Awareness on nutritive value and health benefits of rice is of vital importance in order to increase the consumption of rice in daily diet of the human beings. In this study, a total of six aromatic and two non-aromat...Awareness on nutritive value and health benefits of rice is of vital importance in order to increase the consumption of rice in daily diet of the human beings. In this study, a total of six aromatic and two non-aromatic rice accessions grown in India were analysed for their nutritional quality attributes including proximate composition, mineral contents and fatty acids. Data with three replications were used to measure Pearson's simple correlation co-efficient in order to establish the relationship among various nutritional quality attributes. The result on proximate composition showed that Govind Bhog had the highest moisture(13.57%) and fat(0.92%) content, which signifies its tasty attribute. Badshah Bhog exhibited the highest fibre content(0.85%), carbohydrate content(82.70%) and food energy(365.23 k Cal per 100 g). Among the minerals, the higher Ca(98.75 mg/kg), Zn(17.00 mg/kg) and Fe(31.50 mg/kg) were in Gopal Bhog, whereas the highest Na(68.85 mg/kg) was in Badshah Bhog, the highest K(500.00 mg/kg) was in Swetganga, Khushboo and Sarbati. The highest contents of unsaturated fatty acids viz. oleic acid(49.14%), linoleic acid(46.99%) and linolenic acid(1.27%) were found in Sarbati, whereas the highest content of saturated fatty acids viz. myristic acid(4.60%) and palmitic acid(31.91%) were found in Govind Bhog and stearic acid(6.47%) in Todal. The identified aromatic rice accessions Gopal Bhog, Govind Bhog and Badshah Bhog and non-aromatic rice accession Sarbati were found nutritionally superior among all eight tested accessions. The nutritional quality oriented attributes in this study were competent with recognized prominent aromatic and non-aromatic rice accessions as an index of their nutritional worth and recommend to farmers and consumers which may be graded as export quality rice with good unique nutritional values in international market.展开更多
Cloud storage is a service involving cloud service providers providingstorage space to customers. Cloud storage services have numerous advantages,including convenience, high computation, and capacity, thereby attracti...Cloud storage is a service involving cloud service providers providingstorage space to customers. Cloud storage services have numerous advantages,including convenience, high computation, and capacity, thereby attracting usersto outsource data in the cloud. However, users outsource data directly via cloudstage services that are unsafe when outsourcing data is sensitive for users. Therefore, cipher text-policy attribute-based encryption is a promising cryptographicsolution in a cloud environment, and can be drawn up for access control by dataowners (DO) to define access policy. Unfortunately, an outsourced architectureapplied with attribute-based encryption introduces numerous challenges, including revocation. This issue is a threat to the data security of DO. Furthermore,highly secure and flexible cipher text-based attribute access control with role hierarchy user grouping in cloud storage is implemented by extending the KUNodes(revocation) storage identity-based encryption. Result is evaluated using Cloudsim, and our algorithm outperforms in terms of computational cost by consuming32 MB for 150-MB files.展开更多
In recent years,the rapid development of Internet of Things(IoT)technology has led to a significant increase in the amount of data stored in the cloud.However,traditional IoT systems rely primarily on cloud data cente...In recent years,the rapid development of Internet of Things(IoT)technology has led to a significant increase in the amount of data stored in the cloud.However,traditional IoT systems rely primarily on cloud data centers for information storage and user access control services.This practice creates the risk of privacy breaches on IoT data sharing platforms,including issues such as data tampering and data breaches.To address these concerns,blockchain technology,with its inherent properties such as tamper-proof and decentralization,has emerged as a promising solution that enables trusted sharing of IoT data.Still,there are challenges to implementing encrypted data search in this context.This paper proposes a novel searchable attribute cryptographic access control mechanism that facilitates trusted cloud data sharing.Users can use keywords To efficiently search for specific data and decrypt content keys when their properties are consistent with access policies.In this way,cloud service providers will not be able to access any data privacy-related information,ensuring the security and trustworthiness of data sharing,as well as the protection of user data privacy.Our simulation results show that our approach outperforms existing studies in terms of time overhead.Compared to traditional access control schemes,our approach reduces data encryption time by 33%,decryption time by 5%,and search time by 75%.展开更多
Cloud computing has become a significant computing model in the IT industry. In this emerging model,computing resources such as software, hardware, networking, and storage can be accessed anywhere in the world on a pa...Cloud computing has become a significant computing model in the IT industry. In this emerging model,computing resources such as software, hardware, networking, and storage can be accessed anywhere in the world on a pay-per-use basis. However, storing sensitive data on un-trusted servers is a challenging issue for this model. To guarantee confidentiality and proper access control of outsourced sensitive data, classical encryption techniques are used. However, such access control schemes are not feasible in cloud computing because of their lack of flexibility, scalability, and fine-grained access control. Instead, Attribute-Based Encryption(ABE) techniques are used in the cloud. This paper extensively surveys all ABE schemes and creates a comparison table for the key criteria for these schemes in cloud applications.展开更多
