Storage Protocol

14,000,000 Leading Edge Experts on the ideXlab platform

Scan Science and Technology

Contact Leading Edge Experts & Companies

Scan Science and Technology

Contact Leading Edge Experts & Companies

The Experts below are selected from a list of 34140 Experts worldwide ranked by ideXlab platform

P Campíns-falcó - One of the best experts on this subject based on the ideXlab platform.

  • Influence of water sample Storage Protocols in chemiluminescence detection of trace elements.
    Talanta, 2003
    Co-Authors: Y Moliner-martínez, S Meseguer-lloret, L A Tortajada-genaro, P Campíns-falcó
    Abstract:

    This paper shows the influence of different sample Storage Protocols, on the chemiluminescence signal of some metal ions. The Storage Protocols studied were: acid addition (HCl or HNO(3)) and no reagent addition to filtered and refrigerated (T=4 degrees C) samples. Light emission was produced for the chemiluminescence reaction between luminol and hydrogen peroxide in buffer carbonate conditions (pH 10.8) catalysed by Cr(III), Co(II) and Cu(II). Batch and/or flow modes in different conditions were tested. Fe(II), Fe(III), Ni(II) and Mn(II) did not give chemiluminescence in the studied conditions. A parallel study of sensitivity and selectivity was performed. Then the presence or absence of the masking agent EDTA, added to samples or used in the carrier stream, is assayed. If the samples are acidified with HNO(3), a previous neutralisation is needed using batch mode. The determination of Cr(III) is independent of Storage Protocol by flow injection (FI) method; however, the determination of Co(II) or Cu(II) or total determination of three metals requires the conditioning of standards. Detection limits achieved are ranged between 0.5 and 2 mug l(-1). For batch mode, detection limits are better for unacidified samples and worse for carbonate-neutralised samples. The influence of Storage Protocols was validated using standard metal mixtures and calibration solutions. The use of standard reference material (SRM(c) 1640) (Trace elements in natural water) corroborates the previous statements and validates the accuracy of the different approaches underlined. This paper demonstrates that it is possible to determine Cr(III) selectively in natural waters.

  • Influence of water sample Storage Protocols in chemiluminescence detection of trace elements.
    Talanta, 2003
    Co-Authors: Y Moliner-martínez, S Meseguer-lloret, L A Tortajada-genaro, P Campíns-falcó
    Abstract:

    Abstract This paper shows the influence of different sample Storage Protocols, on the chemiluminescence signal of some metal ions. The Storage Protocols studied were: acid addition (HCl or HNO3) and no reagent addition to filtered and refrigerated (T=4 °C) samples. Light emission was produced for the chemiluminescence reaction between luminol and hydrogen peroxide in buffer carbonate conditions (pH 10.8) catalysed by Cr(III), Co(II) and Cu(II). Batch and/or flow modes in different conditions were tested. Fe(II), Fe(III), Ni(II) and Mn(II) did not give chemiluminescence in the studied conditions. A parallel study of sensitivity and selectivity was performed. Then the presence or absence of the masking agent EDTA, added to samples or used in the carrier stream, is assayed. If the samples are acidified with HNO3, a previous neutralisation is needed using batch mode. The determination of Cr(III) is independent of Storage Protocol by flow injection (FI) method; however, the determination of Co(II) or Cu(II) or total determination of three metals requires the conditioning of standards. Detection limits achieved are ranged between 0.5 and 2 μg l−1. For batch mode, detection limits are better for unacidified samples and worse for carbonate-neutralised samples. The influence of Storage Protocols was validated using standard metal mixtures and calibration solutions. The use of standard reference material (SRM© 1640) (Trace elements in natural water) corroborates the previous statements and validates the accuracy of the different approaches underlined. This paper demonstrates that it is possible to determine Cr(III) selectively in natural waters.

Sushmita Ruj - One of the best experts on this subject based on the ideXlab platform.

