期刊文献+
共找到31篇文章
< 1 2 >
每页显示 20 50 100
Accelerating Packet Classification with Counting Bloom Filters for Virtual Open Flow Switching 被引量:4
1
作者 Jinyuan Zhao Zhigang Hu +1 位作者 Bing Xiong Keqin Li 《China Communications》 SCIE CSCD 2018年第10期117-128,共12页
The growing trend of network virtualization results in a widespread adoption of virtual switches in virtualized environments. However, virtual switching is confronted with great performance challenges regarding packet... The growing trend of network virtualization results in a widespread adoption of virtual switches in virtualized environments. However, virtual switching is confronted with great performance challenges regarding packet classification especially in Open Flow-based software defined networks. This paper first takes an insight into packet classification in virtual Open Flow switching, and points out that its performance bottleneck is dominated by flow table traversals of multiple failed mask probing for each arrived packet. Then we are motivated to propose an efficient packet classification algorithm based on counting bloom filters. In particular, counting bloom filters are applied to predict the failures of flow table lookups with great possibilities, and bypass flow table traversals for failed mask probing. Finally, our proposed packet classification algorithm is evaluated with real network traffic traces by experiments. The experimental results indicate that our proposed algorithm outperforms the classical one in Open v Switch in terms of average search length, and contributes to promote virtual Open Flow switching performance. 展开更多
关键词 OpenFlow virtual switching packet classification flow table lookups counting bloom filters
在线阅读 下载PDF
Extensible Bloom Filters:Adaptive Strategies for Scalability and Efficiency in Network and Distributed Systems to Handle Increased Data
2
作者 Jigang Wen Shuyu Pei +2 位作者 Chuhan Yan Kun Xie Wei Liang 《Tsinghua Science and Technology》 2025年第4期1846-1864,共19页
Bloom Filters(BFs)are compact and probabilistic data structures designed for efficient set membership queries.They offer high query and storage efficiency,making them particularly useful in network and distributed sys... Bloom Filters(BFs)are compact and probabilistic data structures designed for efficient set membership queries.They offer high query and storage efficiency,making them particularly useful in network and distributed systems.However,the scalability of BFs in accommodating“big data”is limited by increased false positive rates,inflexible hash functions,and inefficient matching with dynamic datasets.To address these limitations,we introduce the Extensible Bloom Filter(EBF),which incorporates a flexible expansion mechanism and an adaptive hash function generation scheme.The EBF design features a set of BF vectors that expand according to the rate of incoming data,with each vector sized to suit the characteristics of the data.Adaptive hash functions,derived from common base matrices,streamline the process by leveraging strong inter-hash relationships.This reduces overhead and simplifies queries across multiple BF vector sizes.Performance evaluations have shown that the EBF consistently achieves a low false positive rate and minimal query time,even amid dynamic data arrivals and large data sets.With its extensibility and adaptability,the EBF provides a robust solution for applications requiring dynamic set representations with stringent accuracy requirements.It enhances the capabilities of network and distributed systems,making them more efficient in handling complex data scenarios. 展开更多
关键词 bloom Filter(BF) adaptive hash function membership query
原文传递
一种基于bloom-filters的半连接查询优化算法
3
作者 孙中利 戴玉刚 刘战东 《电子设计工程》 2011年第4期1-3,共3页
以传输费用最小为目的,提出一种新的查询优化算法。该算法以连接属性为关键字,利用半连接关系建立bloom-filters,在半连接关系间相互传送bloom-filters,从而缩减大部分不参与连接的元组,最终形成了计算结果表。通过站点间传送计算结果... 以传输费用最小为目的,提出一种新的查询优化算法。该算法以连接属性为关键字,利用半连接关系建立bloom-filters,在半连接关系间相互传送bloom-filters,从而缩减大部分不参与连接的元组,最终形成了计算结果表。通过站点间传送计算结果表来缩减连接关系,半连接的准确性比估算连接结果高,半连接查询优化算法能较准确地做出下一步的连接;新的查询优化算法能有效地得到连接操作的执行计划,从而减少了传输费用。 展开更多
