• Title/Summary/Keyword: Proof systems

Search Result 329, Processing Time 0.023 seconds

A Scalable Data Integrity Mechanism Based on Provable Data Possession and JARs

  • Zafar, Faheem;Khan, Abid;Ahmed, Mansoor;Khan, Majid Iqbal;Jabeen, Farhana;Hamid, Zara;Ahmed, Naveed;Bashir, Faisal
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.6
    • /
    • pp.2851-2873
    • /
    • 2016
  • Cloud storage as a service provides high scalability and availability as per need of user, without large investment on infrastructure. However, data security risks, such as confidentiality, privacy, and integrity of the outsourced data are associated with the cloud-computing model. Over the year's techniques such as, remote data checking (RDC), data integrity protection (DIP), provable data possession (PDP), proof of storage (POS), and proof of retrievability (POR) have been devised to frequently and securely check the integrity of outsourced data. In this paper, we improve the efficiency of PDP scheme, in terms of computation, storage, and communication cost for large data archives. By utilizing the capabilities of JAR and ZIP technology, the cost of searching the metadata in proof generation process is reduced from O(n) to O(1). Moreover, due to direct access to metadata, disk I/O cost is reduced and resulting in 50 to 60 time faster proof generation for large datasets. Furthermore, our proposed scheme achieved 50% reduction in storage size of data and respective metadata that result in providing storage and communication efficiency.

Efficient and General PVSS Based on ElGamal Encryption

  • Peng, Kun
    • Journal of Information Processing Systems
    • /
    • v.8 no.2
    • /
    • pp.375-388
    • /
    • 2012
  • PVSS stands for publicly verifiable secret sharing. In PVSS, a dealer shares a secret among multiple share holders. He encrypts the shares using the shareholders' encryption algorithms and publicly proves that the encrypted shares are valid. Most of the existing PVSS schemes do not employ an ElGamal encryption to encrypt the shares. Instead, they usually employ other encryption algorithms like a RSA encryption and Paillier encryption. Those encryption algorithms do not support the shareholders' encryption algorithms to employ the same decryption modulus. As a result, PVSS based on those encryption algorithms must employ additional range proofs to guarantee the validity of the shares obtained by the shareholders. Although the shareholders can employ ElGamal encryptions with the same decryption modulus in PVSS such that the range proof can be avoided, there are only two PVSS schemes based on ElGamal encryption. Moreover, the two schemes have their drawbacks. One of them employs a costly repeating-proof mechanism, which needs to repeat the dealer's proof at least scores of times to achieve satisfactory soundness. The other requires that the dealer must know the discrete logarithm of the secret to share and thus weakens the generality and it cannot be employed in many applications. A new PVSS scheme based on an ElGamal encryption is proposed in this paper. It employs the same decryption modulus for all the shareholders' ElGamal encryption algorithms, so it does not need any range proof. Moreover, it is a general PVSS technique without any special limitation. Finally, an encryption-improving technique is proposed to achieve very high efficiency in the new PVSS scheme. It only needs a number of exponentiations in large cyclic groups that are linear in the number of the shareholders, while all the existing PVSS schemes need at least a number of exponentiations in large cyclic groups that are linear in the square of the number of the shareholders.

Design and control of a proof-of-concept active jet engine intake using shape memory alloy actuators

  • Song, Gangbing;Ma, Ning;Li, Luyu;Penney, Nick;Barr, Todd;Lee, Ho-Jun;Arnold, Steve
    • Smart Structures and Systems
    • /
    • v.7 no.1
    • /
    • pp.1-13
    • /
    • 2011
  • It has been shown in the literature that active adjustment of the intake area of a jet engine has potential to improve its fuel efficiency. This paper presents the design and control of a novel proof-of-concept active jet engine intake using Nickel-Titanium (Ni-Ti or Nitinol) shape memory alloy (SMA) wire actuators. The Nitinol SMA material is used in this research due to its advantages of high power-to-weight ratio and electrical resistive actuation. The Nitinol SMA material can be fabricated into a variety of shapes, such as strips, foils, rods and wires. In this paper, SMA wires are used due to its ability to generate a large strain: up to 6% for repeated operations. The proposed proof-of-concept engine intake employs overlapping leaves in a concentric configuration. Each leaf is mounted on a supporting bar than can rotate. The supporting bars are actuated by an SMA wire actuator in a ring configuration. Electrical resistive heating is used to actuate the SMA wire actuator and rotate the supporting bars. To enable feedback control, a laser range sensor is used to detect the movement of a leaf and therefore the radius of the intake area. Due to the hysteresis, an inherent nonlinear phenomenon associated with SMAs, a nonlinear robust controller is used to control the SMA actuators. The control design uses the sliding-mode approach and can compensate the nonlinearities associated with the SMA actuator. A proof-of-concept model is fabricated and its feedback control experiments show that the intake area can be precisely controlled using the SMA wire actuator and has the ability to reduce the area up to 25%. The experiments demonstrate the feasibility of engine intake area control using an SMA wire actuator under the proposed design.