  • Secure Cloud Storage with Data Dynamics Using Secure Network Coding Techniques
    IEEE Transactions on Cloud Computing, 2020
    Co-Authors: Binanda Sengupta, Akanksha Dixit, Sushmita Ruj
    Abstract:

    In the age of cloud computing, cloud users with limited Storage can outsource their data to remote servers. These servers, in lieu of monetary benefits, offer retrievability of their clients' data at any point of time. Secure cloud Storage Protocols enable a client to check integrity of outsourced data. In this work, we explore the possibility of constructing a secure cloud Storage for dynamic data by leveraging the algorithms involved in secure network coding. We show that some of the secure network coding schemes can be used to construct efficient secure cloud Storage Protocols for dynamic data, and we construct such a Protocol (DSCS I) based on a secure network coding Protocol. To the best of our knowledge, DSCS I is the first secure cloud Storage Protocol for dynamic data constructed using secure network coding techniques which is secure in the standard model. Although generic dynamic data support arbitrary insertions, deletions and modifications, append-only data find numerous applications in the real world. We construct another secure cloud Storage Protocol (DSCS II) specific to append-only data -- that overcomes some limitations of DSCS I. Finally, we provide prototype implementations for DSCS I and DSCS II in order to evaluate their performance.

  • Secure Cloud Storage with Data Dynamics and Privacy-Preserving Audits Using Secure Network Coding.
    arXiv: Cryptography and Security, 2016
    Co-Authors: Binanda Sengupta, Sushmita Ruj
    Abstract:

    In the age of cloud computing, cloud users with a limited amount of Storage can outsource their data to remote servers. The cloud servers, in lieu of monetary benefits, offer retrievability of their clients' data at any point of time. A client's data can be dynamic (or static) in nature depending on whether the client can (or cannot) update the uploaded data as needed. Secure cloud Storage Protocols enable a client to check the integrity of her outsourced data by auditing the data. In this work, we explore the possibility of constructing a secure cloud Storage for dynamic data by leveraging the idea of secure network coding. Specifically, we fail to provide a general construction of an efficient secure cloud Storage Protocol for dynamic data from an arbitrary secure network coding Protocol. However, we show that some of the secure network coding schemes can be used to construct secure cloud Storage Protocols for dynamic data, and we construct such a secure cloud Storage Protocol based on a secure network coding Protocol. To the best of our knowledge, our scheme is the first secure cloud Storage Protocol for dynamic data that is based on a secure network coding Protocol and that is secure in the standard model. In a publicly verifiable setting, auditing task is often delegated to a third party auditor that audits the outsourced data on behalf of a client. We extend our scheme in order to provide privacy-preserving and to offer anonymity (from the server) of a user updating shared data in an enterprise setting. We compare the performance of our secure cloud Storage Protocol with that of other secure cloud Storage schemes and discuss some limitations of our scheme. Finally, we provide another construction of a secure cloud Storage Protocol specific to append-only data --- that overcomes some of the limitations of our earlier scheme.

Y Moliner-martínez - One of the best experts on this subject based on the ideXlab platform.

  • Influence of water sample Storage Protocols in chemiluminescence detection of trace elements.
    Talanta, 2003
    Co-Authors: Y Moliner-martínez, S Meseguer-lloret, L A Tortajada-genaro, P Campíns-falcó
    Abstract:

    This paper shows the influence of different sample Storage Protocols, on the chemiluminescence signal of some metal ions. The Storage Protocols studied were: acid addition (HCl or HNO(3)) and no reagent addition to filtered and refrigerated (T=4 degrees C) samples. Light emission was produced for the chemiluminescence reaction between luminol and hydrogen peroxide in buffer carbonate conditions (pH 10.8) catalysed by Cr(III), Co(II) and Cu(II). Batch and/or flow modes in different conditions were tested. Fe(II), Fe(III), Ni(II) and Mn(II) did not give chemiluminescence in the studied conditions. A parallel study of sensitivity and selectivity was performed. Then the presence or absence of the masking agent EDTA, added to samples or used in the carrier stream, is assayed. If the samples are acidified with HNO(3), a previous neutralisation is needed using batch mode. The determination of Cr(III) is independent of Storage Protocol by flow injection (FI) method; however, the determination of Co(II) or Cu(II) or total determination of three metals requires the conditioning of standards. Detection limits achieved are ranged between 0.5 and 2 mug l(-1). For batch mode, detection limits are better for unacidified samples and worse for carbonate-neutralised samples. The influence of Storage Protocols was validated using standard metal mixtures and calibration solutions. The use of standard reference material (SRM(c) 1640) (Trace elements in natural water) corroborates the previous statements and validates the accuracy of the different approaches underlined. This paper demonstrates that it is possible to determine Cr(III) selectively in natural waters.