关键词 数半连接 分布式数据库 查询优化 bloomfilters
在线阅读 下载PDF
Comparing Set Reconciliation Methods Based on Bloom Filters and Their Variants
4
作者 Zhiyao Hu Xiaoqiang Teng +3 位作者 Deke Guo Bangbang Ren Pin Lv Zhong Liu 《Tsinghua Science and Technology》 SCIE EI CAS CSCD 2016年第2期157-167,共11页
Set reconciliation between two nodes is widely used in network applications. The basic idea is that each member of a node pair has an object set and seeks to deliver its unique objects to the other member. The Standar... Set reconciliation between two nodes is widely used in network applications. The basic idea is that each member of a node pair has an object set and seeks to deliver its unique objects to the other member. The Standard Bloom Filter (SBF) and its variants, such as the Invertible Bloom Filter (IBF), are effective approaches to solving the set reconciliation problem. The SBF-based method requires each node to represent its objects using an SBF, which is exchanged with the other node. A receiving node queries the received SBF against its local objects to identify the unique objects. Finally, each node exchanges its unique objects with the other node in the node pair. For the IBF- based method, each node represents its objects using an IBF, which is then exchanged. A receiving node subtracts the received IBF from its local IBF so as to decode the different objects between the two sets. Intuitively, it would seem that the IBF-based method, with only one round of communication, entails less communication overhead than the SBF-based method, which incurs two rounds of communication. Our research results, however, indicate that neither of these two methods has an absolute advantages over the others. In this paper, we aim to provide an in-depth understanding of the two methods, by evaluating and comparing their communication overhead. We find that the best method depends on parameter settings. We demonstrate that the SBF-based method outperforms the IBF-based method in most cases. But when the number of different objects in the two sets is below a certain threshold, the IBF-based method outperforms the SBF-based method. 展开更多
关键词 set reconciliation bloom filter communication overheads
原文传递
Hot Data Identification with Multiple Bloom Filters: Block-Level Decision vs I/O Request-Level Decision
5
作者 Dongchul Park Weiping He H. C. Du 《Journal of Computer Science & Technology》 SCIE EI CSCD 2018年第1期79-97,共19页
Hot data identification is crucial for many applications though few investigations have examined the subject. All existing studies focus almost exclusively on frequency. However, effectively identifying hot data requi... Hot data identification is crucial for many applications though few investigations have examined the subject. All existing studies focus almost exclusively on frequency. However, effectively identifying hot data requires equally considering recency and frequency. Moreover, previous studies make hot data decisions at the data block level. Such a fine-grained decision fits particularly well for flash-based storage because its random access achieves performance comparable with its sequential access. However, hard disk drives (HDDs) have a significant performance disparity between sequential and random access. Therefore, unlike flash-based storage, exploiting asymmetric HDD access performance requires making a coarse-grained decision. This paper proposes a novel hot data identification scheme adopting multiple bloom filters to efficiently characterize recency as well as frequency. Consequently, it not only consumes 50% less memory and up to 58% less computational overhead, but also lowers false identification rates up to 65% compared with a state-of-the-art scheme. Moreover, we apply the scheme to a next generation HDD technology, i.e., Shingled Magnetic Recording (SMR), to verify its effectiveness. For this, we design a new hot data identification based SMR drive with a coarse-grained decision. The experiments demonstrate the importance and benefits of accurate hot data identification, thereby improving the proposed SMR drive performance by up to 42%. 展开更多