Fuzzy Entropy Construction based on Similarity Measure (유사측도에 기반한 퍼지 엔트로피구성)

  • Park, Wook-Je;Park, Hyun-Jeong;Lee, Sang-H
    • Proceedings of the Korean Institute of Intelligent Systems Conference
    • /
    • 2007.11a
    • /
    • pp.366-369
    • /
    • 2007
  • In this paper we derived fuzzy entropy that is based on similarity measure. Similarity measure represents the degree of similarity between two informations, those informations characteristics are not important. First we construct similarity measure between two informations, and derived entropy functions with obtained similarity measure. Obtained entropy is verified with proof. With the help of one-to-one similarity is also obtained through distance measure, this similarity measure is also proved in our paper.

  • PDF

A second-order iterative learning control method

  • Bien, Zeungnam;Huh, Kyung-Moo
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 1988.10b
    • /
    • pp.734-739
    • /
    • 1988
  • For the trajectory control of dynamic systems with unidentified parameters a second-order iterative learning control method is presented. In contrast to other known methods, the proposed learning control scheme can utilize more than one error history contained in the trajectories generated at prior iterations. A convergency proof is given and it is also shown that the convergence speed can be improved in compared to conventional methods. Examples are provided to show effectiveness of the algorithm, and, via simulation, it is demonstrated that the method yields a good performance even in the presence of distubances.

  • PDF

ASYMPTOTIC BEHAVIOUR FOR SEMILINEAR DIFFERENTIAL SYSTEMS

  • Song, Se-Mok;Im, Dong-Man;Lee, Gi-Soo
    • Journal of applied mathematics & informatics
    • /
    • v.15 no.1_2
    • /
    • pp.527-537
    • /
    • 2004
  • This paper deals with the asymptotic behaviour for the semi-linear differential systems x' (t) = A(t)χ + f(t, x). We give a detailed proof of known generalization of Coppel's result about the above mentioned system.

Analysis of Fuzzy Entropy and Similarity Measure for Non Convex Membership Functions

  • Lee, Sang-H.;Kim, Sang-Jin
    • International Journal of Fuzzy Logic and Intelligent Systems
    • /
    • v.9 no.1
    • /
    • pp.4-9
    • /
    • 2009
  • Fuzzy entropy is designed for non convex fuzzy membership function using well known Hamming distance measure. Design procedure of convex fuzzy membership function is represented through distance measure, furthermore characteristic analysis for non convex function are also illustrated. Proof of proposed fuzzy entropy is discussed, and entropy computation is illustrated.

Fuzzy Entropy Construction for Non-Convex Fuzzy Membership Function (비 컨벡스 퍼지 소속함수에 대한 퍼지 엔트로피구성)

  • Lee, Sang-H;Kim, Jae-Hyung;Kim, Sang-Jin
    • Proceedings of the Korean Institute of Intelligent Systems Conference
    • /
    • 2008.04a
    • /
    • pp.21-22
    • /
    • 2008
  • Fuzzy entropy is designed for non-convex fuzzy membership function using well known Hamming distance measure. Design procedure of convex fuzzy membership function is represented through distance measure, furthermore characteristic analysis for non-convex function are also illustrated. Proof of proposed fuzzy entropy is discussed, and entropy computation is illustrated.

  • PDF

EXISTENCE THEOREMS OF BOUNDARY VALUE PROBLEMS FOR FOURTH ORDER NONLINEAR DISCRETE SYSTEMS

  • YANG, LIANWU
    • Journal of applied mathematics & informatics
    • /
    • v.37 no.5_6
    • /
    • pp.399-410
    • /
    • 2019
  • In the manuscript, we concern with the existence of solutions of boundary value problems for fourth order nonlinear discrete systems. Some criteria for the existence of at least one nontrivial solution of the problem are obtained. The proof is mainly based upon the variational method and critical point theory. An example is presented to illustrate the main result.