767 research outputs found

    Handling Confidential Data on the Untrusted Cloud: An Agent-based Approach

    Get PDF
    Cloud computing allows shared computer and storage facilities to be used by a multitude of clients. While cloud management is centralized, the information resides in the cloud and information sharing can be implemented via off-the-shelf techniques for multiuser databases. Users, however, are very diffident for not having full control over their sensitive data. Untrusted database-as-a-server techniques are neither readily extendable to the cloud environment nor easily understandable by non-technical users. To solve this problem, we present an approach where agents share reserved data in a secure manner by the use of simple grant-and-revoke permissions on shared data.Comment: 7 pages, 9 figures, Cloud Computing 201

    iPrivacy: a Distributed Approach to Privacy on the Cloud

    Full text link
    The increasing adoption of Cloud storage poses a number of privacy issues. Users wish to preserve full control over their sensitive data and cannot accept that it to be accessible by the remote storage provider. Previous research was made on techniques to protect data stored on untrusted servers; however we argue that the cloud architecture presents a number of open issues. To handle them, we present an approach where confidential data is stored in a highly distributed database, partly located on the cloud and partly on the clients. Data is shared in a secure manner using a simple grant-and-revoke permission of shared data and we have developed a system test implementation, using an in-memory RDBMS with row-level data encryption for fine-grained data access controlComment: 13 pages, International Journal on Advances in Security 2011 vol.4 no 3 & 4. arXiv admin note: substantial text overlap with arXiv:1012.0759, arXiv:1109.355

    Identification of ferredoxin II as a major calcium binding protein in the nitrogen-fixing symbiotic bacterium Mesorhizobium loti

    Get PDF
    BACKGROUND: Legumes establish with rhizobial bacteria a nitrogen-fixing symbiosis which is of the utmost importance for both plant nutrition and a sustainable agriculture. Calcium is known to act as a key intracellular messenger in the perception of symbiotic signals by both the host plant and the microbial partner. Regulation of intracellular free Ca(2+) concentration, which is a fundamental prerequisite for any Ca(2+)-based signalling system, is accomplished by complex mechanisms including Ca(2+) binding proteins acting as Ca(2+) buffers. In this work we investigated the occurrence of Ca(2+) binding proteins in Mesorhizobium loti, the specific symbiotic partner of the model legume Lotus japonicus. RESULTS: A soluble, low molecular weight protein was found to share several biochemical features with the eukaryotic Ca(2+)-binding proteins calsequestrin and calreticulin, such as Stains-all blue staining on SDS-PAGE, an acidic isoelectric point and a Ca(2+)-dependent shift of electrophoretic mobility. The protein was purified to homogeneity by an ammonium sulfate precipitation procedure followed by anion-exchange chromatography on DEAE-Cellulose and electroendosmotic preparative electrophoresis. The Ca(2+) binding ability of the M. loti protein was demonstrated by (45)Ca(2+)-overlay assays. ESI-Q-TOF MS/MS analyses of the peptides generated after digestion with either trypsin or endoproteinase AspN identified the rhizobial protein as ferredoxin II and confirmed the presence of Ca(2+) adducts. CONCLUSIONS: The present data indicate that ferredoxin II is a major Ca(2+) binding protein in M. loti that may participate in Ca(2+) homeostasis and suggest an evolutionarily ancient origin for protein-based Ca(2+) regulatory systems. ELECTRONIC SUPPLEMENTARY MATERIAL: The online version of this article (doi:10.1186/s12866-015-0352-5) contains supplementary material, which is available to authorized users

    A graph-based meta-model for heterogeneous data management

    Get PDF
    The wave of interest in data-centric applications has spawned a high variety of data models, making it extremely difficult to evaluate, integrate or access them in a uniform way. Moreover, many recent models are too specific to allow immediate comparison with the others and do not easily support incremental model design. In this paper, we introduce GSMM, a meta-model based on the use of a generic graph that can be instantiated to a concrete data model by simply providing values for a restricted set of parameters and some high-level constraints, themselves represented as graphs. In GSMM, the concept of data schema is replaced by that of constraint, which allows the designer to impose structural restrictions on data in a very flexible way. GSMM includes GSL, a graph-based language for expressing queries and constraints that besides being applicable to data represented in GSMM, in principle, can be specialised and used for existing models where no language was defined. We show some sample applications of GSMM for deriving and comparing classical data models like the relational model, plain XML data, XML Schema, and time-varying semistructured data. We also show how GSMM can represent more recent modelling proposals: the triple stores, the BigTable model and Neo4j, a graph-based model for NoSQL data. A prototype showing the potential of the approach is also described

    Towards Certification of Machine Learning-Based Distributed Systems

    Full text link
    Machine Learning (ML) is increasingly used to drive the operation of complex distributed systems deployed on the cloud-edge continuum enabled by 5G. Correspondingly, distributed systems' behavior is becoming more non-deterministic in nature. This evolution of distributed systems requires the definition of new assurance approaches for the verification of non-functional properties. Certification, the most popular assurance technique for system and software verification, is not immediately applicable to systems whose behavior is determined by Machine Learning-based inference. However, there is an increasing push from policy makers, regulators, and industrial stakeholders towards the definition of techniques for the certification of non-functional properties (e.g., fairness, robustness, privacy) of ML. This article analyzes the challenges and deficiencies of current certification schemes, discusses open research issues and proposes a first certification scheme for ML-based distributed systems.Comment: 5 pages, 1 figure, 1 tabl

    Ontology based recommender system using social network data

    Get PDF
    Online Social Network (OSN) is considered a key source of information for real-time decision making. However, several constraints lead to decreasing the amount of information that a researcher can have while increasing the time of social network mining procedures. In this context, this paper proposes a new framework for sampling Online Social Network (OSN). Domain knowledge is used to define tailored strategies that can decrease the budget and time required for mining while increasing the recall. An ontology supports our filtering layer in evaluating the relatedness of nodes. Our approach demonstrates that the same mechanism can be advanced to prompt recommendations to users. Our test cases and experimental results emphasize the importance of the strategy definition step in our social miner and the application of ontologies on the knowledge graph in the domain of recommendation analysis
    • …
    corecore