Search

  • Select Article Type
  • Abstract Supplements
  • Blood Group Review
  • Call to Arms
  • Hypothesis
  • In Memoriam
  • Interview
  • Introduction
  • Short Report
  • abstract
  • Abstracts
  • Article
  • book-review
  • case-report
  • case-study
  • Clinical Practice
  • Commentary
  • Conference Presentation
  • conference-report
  • congress-report
  • Correction
  • Editorial
  • Editorial Comment
  • Erratum
  • Events
  • Letter
  • Letter to Editor
  • mini-review
  • minireview
  • News
  • non-scientific
  • Obituary
  • original-paper
  • Original Research
  • Pictorial Review
  • Position Paper
  • Practice Report
  • Preface
  • Preliminary report
  • Product Review
  • rapid-communication
  • Report
  • research-article
  • Research Communicate
  • research-paper
  • Research Report
  • Review
  • review -article
  • review-article
  • Review Paper
  • Sampling Methods
  • Scientific Commentary
  • short-communication
  • short-report
  • Student Essay
  • Varia
  • Welome
  • Select Journal
  • International Journal Advanced Network Monitoring Controls

 

Article | 11-April-2018

GrandStore: Towards Large-Scale Free Personal Cloud Storage

Personal cloud storage services are gaining popularity, such as SkyDrive, iCloud, Dropbox, etc. All of them provide a certain amount of free storage space for individual users, while the free space is quite limit, and you should upgrade to a paid account to get extra space. Therefore, a new approach is proposed in this paper, that many free personal cloud storage accounts are integrated in order to realize large-scale free personal cloud storage. A prototype system called GrandStore is designed

Li Zhang, Bing Tang

International Journal of Advanced Network, Monitoring and Controls, Volume 2 , ISSUE 3, 78–83

Article | 01-October-2019

Searchable Re-encryption Cloud Storage Method Based on Markov Chain

I. INTRODUCTION In order to meet the various storage demands, cloud storage is designed to store data in cloud and is widely used in the Internet. Compared with traditional data storage, it greatly improves the efficiency of the mass data storage and utilization of network resource. However, access from a mobile device to data, stored in a cloud, leads to poor client quality experience [1-3]. It is essential to reduce user download wait time for a requested file from a network to enhance client

Wang Hui, Wang Zhong Sheng, Li Jinguang

International Journal of Advanced Network, Monitoring and Controls, Volume 3 , ISSUE 3, 29–46

Article | 24-April-2018

Fine-grained Access Control Scheme Based on Cloud Storage

Cloud storage originates from cloud computing, and brings new model of data sharing and storage, which provided great convenience for users. However, cloud environment confronts with many problems, and one of the most important problems is the security problem. This paper researched on security problem based on encryption, and proposed a secure and efficient scheme according to system characteristics of data storage on cloud platform, and applied it in cloud storage system with fine-grained

Xiaojie Niu

International Journal of Advanced Network, Monitoring and Controls, Volume 2 , ISSUE 4, 207–210

Article | 08-April-2018

A Mobile Terminal Security Strategy Based On the Cloud Storage

With the emergence of mass storage systems and the development of the Distributed File System, Cloud storage system has become the focus of the industry. The cloud storage services on mobile terminal have been putted on the agenda based on the rapid development of intelligent mobile terminal. Based on the analysis of the architecture of HDFS and Dynamo, a mobile Terminal Security strategy is presented in this paper. The database technology and the dynamic consistent hashing algorithm are

Wang Hui, Tang Junyong

International Journal of Advanced Network, Monitoring and Controls, Volume 2 , ISSUE 2, 46–59

Article | 07-May-2018

A Searchable Re-encryption Storage Method in Cloud Environment

Traditional cloud storage systems do not adapt well to different application environment and does not guarantee the integrity and confidentiality of cloud data. In order to solve the problems brought by the hysteretic and density in the cloud storage system,A Searchable Re-encryption Storage Method (SReCSM) is proposed in this paper. The central idea of the SReCSM is to generate a re-encryption key and decrypte while the keyword matched. Simulation results show that SReCSM introduced in this

Wang Hui, Hong Bo, Tang Junyong

International Journal of Advanced Network, Monitoring and Controls, Volume 3 , ISSUE 2, 89–94

Article | 30-November-2018

The Shortcomings of Ipv6 and Upgrade of Ipv4

IPv6 is a solution to the problem of running out of IPv4 addresses. In other words, it is to upgrade the IP address because the original number of IPv4 addresses is not enough to assign to more computers. The first version of IPv6 appeared in 1995, at that time the internet is in its infancy, with the development of Internet of things, big data and cloud storage technologies being gradually applied in the last decade, IPv6 has certain defects in the design of its address structure by the

Tao Wang, Jiaqiong Gao

International Journal of Advanced Network, Monitoring and Controls, Volume 4 , ISSUE 1, 1–9

Article | 30-November-2018

Research and Design of Next Generation Internet (IPV9) Datagram

, big data and cloud storage, IPv6 has some shortcomings in its address structure design, security and network sovereignty. The Chinese researchers developed a new generation Internet (IPV9) datagram by researching the existed IPv4 and IPv6, and it is based on the method of assigning addresses to computers connected to the Internet by full decimal character code. It is a subsequent version with RFC1606, RFC1607, a new generation of network data structure, it is not the updating of IPv4 and IPv6, it

Zhongsheng Wang, Jianping Xie, Zhao Lin, Wei Zhong

International Journal of Advanced Network, Monitoring and Controls, Volume 4 , ISSUE 1, 10–28

No Record Found..
Page Actions