scispace - formally typeset
Search or ask a question
Topic

Data access

About: Data access is a research topic. Over the lifetime, 13141 publications have been published within this topic receiving 172859 citations. The topic is also known as: Data access.


Papers
More filters
Journal ArticleDOI
TL;DR: This paper proposes a privacy-preserving data processing scheme with flexible access control based on Paillier's partial homomorphic encryption (PHE), and proves the security of the scheme and its efficiency and advantages through simulations and comparisons with existing work.
Abstract: Cloud computing provides an efficient and convenient platform for cloud users to store, process and control their data. Cloud overcomes the bottlenecks of resource-constrained user devices and greatly releases their storage and computing burdens. However, due to the lack of full trust in cloud service providers, the cloud users generally prefer to outsource their sensitive data in an encrypted form, which, however, seriously complicates data processing, analysis, as well as access control. Homomorphic encryption (HE) as a single key system cannot flexibly control data sharing and access after encrypted data processing. How to realize various computations over encrypted data in an efficient way and at the same time flexibly control the access to data processing results has been an important challenging issue. In this paper, we propose a privacy-preserving data processing scheme with flexible access control. With the cooperation of a data service provider (DSP) and a computation party (CP), our scheme, based on Paillier's partial homomorphic encryption (PHE), realizes seven basic operations, i.e., Addition , Subtraction , Multiplication , Sign Acquisition , Absolute , Comparison , and Equality Test , over outsourced encrypted data . In addition, our scheme, based on the homomorphism of attribute-based encryption (ABE), is also designed to support flexible access control over processing results of encrypted data. We further prove the security of our scheme and demonstrate its efficiency and advantages through simulations and comparisons with existing work.

69 citations

Patent
Trishul Chilimbi1
16 Nov 2004
TL;DR: In this paper, a system and method for determining where bottlenecks in a program's data accesses occur and providing information to a software developer as to why the bottlenek occurs and what may be done to correct them.
Abstract: A system and method for determining where bottlenecks in a program's data accesses occur and providing information to a software developer as to why the bottlenecks occur and what may be done to correct them. A stream of data access references is analyzed to determine data access patterns (also called data access sequences). The stream is analyzed to find frequently repeated data access sequences (called hot data streams). Properties of the hot data streams are calculated and upon selection of a hot data stream are displayed in a development tool that associates lines of code with the hot data streams.

69 citations

01 Jan 2002
TL;DR: A prototype service has been developed, using Internet technology, that integrates and efficiently exploits diverse networked information sources to supply value-added information.
Abstract: The project SoDa (solar data) answers the needs of industry and research for infor- mation on solar radiation parameters with a satisfactory quality. The methodology is user-driven with a large involvement of users in the project, who gauge the pro- gresses and achievements. A prototype servicehas been developed, using Internet technology, that integrates and efficiently exploits diverse networked information sources to supply value-added information. Access to data and applications has been greatly improved; efforts were made on interpolation methods and satellite data processing to achieve better quality and increase time and space coverage of the in-

69 citations

Journal ArticleDOI
TL;DR: A data-driven architecture for scheduling, in which the system has real time access to data and decisions can be made ahead of time, on the basis of more information, based on the architecture of cyber-physical systems.

69 citations

Patent
James B. Lim1
18 Jun 1999
TL;DR: In this paper, the authors propose a technique to provide access to data storage pathways that connect a cluster of nodes to a data storage system in a manner that enables a failover operation to occur from a degraded first node to a second node when the first node suffers pathway degradation.
Abstract: A technique provides access to data storage pathways that connect a cluster of nodes to a data storage system in a manner that enables a failover operation to occur from a first node to a second node when the first node suffers pathway degradation forcing the first node to operate significantly slower than previously, even when the first node retains access to the data storage system through one or more available data storage pathways. Such a failover operation from the degraded first node to a second node allows the cluster as a whole to continue performing operations at a rate that is superior to that provided by the degraded first node. In one arrangement, a cluster of nodes connects to the data storage system through multiple sets of data storage pathways. A cluster framework and a set of pathway resource agents operate on the cluster of nodes. In particular, a respective portion of the cluster framework and a respective pathway resource agent operate on each node. The pathway resource agents receive, from the cluster framework, instructions for controlling the pathway sets and, in response, determine which of the pathway sets are available for transferring data between the cluster of nodes and the data storage system in accordance with predetermined access conditions. The pathway resource agents then provide, to the cluster framework, operation states identifying which of the pathway sets are available for transferring data between the cluster of nodes and the data storage system in accordance with the predetermined access conditions. The cluster framework can then access the pathway sets based on the operation states.

69 citations


Network Information
Related Topics (5)
Software
130.5K papers, 2M citations
86% related
Cloud computing
156.4K papers, 1.9M citations
86% related
Cluster analysis
146.5K papers, 2.9M citations
85% related
The Internet
213.2K papers, 3.8M citations
85% related
Information system
107.5K papers, 1.8M citations
83% related
Performance
Metrics
No. of papers in the topic in previous years
YearPapers
202351
2022125
2021403
2020721
2019906
2018816