关键词 hot data bloom filter shingled magnetic recording (SMR)
原文传递
BloomRouter:A Framework for Dissemination of Compressed XML Stream
6
作者 BAO Xiao-yuan TANG Shi-wei +2 位作者 YANG Dong-qing SONG Zai-sheng WU Ling 《Wuhan University Journal of Natural Sciences》 EI CAS 2006年第1期100-106,共7页
As our best knowledge, in the Publish/Subscribe application environment, few research work has been done on the dissemination and routing of compressed XML (extended markup language) data. A high-speed compressed XM... As our best knowledge, in the Publish/Subscribe application environment, few research work has been done on the dissemination and routing of compressed XML (extended markup language) data. A high-speed compressed XML data routing and dissemination framework BloomRouter is proposed. In BloomRouter, a Bloom Filter based prefilte ring mechanism is used to filter out compressed XML elements that users do not care; after that an interval tree dis seminator forwards target elements to the corresponding end users by matching the incomming compressed XML elements with indexed users' query regions. Based on this framework, we can efficiently filter/query the compressed incoming XML data, and then route the query result to the corresponding subseriber. 展开更多
关键词 XML bloom filters compression data stream
在线阅读 下载PDF
L-priorities Bloom Filter: A New Member of the Bloom Filter Family 被引量:1
7
作者 Huang-Shui Hu Hong-Wei Zhao Fei Mi 《International Journal of Automation and computing》 EI 2012年第2期171-176,共6页
A Bloom filter is a space-efficient data structure used for concisely representing a set as well as membership queries at the expense of introducing false positive. In this paper, we propose the L-priorities Bloom fil... A Bloom filter is a space-efficient data structure used for concisely representing a set as well as membership queries at the expense of introducing false positive. In this paper, we propose the L-priorities Bloom filter (LPBF) as a new member of the Bloom filter (BF) family, it uses a limited multidimensional bit space matrix to replace the bit vector of standard bloom filters in order to support different priorities for the elements of a set. We demonstrate the time and space complexity, especially the false positive rate of LPBF. Furthermore, we also present a detailed practical evaluation of the false positive rate achieved by LPBF. The results show that LPBF performs better than standard BFs with respect to false positive rate. 展开更多
关键词 bloom filter bit space matrix false positive L-priorities time and space complexity.
在线阅读 下载PDF
PERFORMANCE EVALUATION AND COMPARISON OF THREE COUNTING BLOOM FILTER SCHEMES 被引量:1
8
作者 Zhang Jin Wu Jiang-xing Lan Julong Liu Jianqiang 《Journal of Electronics(China)》 2009年第3期332-340,共9页
The Counting Bloom Filter (CBF) is a kind of space-efficient data structure that extends a Bloom filter so as to allow approximate multiplicity queries on a dynamic multi-set. This paper evaluates the performance of... The Counting Bloom Filter (CBF) is a kind of space-efficient data structure that extends a Bloom filter so as to allow approximate multiplicity queries on a dynamic multi-set. This paper evaluates the performance of multiplicity queries of three simple CBF schemes-the Naive Counting Bloom Filter (NCBF), the Space-Code Bloom Filter (SCBF) and the d-left Counting Bloom Filter (dlCBF)-using metrics of space complexity and counting error under both uniform and zipfian multiplicity distributions. We compare their counting error under same space complexity, and their space complexity when similar counting errors are achieved respectively. Our results show that dICBF is the best while SCBF is the worst in terms of both space-efficiency and accuracy. Furthermore, the performance gap between dlCBF and the others has a trend of being enlarged with the increment of space occupation or counting accuracy. 展开更多
关键词 Counting bloom Filter (CBF) Performance comparison
在线阅读 下载PDF
基于BLOOM FILTER过滤算法的重复数据删除技术的研究与改进
