Cloud storage represents the trend of intensive,scale and specialization of information technology,which has changed the technical architecture and implementation method of electronic records management.Moreover,it wi...Cloud storage represents the trend of intensive,scale and specialization of information technology,which has changed the technical architecture and implementation method of electronic records management.Moreover,it will provide a convenient way to generate more advanced and efficient management of the electronic data records.However,in cloud storage environment,it is difficult to guarantee the trustworthiness of electronic records,which results in a series of severe challenges to electronic records management.Starting from the definition and specification of electronic records,this paper firstly analyzes the requirements of the trustworthiness in cloud storage during their long-term preservation according to the information security theory and subdivides the trustworthiness into the authenticity,integrity,usability,and reliability of electronic records in cloud storage.Moreover,this paper proposes the technology framework of preservation for trusted electronic records.Also,the technology of blockchain,proofs of retrievability,the open archival information system model and erasure code are adopted to protect these four security attributes,to guarantee the credibility of the electronic record.展开更多
With the diversification of electronic devices,cloud-based services have become the link between different devices.As a cryptosystem with secure conversion function,proxy re-encryption enables secure sharing of data i...With the diversification of electronic devices,cloud-based services have become the link between different devices.As a cryptosystem with secure conversion function,proxy re-encryption enables secure sharing of data in a cloud environment.Proxy re-encryption is a public key encryption system with ciphertext security conversion function.A semi-trusted agent plays the role of ciphertext conversion,which can convert the user ciphertext into the same plaintext encrypted by the principal’s public key.Proxy re-encryption has been a hotspot in the field of information security since it was proposed by Blaze et al.[Blaze,Bleumer and Strauss(1998)].After 20 years of development,proxy re-encryption has evolved into many forms been widely used.This paper elaborates on the definition,characteristics and development status of proxy re-encryption,and classifies proxy re-encryption from the perspectives of user identity,conversion condition,conversion hop count and conversion direction.The aspects of the existing program were compared and briefly reviewed from the aspects of features,performance,and security.Finally,this paper looks forward to the possible development direction of proxy re-encryption in the future.展开更多
With the broad application of information technology in urban infrastructure,urban construction has entered the stage of a smart city,forming many electronic records in urban construction.These electronic records play...With the broad application of information technology in urban infrastructure,urban construction has entered the stage of a smart city,forming many electronic records in urban construction.These electronic records play a vital role in the maintenance of urban infrastructure.However,electronic records often change in the process of urban construction.How to preserve the electronic records of urban construction became a significant challenge.In response to this problem,this paper proposes the use of risk-based management techniques to ensure the digital continuity,authenticity,integrity,and availability of electronic records.展开更多
This paper proposes a novel method for image magnification by exploiting the property that the intensity of an image varies along the direction of the gradient very quickly. It aims to maintain sharp edges and clear d...This paper proposes a novel method for image magnification by exploiting the property that the intensity of an image varies along the direction of the gradient very quickly. It aims to maintain sharp edges and clear details. The proposed method first calculates the gradient of the low-resolution image by fitting a surface with quadratic polynomial precision. Then,bicubic interpolation is used to obtain initial gradients of the high-resolution(HR) image. The initial gradients are readjusted to find the constrained gradients of the HR image, according to spatial correlations between gradients within a local window. To generate an HR image with high precision, a linear surface weighted by the projection length in the gradient direction is constructed. Each pixel in the HR image is determined by the linear surface. Experimental results demonstrate that our method visually improves the quality of the magnified image. It particularly avoids making jagged edges and bluring during magnification.展开更多
Adhesive bonding is a promising joining technology for joining lightweight aluminum structures,offering advantages such as the absence of additional heat input,connection damage,and environmental pollution.To further ...Adhesive bonding is a promising joining technology for joining lightweight aluminum structures,offering advantages such as the absence of additional heat input,connection damage,and environmental pollution.To further enhance the strength of aluminum adhesive joints,this study investigates the influence of laser surface treatment on their mechanical properties.Specifically,the effect of laser processing patterns and their geometric parameters on aluminum alloy adhesive joints is examined.A fiber laser is used to process crater array and multi-groove pattern on A6061 aluminum surface.The impact of crater overlap ratio and groove distance on various aspects,including aluminum surface morphology,roughness(Sa),adhesive joints shear,tensile strength,and failure modes is discussed.Laser confocal microscope tests,water contact angle tests,lap shear tests,and cross tensile tests are employed to analyze these parameters.The results indicate that as the crater overlap ratio increases,the S_(a) value of the aluminum surface increases.Moreover,the shear strength of adhesive joints initially increases and then decreases,while the tensile strength consistently increases.On the other hand,an increase in groove distance leads to a decrease in S_(a),as well as a reduction in both shear and tensile strength of adhesive joints.For shear loading conditions,mechanical interlocking is identified as one of the bonding mechanisms in aluminum adhesive joints featuring crater array and multi-groove patterns.The formation of interlocking structures is found to be influenced by the aluminum surface pattern and its associated parameters,as revealed through failure surface analysis.Specifically,adhesive and crater or groove interactions contribute to the formation of interlocking structures in specimens with a crater overlap ratio of -60% or groove distances of 120,180,300,and 400μm.Conversely,specimens with overlap ratios of 0%,40%,and 60% exhibit interlocking structures formed by the adhesive and crater edge.展开更多
基金This work is supported by the NSFC(No.61772280,61772454,6171101570,61702236)Natural Science Foundation of Jiangsu Province under grant No.BK20150460,the Changzhou Sci&Tech Program(No.CJ20179027)the PAPD fund from NUIST.Prof.Hye-Jin Kim is the corresponding author.
