندهای بیمارستانی در شهر تهران با استفاده از ترکیب روشهای فرآیند شبکهای تحلیلی و مالتی مورای فازی
Background and Aim: Nowadays selecting an appropriate technology for storing and disposal of health care wastes is a difficult task. For example, selecting an optimum technology for storing and disposal of hospital wastes is a complex multi-criteria decision-making process, which requires consideration of qualitative and quantitative factors and criteria. This paper presents a new decision-maki...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- CoRR
دوره abs/1009.1697 شماره
صفحات -
تاریخ انتشار 2010