期刊文献+
共找到4篇文章
< 1 >
每页显示 20 50 100
Proximate Composition,Mineral Content and Fatty Acids Analyses of Aromatic and Non-Aromatic Indian Rice 被引量:12
1
作者 Deepak Kumar VERMA Prem Prakash SRIVASTAV 《Rice science》 SCIE CSCD 2017年第1期21-31,共11页
Awareness on nutritive value and health benefits of rice is of vital importance in order to increase the consumption of rice in daily diet of the human beings. In this study, a total of six aromatic and two non-aromat... Awareness on nutritive value and health benefits of rice is of vital importance in order to increase the consumption of rice in daily diet of the human beings. In this study, a total of six aromatic and two non-aromatic rice accessions grown in India were analysed for their nutritional quality attributes including proximate composition, mineral contents and fatty acids. Data with three replications were used to measure Pearson's simple correlation co-efficient in order to establish the relationship among various nutritional quality attributes. The result on proximate composition showed that Govind Bhog had the highest moisture(13.57%) and fat(0.92%) content, which signifies its tasty attribute. Badshah Bhog exhibited the highest fibre content(0.85%), carbohydrate content(82.70%) and food energy(365.23 k Cal per 100 g). Among the minerals, the higher Ca(98.75 mg/kg), Zn(17.00 mg/kg) and Fe(31.50 mg/kg) were in Gopal Bhog, whereas the highest Na(68.85 mg/kg) was in Badshah Bhog, the highest K(500.00 mg/kg) was in Swetganga, Khushboo and Sarbati. The highest contents of unsaturated fatty acids viz. oleic acid(49.14%), linoleic acid(46.99%) and linolenic acid(1.27%) were found in Sarbati, whereas the highest content of saturated fatty acids viz. myristic acid(4.60%) and palmitic acid(31.91%) were found in Govind Bhog and stearic acid(6.47%) in Todal. The identified aromatic rice accessions Gopal Bhog, Govind Bhog and Badshah Bhog and non-aromatic rice accession Sarbati were found nutritionally superior among all eight tested accessions. The nutritional quality oriented attributes in this study were competent with recognized prominent aromatic and non-aromatic rice accessions as an index of their nutritional worth and recommend to farmers and consumers which may be graded as export quality rice with good unique nutritional values in international market. 展开更多
关键词 aromatic unsaturated nutritional proximate accession carbohydrate oleic vital competent attribute
在线阅读 下载PDF
Hybrid Cloud Security by Revocable KUNodes-Storage with Identity-Based Encryption
2
作者 S.Saravanakumar S.Chitra 《Computer Systems Science & Engineering》 SCIE EI 2022年第12期985-996,共12页
Cloud storage is a service involving cloud service providers providingstorage space to customers. Cloud storage services have numerous advantages,including convenience, high computation, and capacity, thereby attracti... Cloud storage is a service involving cloud service providers providingstorage space to customers. Cloud storage services have numerous advantages,including convenience, high computation, and capacity, thereby attracting usersto outsource data in the cloud. However, users outsource data directly via cloudstage services that are unsafe when outsourcing data is sensitive for users. Therefore, cipher text-policy attribute-based encryption is a promising cryptographicsolution in a cloud environment, and can be drawn up for access control by dataowners (DO) to define access policy. Unfortunately, an outsourced architectureapplied with attribute-based encryption introduces numerous challenges, including revocation. This issue is a threat to the data security of DO. Furthermore,highly secure and flexible cipher text-based attribute access control with role hierarchy user grouping in cloud storage is implemented by extending the KUNodes(revocation) storage identity-based encryption. Result is evaluated using Cloudsim, and our algorithm outperforms in terms of computational cost by consuming32 MB for 150-MB files. 展开更多
关键词 Cloud computing storage identification based revocation attribute based access control encryption DECRYPTION
在线阅读 下载PDF
Secure and trusted sharing mechanism of private data for Internet of Things
3
作者 Mengyuan Li Shaoyong Guo +6 位作者 Wenjing Li Ao Xiong Xiaoming Zhou Jun Qi Feng Qi Dong Wang Da Li 《High-Confidence Computing》 2025年第2期55-63,共9页
In recent years,the rapid development of Internet of Things(IoT)technology has led to a significant increase in the amount of data stored in the cloud.However,traditional IoT systems rely primarily on cloud data cente... In recent years,the rapid development of Internet of Things(IoT)technology has led to a significant increase in the amount of data stored in the cloud.However,traditional IoT systems rely primarily on cloud data centers for information storage and user access control services.This practice creates the risk of privacy breaches on IoT data sharing platforms,including issues such as data tampering and data breaches.To address these concerns,blockchain technology,with its inherent properties such as tamper-proof and decentralization,has emerged as a promising solution that enables trusted sharing of IoT data.Still,there are challenges to implementing encrypted data search in this context.This paper proposes a novel searchable attribute cryptographic access control mechanism that facilitates trusted cloud data sharing.Users can use keywords To efficiently search for specific data and decrypt content keys when their properties are consistent with access policies.In this way,cloud service providers will not be able to access any data privacy-related information,ensuring the security and trustworthiness of data sharing,as well as the protection of user data privacy.Our simulation results show that our approach outperforms existing studies in terms of time overhead.Compared to traditional access control schemes,our approach reduces data encryption time by 33%,decryption time by 5%,and search time by 75%. 展开更多
关键词 Searchable encryption attribute access control Privacy protection Data sharing Keyword search
在线阅读 下载PDF
Analysis of Classical Encryption Techniques in Cloud Computing 被引量:1
4
作者 Muhammad Yasir Shabir Asif Iqbal +1 位作者 Zahid Mahmood Ata Ullah Ghafoor 《Tsinghua Science and Technology》 SCIE EI CAS CSCD 2016年第1期102-113,共12页
Cloud computing has become a significant computing model in the IT industry. In this emerging model,computing resources such as software, hardware, networking, and storage can be accessed anywhere in the world on a pa... Cloud computing has become a significant computing model in the IT industry. In this emerging model,computing resources such as software, hardware, networking, and storage can be accessed anywhere in the world on a pay-per-use basis. However, storing sensitive data on un-trusted servers is a challenging issue for this model. To guarantee confidentiality and proper access control of outsourced sensitive data, classical encryption techniques are used. However, such access control schemes are not feasible in cloud computing because of their lack of flexibility, scalability, and fine-grained access control. Instead, Attribute-Based Encryption(ABE) techniques are used in the cloud. This paper extensively surveys all ABE schemes and creates a comparison table for the key criteria for these schemes in cloud applications. 展开更多
关键词 cloud computing access control fine-grained access weighted attribute
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部