文摘Cloud storage represents the trend of intensive,scale and specialization of information technology,which has changed the technical architecture and implementation method of electronic records management.Moreover,it will provide a convenient way to generate more advanced and efficient management of the electronic data records.However,in cloud storage environment,it is difficult to guarantee the trustworthiness of electronic records,which results in a series of severe challenges to electronic records management.Starting from the definition and specification of electronic records,this paper firstly analyzes the requirements of the trustworthiness in cloud storage during their long-term preservation according to the information security theory and subdivides the trustworthiness into the authenticity,integrity,usability,and reliability of electronic records in cloud storage.Moreover,this paper proposes the technology framework of preservation for trusted electronic records.Also,the technology of blockchain,proofs of retrievability,the open archival information system model and erasure code are adopted to protect these four security attributes,to guarantee the credibility of the electronic record.
基金This work is supported by the NSFC(Nos.61772280,61702236)the Changzhou Sci&Tech Program(No.CJ20179027),and the PAPD fund from NUIST.Prof.
文摘With the diversification of electronic devices,cloud-based services have become the link between different devices.As a cryptosystem with secure conversion function,proxy re-encryption enables secure sharing of data in a cloud environment.Proxy re-encryption is a public key encryption system with ciphertext security conversion function.A semi-trusted agent plays the role of ciphertext conversion,which can convert the user ciphertext into the same plaintext encrypted by the principal’s public key.Proxy re-encryption has been a hotspot in the field of information security since it was proposed by Blaze et al.[Blaze,Bleumer and Strauss(1998)].After 20 years of development,proxy re-encryption has evolved into many forms been widely used.This paper elaborates on the definition,characteristics and development status of proxy re-encryption,and classifies proxy re-encryption from the perspectives of user identity,conversion condition,conversion hop count and conversion direction.The aspects of the existing program were compared and briefly reviewed from the aspects of features,performance,and security.Finally,this paper looks forward to the possible development direction of proxy re-encryption in the future.
文摘With the broad application of information technology in urban infrastructure,urban construction has entered the stage of a smart city,forming many electronic records in urban construction.These electronic records play a vital role in the maintenance of urban infrastructure.However,electronic records often change in the process of urban construction.How to preserve the electronic records of urban construction became a significant challenge.In response to this problem,this paper proposes the use of risk-based management techniques to ensure the digital continuity,authenticity,integrity,and availability of electronic records.
基金supported by the National Natural Science Foundation of China (Nos. 61332015, 61373078, 61572292, and 61272430)National Research Foundation for the Doctoral Program of Higher Education of China (No. 20110131130004)
文摘This paper proposes a novel method for image magnification by exploiting the property that the intensity of an image varies along the direction of the gradient very quickly. It aims to maintain sharp edges and clear details. The proposed method first calculates the gradient of the low-resolution image by fitting a surface with quadratic polynomial precision. Then,bicubic interpolation is used to obtain initial gradients of the high-resolution(HR) image. The initial gradients are readjusted to find the constrained gradients of the HR image, according to spatial correlations between gradients within a local window. To generate an HR image with high precision, a linear surface weighted by the projection length in the gradient direction is constructed. Each pixel in the HR image is determined by the linear surface. Experimental results demonstrate that our method visually improves the quality of the magnified image. It particularly avoids making jagged edges and bluring during magnification.
基金sponsored by Fundamental Research Funds for the Central Universities(No.FRF-BD-20-08A,No.FRF-BD-19-003A).
文摘Adhesive bonding is a promising joining technology for joining lightweight aluminum structures,offering advantages such as the absence of additional heat input,connection damage,and environmental pollution.To further enhance the strength of aluminum adhesive joints,this study investigates the influence of laser surface treatment on their mechanical properties.Specifically,the effect of laser processing patterns and their geometric parameters on aluminum alloy adhesive joints is examined.A fiber laser is used to process crater array and multi-groove pattern on A6061 aluminum surface.The impact of crater overlap ratio and groove distance on various aspects,including aluminum surface morphology,roughness(Sa),adhesive joints shear,tensile strength,and failure modes is discussed.Laser confocal microscope tests,water contact angle tests,lap shear tests,and cross tensile tests are employed to analyze these parameters.The results indicate that as the crater overlap ratio increases,the S_(a) value of the aluminum surface increases.Moreover,the shear strength of adhesive joints initially increases and then decreases,while the tensile strength consistently increases.On the other hand,an increase in groove distance leads to a decrease in S_(a),as well as a reduction in both shear and tensile strength of adhesive joints.For shear loading conditions,mechanical interlocking is identified as one of the bonding mechanisms in aluminum adhesive joints featuring crater array and multi-groove patterns.The formation of interlocking structures is found to be influenced by the aluminum surface pattern and its associated parameters,as revealed through failure surface analysis.Specifically,adhesive and crater or groove interactions contribute to the formation of interlocking structures in specimens with a crater overlap ratio of -60% or groove distances of 120,180,300,and 400μm.Conversely,specimens with overlap ratios of 0%,40%,and 60% exhibit interlocking structures formed by the adhesive and crater edge.