基金financially supported by Department of Science and Technology,Ministry of Science and Technology,Government of India for an individual research fellowship(Grant No.IF120725 2012/686)
文摘Awareness on nutritive value and health benefits of rice is of vital importance in order to increase the consumption of rice in daily diet of the human beings. In this study, a total of six aromatic and two non-aromatic rice accessions grown in India were analysed for their nutritional quality attributes including proximate composition, mineral contents and fatty acids. Data with three replications were used to measure Pearson's simple correlation co-efficient in order to establish the relationship among various nutritional quality attributes. The result on proximate composition showed that Govind Bhog had the highest moisture(13.57%) and fat(0.92%) content, which signifies its tasty attribute. Badshah Bhog exhibited the highest fibre content(0.85%), carbohydrate content(82.70%) and food energy(365.23 k Cal per 100 g). Among the minerals, the higher Ca(98.75 mg/kg), Zn(17.00 mg/kg) and Fe(31.50 mg/kg) were in Gopal Bhog, whereas the highest Na(68.85 mg/kg) was in Badshah Bhog, the highest K(500.00 mg/kg) was in Swetganga, Khushboo and Sarbati. The highest contents of unsaturated fatty acids viz. oleic acid(49.14%), linoleic acid(46.99%) and linolenic acid(1.27%) were found in Sarbati, whereas the highest content of saturated fatty acids viz. myristic acid(4.60%) and palmitic acid(31.91%) were found in Govind Bhog and stearic acid(6.47%) in Todal. The identified aromatic rice accessions Gopal Bhog, Govind Bhog and Badshah Bhog and non-aromatic rice accession Sarbati were found nutritionally superior among all eight tested accessions. The nutritional quality oriented attributes in this study were competent with recognized prominent aromatic and non-aromatic rice accessions as an index of their nutritional worth and recommend to farmers and consumers which may be graded as export quality rice with good unique nutritional values in international market.
文摘Cloud storage is a service involving cloud service providers providingstorage space to customers. Cloud storage services have numerous advantages,including convenience, high computation, and capacity, thereby attracting usersto outsource data in the cloud. However, users outsource data directly via cloudstage services that are unsafe when outsourcing data is sensitive for users. Therefore, cipher text-policy attribute-based encryption is a promising cryptographicsolution in a cloud environment, and can be drawn up for access control by dataowners (DO) to define access policy. Unfortunately, an outsourced architectureapplied with attribute-based encryption introduces numerous challenges, including revocation. This issue is a threat to the data security of DO. Furthermore,highly secure and flexible cipher text-based attribute access control with role hierarchy user grouping in cloud storage is implemented by extending the KUNodes(revocation) storage identity-based encryption. Result is evaluated using Cloudsim, and our algorithm outperforms in terms of computational cost by consuming32 MB for 150-MB files.
基金supported by the Science and Technology Project of State Grid Corporation of China(5700-202328293A-1-1-ZN).
文摘In recent years,the rapid development of Internet of Things(IoT)technology has led to a significant increase in the amount of data stored in the cloud.However,traditional IoT systems rely primarily on cloud data centers for information storage and user access control services.This practice creates the risk of privacy breaches on IoT data sharing platforms,including issues such as data tampering and data breaches.To address these concerns,blockchain technology,with its inherent properties such as tamper-proof and decentralization,has emerged as a promising solution that enables trusted sharing of IoT data.Still,there are challenges to implementing encrypted data search in this context.This paper proposes a novel searchable attribute cryptographic access control mechanism that facilitates trusted cloud data sharing.Users can use keywords To efficiently search for specific data and decrypt content keys when their properties are consistent with access policies.In this way,cloud service providers will not be able to access any data privacy-related information,ensuring the security and trustworthiness of data sharing,as well as the protection of user data privacy.Our simulation results show that our approach outperforms existing studies in terms of time overhead.Compared to traditional access control schemes,our approach reduces data encryption time by 33%,decryption time by 5%,and search time by 75%.
文摘Cloud computing has become a significant computing model in the IT industry. In this emerging model,computing resources such as software, hardware, networking, and storage can be accessed anywhere in the world on a pay-per-use basis. However, storing sensitive data on un-trusted servers is a challenging issue for this model. To guarantee confidentiality and proper access control of outsourced sensitive data, classical encryption techniques are used. However, such access control schemes are not feasible in cloud computing because of their lack of flexibility, scalability, and fine-grained access control. Instead, Attribute-Based Encryption(ABE) techniques are used in the cloud. This paper extensively surveys all ABE schemes and creates a comparison table for the key criteria for these schemes in cloud applications.