ID | 原文 | 译文 |
1343 | 在云存储环境下,云数据采用多副本存储已经成为一种流行的应用。 | In the cloud storage environment, the multiple copies are more popular. |
1344 | 针对恶意云服务提供商威胁云副本数据安全问题,提出一种基于 DDCT(Dynamic Divide and Conquer Table)表的多副本完整性审计方案。 | However, aiming at the problems ofdata dynamic operation and malicious cloud service provider attacks encountered in multi-copy data integrity audit, a multi-copy integrity audit scheme based on dynamic divide and conquer table (DDCT)is proposed. |
1345 | 首先引入DDCT 表来解决数据动态操作问题,同时表中存储副本数据的块号、版本号和时间戳等信息; | Firstly, the dynamic divideand conquer table is introduced to solve the problem of dynamic data operation, and the block number, version number andtimestamp of the copy data are stored in the table. |
1346 | 接下来为抵制恶意云服务商攻击,设计一种基于时间戳的副本数据签名认证算法; | In order to resist the malicious cloud service provider attacks, a time-basedreplica data signature authentication algorithm is designed. |
1347 | 其次提出了包括区块头和区块体的副本区块概念,区块头存储副本数据基于时间戳识别认证的签名信息,区块体存放加密的副本数据; | Secondly, it proposes the concept of replica block including blockheader and block body. The block header stores the authenticated signature information which is based on timestamp, and theblock body stores the encrypted data. |
1348 | 最后委托第三方审计机构采用基于副本时间戳的签名认证算法来审计云端多副本数据的完整性。 | Finally, the third-party auditing agency uses a replica timestamp-based signature au-thentication algorithm to audit the integrity of the multi-copy data. |
1349 | 通过安全性分析和实验对比,本方案不仅有效的防范恶意存储节点之间的攻击,而且还能防止多副本数据泄露给第三方审计机构。 | Through security analysis and experimental comparison, this solution protects data information from third-party auditors while effectively preventing malicious cloud service provider attacks. |
1350 | 随着图模型规模的扩大,单机算法难以适应大规模数据集下的子图查询。 | With the expansion of graph scale, single-machine algorithms can hardly adapt to the sub-graph queries inlarge-scale data sets. |
1351 | 而现有的分布式算法基于无索引的简单遍历,join 过程容易出现内存溢出,而且查询图分布异常时易出现负载不均衡。 | As existing distributed algorithms are based on simple traversal without index, the join process is proneto memory overflow in the distributed algorithms and load imbalance occurs when the query graph distribution is abnormal. |
1352 | 提出了一种基于谱编码的二叉索引树(SCBT-index),首先对数据图中的顶点谱编码,根据编码信息构建二叉索引树。 | Therefore, a binary index tree based on spectral coding named SCBT-index is proposed. Firstly, for vertex spectrum coding inthe data graph, a binary index tree is constructed according to the coding information. |