期刊文献+
共找到3篇文章
< 1 >
每页显示 20 50 100
Cloud Data Encryption and Authentication Based on Enhanced Merkle Hash Tree Method 被引量:1
1
作者 J.Stanly Jayaprakash Kishore Balasubramanian +3 位作者 Rossilawati Sulaiman Mohammad Kamrul Hasan b.d.parameshachari Celestine Iwendi 《Computers, Materials & Continua》 SCIE EI 2022年第7期519-534,共16页
Many organizations apply cloud computing to store and effectively process data for various applications.The user uploads the data in the cloud has less security due to the unreliable verification process of data integ... Many organizations apply cloud computing to store and effectively process data for various applications.The user uploads the data in the cloud has less security due to the unreliable verification process of data integrity.In this research,an enhanced Merkle hash tree method of effective authentication model is proposed in the multi-owner cloud to increase the security of the cloud data.Merkle Hash tree applies the leaf nodes with a hash tag and the non-leaf node contains the table of hash information of child to encrypt the large data.Merkle Hash tree provides the efficient mapping of data and easily identifies the changesmade in the data due to proper structure.The developed model supports privacy-preserving public auditing to provide a secure cloud storage system.The data owners upload the data in the cloud and edit the data using the private key.An enhanced Merkle hash tree method stores the data in the cloud server and splits it into batches.The data files requested by the data owner are audit by a third-party auditor and the multiowner authentication method is applied during the modification process to authenticate the user.The result shows that the proposed method reduces the encryption and decryption time for cloud data storage by 2–167 ms when compared to the existing Advanced Encryption Standard and Blowfish. 展开更多
关键词 Cloud computing cloud data storage cloud service provider merkle hash tree multi-owner authentication third-party auditor
在线阅读 下载PDF
Deep Bi-Directional Adaptive Gating Graph Convolutional Networks for Spatio-Temporal Traffic Forecasting
2
作者 Xin Wang Jianhui Lv +5 位作者 Madini O.Alassafi Fawaz E.Alsaadi b.d.parameshachari Longhao Zou Gang Feng Zhonghua Liu 《Tsinghua Science and Technology》 2025年第5期2060-2080,共21页
With the advent of deep learning,various deep neural network architectures have been proposed to capture the complex spatio-temporal dependencies in traffic data.This paper introduces a novel Deep Bi-directional Adapt... With the advent of deep learning,various deep neural network architectures have been proposed to capture the complex spatio-temporal dependencies in traffic data.This paper introduces a novel Deep Bi-directional Adaptive Gating Graph Convolutional Network(DBAG-GCN)model for spatio-temporal traffic forecasting.The proposed model leverages the power of graph convolutional networks to capture the spatial dependencies in the road network topology and incorporates bi-directional gating mechanisms to control the information flow adaptively.Furthermore,we introduce a multi-scale temporal convolution module to capture multi-scale temporal dynamics and a contextual attention mechanism to integrate external factors such as weather conditions and event information.Extensive experiments on real-world traffic datasets demonstrate the superior performance of DBAG-GCN compared to state-of-the-art baselines,achieving significant improvements in prediction accuracy and computational efficiency.The DBAG-GCN model provides a powerful and flexible framework for spatio-temporal traffic forecasting,paving the way for intelligent transportation management and urban planning. 展开更多
关键词 traffic forecasting spatio-temporal modeling Graph Convolutional Networks(GCNs) adaptive gating
原文传递
Low Area PRESENT Cryptography in FPGA Using TRNG-PRNG Key Generation
3
作者 T.Kowsalya R.Ganesh Babu +2 位作者 b.d.parameshachari Anand Nayyar Raja Majid Mehmood 《Computers, Materials & Continua》 SCIE EI 2021年第8期1447-1465,共19页
Lightweight Cryptography(LWC)is widely used to provide integrity,secrecy and authentication for the sensitive applications.However,the LWC is vulnerable to various constraints such as high-power consumption,time consu... Lightweight Cryptography(LWC)is widely used to provide integrity,secrecy and authentication for the sensitive applications.However,the LWC is vulnerable to various constraints such as high-power consumption,time consumption,and hardware utilization and susceptible to the malicious attackers.In order to overcome this,a lightweight block cipher namely PRESENT architecture is proposed to provide the security against malicious attacks.The True Random Number Generator-Pseudo Random Number Generator(TRNG-PRNG)based key generation is proposed to generate the unpredictable keys,being highly difficult to predict by the hackers.Moreover,the hardware utilization of PRESENT architecture is optimized using the Dual port Read Only Memory(DROM).The proposed PRESENT-TRNGPRNG architecture supports the 64-bit input with 80-bit of key value.The performance of the PRESENT-TRNG-PRNG architecture is evaluated by means of number of slice registers,flip flops,number of slices Look Up Table(LUT),number of logical elements,slices,bonded input/output block(IOB),frequency,power and delay.The input retrieval performances analyzed in this PRESENT-TRNG-PRNG architecture are Peak Signal to Noise Ratio(PSNR),Structural Similarity Index(SSIM)and Mean-Square Error(MSE).The PRESENT-TRNG-PRNG architecture is compared with three different existing PRESENT architectures such as PRESENT On-TheFly(PERSENT-OTF),PRESENT Self-Test Structure(PRESENT-STS)and PRESENT-Round Keys(PRESENT-RK).The operating frequency of the PRESENT-TRNG-PRNG is 612.208 MHz for Virtex 5,which is high as compared to the PRESENT-RK. 展开更多
关键词 Dual port read only memory hardware utilization lightweight cryptography malicious attackers present block cipher pseudo random number generator true random number generator
在线阅读 下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部