9
作者 朱珍 《电脑知识与技术》 2014年第7X期4969-4971,共3页
随着企业数据信息量的不断地增加,海量数据信息的存储和不断备份给企业的存储空间带来了巨大的存储压力。该文深入研究重复数据删除技术,并针对目前重复数据删除技术中存在的数据丢失及性能低等问题以及BLOOM FILTER算法流程和重复数据... 随着企业数据信息量的不断地增加,海量数据信息的存储和不断备份给企业的存储空间带来了巨大的存储压力。该文深入研究重复数据删除技术,并针对目前重复数据删除技术中存在的数据丢失及性能低等问题以及BLOOM FILTER算法流程和重复数据删除策略的分析和研究,提出了一种重复数据删除技术优化模型。测试分析表明,该优化模型实现了高效和安全的重复数据删除功能,节省了企业内部存储空问的存储成本开销。 展开更多
关键词 重复数据删除技术 bloom FILTER算法 哈希冲突 存储空间
在线阅读 下载PDF
The Impact of Check Bits on the Performance of Bloom Filter
10
作者 Rehan Ullah Khan Ali Mustafa Qamar +1 位作者 Suliman A.Alsuhibany Mohammed Alsuhaibani 《Computers, Materials & Continua》 SCIE EI 2022年第12期6037-6046,共10页
Bloom filter(BF)is a space-and-time efficient probabilistic technique that helps answermembership queries.However,BF faces several issues.The problems with traditional BF are generally two.Firstly,a large number of fa... Bloom filter(BF)is a space-and-time efficient probabilistic technique that helps answermembership queries.However,BF faces several issues.The problems with traditional BF are generally two.Firstly,a large number of false positives can return wrong content when the data is queried.Secondly,the large size of BF is a bottleneck in the speed of querying and thus uses large memory.In order to solve the above two issues,in this article,we propose the check bits concept.From the implementation perspective,in the check bits approach,before saving the content value in the BF,we obtain the binary representation of the content value.Then,we take some bits of the content value,we call these the check bits.These bits are stored in a separate array such that they point to the same location as the BF.Finally,the content value(data)is stored in the BF based on the hash function values.Before retrieval of data from BF,the reverse process of the steps ensures that even if the same hash functions output has been generated for the content,the check bits make sure that the retrieval does not depend on the hash output alone.This thus helps in the reduction of false positives.In the experimental evaluation,we are able to reduce more than 50%of false positives.In our proposed approach,the false positives can still occur,however,false positives can only occur if the hash functions and check bits generate the same value for a particular content.The chances of such scenarios are less,therefore,we get a reduction of approximately more than 50%false positives in all cases.We believe that the proposed approach adds to the state of the art and opens new directions as such. 展开更多
关键词 bloom filter big data network processing OPTIMIZATION check bits
在线阅读 下载PDF
基于Bloom Filter本地差分隐私的基数估计
11
作者 邱彩 王俊清 傅继彬 《科技创新与应用》 2024年第28期35-38,共4页
计算机技术和通信技术的共同发展,使得数据呈现指数大爆炸式的增长。数据中蕴含的巨大价值是有目共睹的。但是对数据集的肆意收集与分析,使用户的隐私数据处在被泄露的风险中。为保护用户的敏感数据的同时实现对基数查询的有效响应,提... 计算机技术和通信技术的共同发展,使得数据呈现指数大爆炸式的增长。数据中蕴含的巨大价值是有目共睹的。但是对数据集的肆意收集与分析,使用户的隐私数据处在被泄露的风险中。为保护用户的敏感数据的同时实现对基数查询的有效响应,提出一种基于差分隐私的隐私保护算法BFRRCE(Bloom Filter Random Response for Cardinality Estimation)。首先对用户的数据利用Bloom Filter数据结构进行数据预处理,然后利用本地差分隐私的扰动算法对数据进行扰动,达到保护用户敏感数据的目的。 展开更多
关键词 隐私保护 本地化差分隐私 bloom Filter 基数 随机响应
在线阅读 下载PDF
基于可靠性数据消冗技术的隐私大数据智能去重仿真 被引量:1
12
作者 孟锐 《电子设计工程》 2025年第9期12-16,共5页
为了提高隐私大数据去重效果,设计了基于可靠性数据消冗技术的隐私大数据智能去重仿真方法。利用纠删码技术,通过编码与译码过程增强隐私大数据的可靠性。利用Bloom filter数据消冗技术,对比可靠性增强处理后隐私大数据的hash表与hash值... 为了提高隐私大数据去重效果,设计了基于可靠性数据消冗技术的隐私大数据智能去重仿真方法。利用纠删码技术,通过编码与译码过程增强隐私大数据的可靠性。利用Bloom filter数据消冗技术,对比可靠性增强处理后隐私大数据的hash表与hash值,利用CDC分块算法设置滑动窗口,利用Rabin指纹算法运算滑动窗口内隐私大数据的指纹,完成隐私大数据分块。利用隐私大数据分块结果构建Bloom filter数据结构,设置数据对应的hash值作为隐私大数据的特征值。利用各数据特征值的相似性,更新隐私大数据对应的hash表,完成隐私大数据的智能去重处理。仿真分析结果表明,该方法可以实现文档、图像、源代码等不同类型隐私大数据的智能去重,存储开销均小于20%。 展开更多
关键词 可靠性 数据消冗技术 隐私大数据 智能去重仿真 纠删码技术 bloom filter
在线阅读 下载PDF
高效数据管理系统在大数据分析中的应用
13
作者 胡春洋 印士波 +1 位作者 刘瑞康 逯佳俊 《中国自动识别技术》 2025年第2期40-44,共5页
在大数据时代,高效的数据管理系统已成为大数据分析与应用的基础支撑。从简单的网页设计到庞大的系统构建,优化数据管理系统成为提高大数据处理效能的重要手段。本文基于大数据分析中数据管理系统的重要价值,重点介绍了Bloom Filter、Da... 在大数据时代,高效的数据管理系统已成为大数据分析与应用的基础支撑。从简单的网页设计到庞大的系统构建,优化数据管理系统成为提高大数据处理效能的重要手段。本文基于大数据分析中数据管理系统的重要价值,重点介绍了Bloom Filter、DataFrame、RDD、TDengine几种数据管理系统的工作原理和场景应用,并基于不同数据管理系统的优劣势分析,提出针对性的算法优化策略,以提升数据管理系统在大数据分析中的应用质量。 展开更多
