7,143 research outputs found

    The Regulation of Migration in a Transition Economy: China’s Hukou System

    Get PDF
    Unlike most countries, China regulates internal migration. Public benefits, access to good quality housing, schools, health care, and attractive employment opportunities are available only to those who have local registration (Hukou). Coincident with the deepening of economic reforms, Hukou has gradually been relaxed since the 1980s, helping to explain an extraordinary surge of migration within China. In this study of interprovincial Chinese migration, we address two questions. First, what is a sensible way of incorporating Hukou into theoretical and empirical models of internal migration? Second, to what extent has Hukou influenced the scale and structure of migration? We incorporate two alternative measures of Hukou into a modified gravity model – the unregistered migrant's: (i) perceived probability of securing Hukou; and (ii) perceived probability of securing employment opportunities available only to those with Hukou. In contrast to previous studies, our model includes a much wider variety of control especially important for the Chinese case. Analyzing the relationship between Hukou and migration using census data for 1985-90, 1995-2000 and 2000-05, we find that migration is very sensitive to Hukou, with the greatest sensitivity occurring during the middle period.internal migration, Hukou, migrant networks, reforms

    The Proposed Framework for Cloud Computing System Security and Privacy Services

    Get PDF
    Public cloud computing has emerged as a popular and efficient solution for organizations to store, process, and access their data and applications. However, with the increasing adoption of public cloud services, concerns regarding security have become a critical factor in decision-making processes. This study aims to investigate the security aspects of public cloud computing and identify potential vulnerabilities and threats that organizations may face. The aim of this study is to examine the challenges associated with cloud computing and its security concerns. Cloud computing is a technology that utilizes the internet to share data and resources. It is characterized by five key features: On-Demand self-service, Resource Pooling, Broad network access, Rapid elasticity, and Measured Service. However, despite these benefits, cloud computing has several open issues, including Security, Availability, Scalability, and Interoperability. Traditional security techniques are insufficient in fully securing cloud computing. Security and privacy issues often arise during cloud deployment and delivery models. As a result, researchers are interested in learning more about cloud computing security and its methods. Industries are creating architectural models with a high level of protection for their data center to solve current security challenges. This article examines the security of cloud deployment strategies and analyzes cloud security and privacy challenges. The cloud computing service models are also discussed, along with any security issues. The study emphasizes the significance of Audit as a key factor in offering a security solution that covers all relevant security characteristics as determined by the literature. The study's conclusions present a fresh challenge to cloud service providers and suggest a new security paradigm that explains customer security needs. Overall, this study offers a parameter-by-parameter assessment of available security solutions and makes recommendations for enhancements to address cloud security issues

    Computing on Masked Data to improve the Security of Big Data

    Full text link
    Organizations that make use of large quantities of information require the ability to store and process data from central locations so that the product can be shared or distributed across a heterogeneous group of users. However, recent events underscore the need for improving the security of data stored in such untrusted servers or databases. Advances in cryptographic techniques and database technologies provide the necessary security functionality but rely on a computational model in which the cloud is used solely for storage and retrieval. Much of big data computation and analytics make use of signal processing fundamentals for computation. As the trend of moving data storage and computation to the cloud increases, homeland security missions should understand the impact of security on key signal processing kernels such as correlation or thresholding. In this article, we propose a tool called Computing on Masked Data (CMD), which combines advances in database technologies and cryptographic tools to provide a low overhead mechanism to offload certain mathematical operations securely to the cloud. This article describes the design and development of the CMD tool.Comment: 6 pages, Accepted to IEEE HST Conferenc

    A threshold secure data sharing scheme for federated clouds

    Full text link
    Cloud computing allows users to view computing in a new direction, as it uses the existing technologies to provide better IT services at low-cost. To offer high QOS to customers according SLA, cloud services broker or cloud service provider uses individual cloud providers that work collaboratively to form a federation of clouds. It is required in applications like Real-time online interactive applications, weather research and forecasting etc., in which the data and applications are complex and distributed. In these applications secret data should be shared, so secure data sharing mechanism is required in Federated clouds to reduce the risk of data intrusion, the loss of service availability and to ensure data integrity. So In this paper we have proposed zero knowledge data sharing scheme where Trusted Cloud Authority (TCA) will control federated clouds for data sharing where the secret to be exchanged for computation is encrypted and retrieved by individual cloud at the end. Our scheme is based on the difficulty of solving the Discrete Logarithm problem (DLOG) in a finite abelian group of large prime order which is NP-Hard. So our proposed scheme provides data integrity in transit, data availability when one of host providers are not available during the computation.Comment: 8 pages, 3 Figures, International Journal of Research in Computer Science 2012. arXiv admin note: text overlap with arXiv:1003.3920 by other author
    • …
    corecore