Topic
Data access
About: Data access is a research topic. Over the lifetime, 13141 publications have been published within this topic receiving 172859 citations. The topic is also known as: Data access.
Papers published on a yearly basis
Papers
More filters
••
TL;DR: This paper proposes a privacy-preserving data processing scheme with flexible access control based on Paillier's partial homomorphic encryption (PHE), and proves the security of the scheme and its efficiency and advantages through simulations and comparisons with existing work.
Abstract: Cloud computing provides an efficient and convenient platform for cloud users to store, process and control their data. Cloud overcomes the bottlenecks of resource-constrained user devices and greatly releases their storage and computing burdens. However, due to the lack of full trust in cloud service providers, the cloud users generally prefer to outsource their sensitive data in an encrypted form, which, however, seriously complicates data processing, analysis, as well as access control. Homomorphic encryption (HE) as a single key system cannot flexibly control data sharing and access after encrypted data processing. How to realize various computations over encrypted data in an efficient way and at the same time flexibly control the access to data processing results has been an important challenging issue. In this paper, we propose a privacy-preserving data processing scheme with flexible access control. With the cooperation of a data service provider (DSP) and a computation party (CP), our scheme, based on Paillier's partial homomorphic encryption (PHE), realizes seven basic operations, i.e., Addition , Subtraction , Multiplication , Sign Acquisition , Absolute , Comparison , and Equality Test , over outsourced encrypted data . In addition, our scheme, based on the homomorphism of attribute-based encryption (ABE), is also designed to support flexible access control over processing results of encrypted data. We further prove the security of our scheme and demonstrate its efficiency and advantages through simulations and comparisons with existing work.
69 citations
•
16 Nov 2004TL;DR: In this paper, a system and method for determining where bottlenecks in a program's data accesses occur and providing information to a software developer as to why the bottlenek occurs and what may be done to correct them.
Abstract: A system and method for determining where bottlenecks in a program's data accesses occur and providing information to a software developer as to why the bottlenecks occur and what may be done to correct them. A stream of data access references is analyzed to determine data access patterns (also called data access sequences). The stream is analyzed to find frequently repeated data access sequences (called hot data streams). Properties of the hot data streams are calculated and upon selection of a hot data stream are displayed in a development tool that associates lines of code with the hot data streams.
69 citations
01 Jan 2002
TL;DR: A prototype service has been developed, using Internet technology, that integrates and efficiently exploits diverse networked information sources to supply value-added information.
Abstract: The project SoDa (solar data) answers the needs of industry and research for infor- mation on solar radiation parameters with a satisfactory quality. The methodology is user-driven with a large involvement of users in the project, who gauge the pro- gresses and achievements. A prototype servicehas been developed, using Internet technology, that integrates and efficiently exploits diverse networked information sources to supply value-added information. Access to data and applications has been greatly improved; efforts were made on interpolation methods and satellite data processing to achieve better quality and increase time and space coverage of the in-
69 citations
••
TL;DR: A data-driven architecture for scheduling, in which the system has real time access to data and decisions can be made ahead of time, on the basis of more information, based on the architecture of cyber-physical systems.
69 citations
•
18 Jun 1999TL;DR: In this paper, the authors propose a technique to provide access to data storage pathways that connect a cluster of nodes to a data storage system in a manner that enables a failover operation to occur from a degraded first node to a second node when the first node suffers pathway degradation.
Abstract: A technique provides access to data storage pathways that connect a cluster of nodes to a data storage system in a manner that enables a failover operation to occur from a first node to a second node when the first node suffers pathway degradation forcing the first node to operate significantly slower than previously, even when the first node retains access to the data storage system through one or more available data storage pathways. Such a failover operation from the degraded first node to a second node allows the cluster as a whole to continue performing operations at a rate that is superior to that provided by the degraded first node. In one arrangement, a cluster of nodes connects to the data storage system through multiple sets of data storage pathways. A cluster framework and a set of pathway resource agents operate on the cluster of nodes. In particular, a respective portion of the cluster framework and a respective pathway resource agent operate on each node. The pathway resource agents receive, from the cluster framework, instructions for controlling the pathway sets and, in response, determine which of the pathway sets are available for transferring data between the cluster of nodes and the data storage system in accordance with predetermined access conditions. The pathway resource agents then provide, to the cluster framework, operation states identifying which of the pathway sets are available for transferring data between the cluster of nodes and the data storage system in accordance with the predetermined access conditions. The cluster framework can then access the pathway sets based on the operation states.
69 citations