关键词 大数据分析 高效数据管理系统 bloom Filter DataFrame RDD TDengine
在线阅读 下载PDF
Provable Data Possession with Outsourced Tag Generation for AI-Driven E-Commerce
14
作者 Yi Li Wenying Zheng +1 位作者 Yu-Sheng Su Meiqin Tang 《Computers, Materials & Continua》 2025年第5期2719-2734,共16页
AI applications have become ubiquitous,bringing significant convenience to various industries.In e-commerce,AI can enhance product recommendations for individuals and provide businesses with more accurate predictions ... AI applications have become ubiquitous,bringing significant convenience to various industries.In e-commerce,AI can enhance product recommendations for individuals and provide businesses with more accurate predictions for market strategy development.However,if the data used for AI applications is damaged or lost,it will inevitably affect the effectiveness of these AI applications.Therefore,it is essential to verify the integrity of e-commerce data.Although existing Provable Data Possession(PDP)protocols can verify the integrity of cloud data,they are not suitable for e-commerce scenarios due to the limited computational capabilities of edge servers,which cannot handle the high computational overhead of generating homomorphic verification tags in PDP.To address this issue,we propose PDP with Outsourced Tag Generation for AI-driven e-commerce,which outsources the computation of homomorphic verification tags to cloud servers while introducing a lightweight verification method to ensure that the tags match the uploaded data.Additionally,the proposed scheme supports dynamic operations such as adding,deleting,and modifying data,enhancing its practicality.Finally,experiments show that the additional computational overhead introduced by outsourcing homomorphic verification tags is acceptable compared to the original PDP. 展开更多
关键词 Provable data possession data auditing cloud computing E-COMMERCE bloom filter
在线阅读 下载PDF
基于并行BP神经网络的路由查找算法 被引量:8
15
作者 胥小波 郑康锋 +2 位作者 李丹 杨义先 钮心忻 《通信学报》 EI CSCD 北大核心 2012年第2期61-68,共8页
结合Bloom-filter算法和并行反向传播神经网络,提出了一种新的基于并行神经网络的路由查找算法(BFBP)。该算法满足路由查找的需求,只需学习路由条目的网络ID,且易于扩展到IPv6地址查询。研究结果表明,相比于己有的神经网络路由查找方法... 结合Bloom-filter算法和并行反向传播神经网络,提出了一种新的基于并行神经网络的路由查找算法(BFBP)。该算法满足路由查找的需求,只需学习路由条目的网络ID,且易于扩展到IPv6地址查询。研究结果表明,相比于己有的神经网络路由查找方法,该算法需要学习的条目数平均减少了520倍,提高了学习效率,为神经网络应用于路由查找创造了有利条件。 展开更多
关键词 神经网络 路由查找 反向传播 bloom—filter算法
在线阅读 下载PDF
Implementation and Validation of the Optimized Deduplication Strategy in Federated Cloud Environment
16
作者 Nipun Chhabra Manju Bala Vrajesh Sharma 《Computers, Materials & Continua》 SCIE EI 2022年第4期2019-2035,共17页
Cloud computing technology is the culmination of technical advancements in computer networks,hardware and software capabilities that collectively gave rise to computing as a utility.It offers a plethora of utilities t... Cloud computing technology is the culmination of technical advancements in computer networks,hardware and software capabilities that collectively gave rise to computing as a utility.It offers a plethora of utilities to its clients worldwide in a very cost-effective way and this feature is enticing users/companies to migrate their infrastructure to cloud platform.Swayed by its gigantic capacity and easy access clients are uploading replicated data on cloud resulting in an unnecessary crunch of storage in datacenters.Many data compression techniques came to rescue but none could serve the purpose for the capacity as large as a cloud,hence,researches were made to de-duplicate the data and harvest the space from exiting storage capacity which was going in vain due to duplicacy of data.For providing better cloud services through scalable provisioning of resources,interoperability has brought many Cloud Service Providers(CSPs)under one umbrella and termed it as Cloud Federation.Many policies have been devised for private and public cloud deployment models for searching/eradicating replicated copies using hashing techniques.Whereas the exploration for duplicate copies is not restricted to any one type of CSP but to a set of public or private CSPs contributing to the federation.It was found that even in advanced deduplication techniques for federated clouds,due to the different nature of CSPs,a single file is stored at private as well as public group in the same cloud federation which can be handled if an optimized deduplication strategy be rendered for addressing this issue.Therefore,this study has been aimed to further optimize a deduplication strategy for federated cloud environment and suggested a central management agent for the federation.It was perceived that work relevant to this is not existing,hence,in this paper,the concept of federation agent has been implemented and deduplication technique following file level has been used for the accomplishment of this approach. 展开更多
关键词 Federation agent deduplication in federated cloud central management agent for cloud federation interoperability in cloud computing bloom filters cloud computing cloud data storage
在线阅读 下载PDF
Functional Verification of Signature Detection Architectures for High Speed Network Applications 被引量:5
17
作者 M.Arun A.Krishnan 《International Journal of Automation and computing》 EI 2012年第4期395-402,共8页
To meet the future internet traffic challenges, enhancement of hardware architectures related to network security has vital role where software security algorithms are incompatible with high speed in terms of Giga bit... To meet the future internet traffic challenges, enhancement of hardware architectures related to network security has vital role where software security algorithms are incompatible with high speed in terms of Giga bits per second (Gbps). In this paper, we discuss signature detection technique (SDT) used in network intrusion detection system (NIDS). Design of most commonly used hardware based techniques for signature detection such as finite automata, discrete comparators, Knuth-Morris-Pratt (KMP) algorithm, content addressable memory (CAM) and Bloom filter are discussed. Two novel architectures, XOR based pre computation CAM (XPCAM) and multi stage look up technique (MSLT) Bloom filter architectures are proposed and implemented in third party field programmable gate array (FPGA), and area and power consumptions are compared. 10Gbps network traffic generator (TNTG) is used to test the functionality and ensure the reliability of the proposed architectures. Our approach involves a unique combination of algorithmic and architectural techniques that outperform some of the current techniques in terms of performance, speed and powerefficiency. 展开更多
关键词 Signature detection network intrusion detection system (NIDS) content addressable memory (CAM) bloom filter network security
原文传递
A Fast and Memory-Efficient Approach to NDN Name Lookup 被引量:4
18
作者 Dacheng He Dafang Zhang +2 位作者 Ke Xu Kun Huang Yanbiao Li 《China Communications》 SCIE CSCD 2017年第10期61-69,共9页
For name-based routing/switching in NDN, the key challenges are to manage large-scale forwarding Tables, to lookup long names of variable lengths, and to deal with frequent updates. Hashing associated with proper leng... For name-based routing/switching in NDN, the key challenges are to manage large-scale forwarding Tables, to lookup long names of variable lengths, and to deal with frequent updates. Hashing associated with proper length-detecting is a straightforward yet efficient solution. Binary search strategy can reduce the number of required hash detecting in the worst case. However, to assure the searching path correct in such a schema, either backtrack searching or redundantly storing some prefixes is required, leading to performance or memory issues as a result. In this paper, we make a deep study on the binary search, and propose a novel mechanism to ensure correct searching path without neither additional backtrack costs nor redundant memory consumptions. Along any binary search path, a bloom filter is employed at each branching point to verify whether a said prefix is present, instead of storing that prefix here. By this means, we can gain significantly optimization on memory efficiency, at the cost of bloom checking before each detecting. Our evaluation experiments on both real-world and randomly synthesized data sets demonstrate our superiorities clearly 展开更多
关键词 named data networking binary search of hash table bloom filter
在线阅读 下载PDF
Cross-Domain Data Traceability Mechanism Based on Blockchain 被引量:1
19
作者 Shoucai Zhao Lifeng Cao +2 位作者 Jinhui Li Jiling Wan Jinlong Bai 《Computers, Materials & Continua》 SCIE EI 2023年第8期2531-2549,共19页
With the application and development of blockchain technology,many problems faced by blockchain traceability are gradually exposed.Such as cross-chain information collaboration,data separation and storage,multisystem,... With the application and development of blockchain technology,many problems faced by blockchain traceability are gradually exposed.Such as cross-chain information collaboration,data separation and storage,multisystem,multi-security domain collaboration,etc.To solve these problems,it is proposed to construct trust domains based on federated chains.The public chain is used as the authorization chain to build a cross-domain data traceability mechanism applicable to multi-domain collaboration.First,the architecture of the blockchain cross-domain model is designed.Combined with the data access strategy and the decision mechanism,the open and transparent judgment of cross-domain permission and cross-domain identity authentication is realized.And the public chain consensus node election mechanism is realized based on PageRank.Then,according to the characteristics of a nonsingle chain structure in the process of data flow,a data retrievalmechanism based on a Bloom filter is designed,and the cross-domain traceability algorithm is given.Finally,the safety and effectiveness of the traceability mechanism are verified by security evaluation and performance analysis. 展开更多
关键词 Cross-domain data traceability blockchain bloom filter
在线阅读 下载PDF
A Trusted and Privacy-Preserving Carpooling Matching Scheme in Vehicular Networks 被引量:1
20
作者 Hongliang Sun Linfeng Wei +2 位作者 Libo Wang Juli Yin Wenxuan Ma 《Journal of Information Security》 2022年第1期1-22,共22页
With the rapid development of intelligent transportation, carpooling with the help of Vehicular Networks plays an important role in improving transportati<span>on efficiency and solving environmental problems. H... With the rapid development of intelligent transportation, carpooling with the help of Vehicular Networks plays an important role in improving transportati<span>on efficiency and solving environmental problems. However, attackers us</span>ually launch attacks and cause privacy leakage of carpooling users. In addition, the trust issue between unfamiliar vehicles and passengers reduces the efficiency of carpooling. To address these issues, this paper introduced a trusted and pr<span>ivacy-preserving carpooling matching scheme in Vehicular Networks (T</span>PCM). TPC<span>M scheme introduced travel preferences during carpooling matching, according to the passengers’ individual travel preferences needs, which adopt</span>ed th<span>e privacy set intersection technology based on the Bloom filter to match t</span>he passengers with the vehicles to achieve the purpose of protecting privacy an<span>d meeting the individual needs of passengers simultaneously. TPCM sch</span>eme adopted a multi-faceted trust management model, which calculated the trust val<span>ue of different travel preferences of vehicle based on passengers’ carp</span>ooling feedback to evaluate the vehicle’s trustworthiness from multi-faceted when carpooling matching. Moreover, a series of experiments were conducted to verify the effectiveness and robustness of the proposed scheme. The results show that the proposed scheme has high accuracy, lower computational and communication costs when compared with the existing carpooling schemes. 展开更多
关键词 Vehicular Networks Carpooling Matching Travel Preference bloom Filter Privacy Set Intersection Trust Management
在线阅读 下载PDF
上一页 1 2 下一页 到第
使用帮助 返回顶部