  • Influence of water sample Storage Protocols in chemiluminescence detection of trace elements.
    Talanta, 2003
    Co-Authors: Y Moliner-martínez, S Meseguer-lloret, L A Tortajada-genaro, P Campíns-falcó
    Abstract:

    Abstract This paper shows the influence of different sample Storage Protocols, on the chemiluminescence signal of some metal ions. The Storage Protocols studied were: acid addition (HCl or HNO3) and no reagent addition to filtered and refrigerated (T=4 °C) samples. Light emission was produced for the chemiluminescence reaction between luminol and hydrogen peroxide in buffer carbonate conditions (pH 10.8) catalysed by Cr(III), Co(II) and Cu(II). Batch and/or flow modes in different conditions were tested. Fe(II), Fe(III), Ni(II) and Mn(II) did not give chemiluminescence in the studied conditions. A parallel study of sensitivity and selectivity was performed. Then the presence or absence of the masking agent EDTA, added to samples or used in the carrier stream, is assayed. If the samples are acidified with HNO3, a previous neutralisation is needed using batch mode. The determination of Cr(III) is independent of Storage Protocol by flow injection (FI) method; however, the determination of Co(II) or Cu(II) or total determination of three metals requires the conditioning of standards. Detection limits achieved are ranged between 0.5 and 2 μg l−1. For batch mode, detection limits are better for unacidified samples and worse for carbonate-neutralised samples. The influence of Storage Protocols was validated using standard metal mixtures and calibration solutions. The use of standard reference material (SRM© 1640) (Trace elements in natural water) corroborates the previous statements and validates the accuracy of the different approaches underlined. This paper demonstrates that it is possible to determine Cr(III) selectively in natural waters.

Binanda Sengupta - One of the best experts on this subject based on the ideXlab platform.

  • Secure Cloud Storage with Data Dynamics Using Secure Network Coding Techniques
    IEEE Transactions on Cloud Computing, 2020
    Co-Authors: Binanda Sengupta, Akanksha Dixit, Sushmita Ruj
    Abstract:

    In the age of cloud computing, cloud users with limited Storage can outsource their data to remote servers. These servers, in lieu of monetary benefits, offer retrievability of their clients' data at any point of time. Secure cloud Storage Protocols enable a client to check integrity of outsourced data. In this work, we explore the possibility of constructing a secure cloud Storage for dynamic data by leveraging the algorithms involved in secure network coding. We show that some of the secure network coding schemes can be used to construct efficient secure cloud Storage Protocols for dynamic data, and we construct such a Protocol (DSCS I) based on a secure network coding Protocol. To the best of our knowledge, DSCS I is the first secure cloud Storage Protocol for dynamic data constructed using secure network coding techniques which is secure in the standard model. Although generic dynamic data support arbitrary insertions, deletions and modifications, append-only data find numerous applications in the real world. We construct another secure cloud Storage Protocol (DSCS II) specific to append-only data -- that overcomes some limitations of DSCS I. Finally, we provide prototype implementations for DSCS I and DSCS II in order to evaluate their performance.

  • Secure Cloud Storage with Data Dynamics and Privacy-Preserving Audits Using Secure Network Coding.
    arXiv: Cryptography and Security, 2016
    Co-Authors: Binanda Sengupta, Sushmita Ruj
    Abstract:

    In the age of cloud computing, cloud users with a limited amount of Storage can outsource their data to remote servers. The cloud servers, in lieu of monetary benefits, offer retrievability of their clients' data at any point of time. A client's data can be dynamic (or static) in nature depending on whether the client can (or cannot) update the uploaded data as needed. Secure cloud Storage Protocols enable a client to check the integrity of her outsourced data by auditing the data. In this work, we explore the possibility of constructing a secure cloud Storage for dynamic data by leveraging the idea of secure network coding. Specifically, we fail to provide a general construction of an efficient secure cloud Storage Protocol for dynamic data from an arbitrary secure network coding Protocol. However, we show that some of the secure network coding schemes can be used to construct secure cloud Storage Protocols for dynamic data, and we construct such a secure cloud Storage Protocol based on a secure network coding Protocol. To the best of our knowledge, our scheme is the first secure cloud Storage Protocol for dynamic data that is based on a secure network coding Protocol and that is secure in the standard model. In a publicly verifiable setting, auditing task is often delegated to a third party auditor that audits the outsourced data on behalf of a client. We extend our scheme in order to provide privacy-preserving and to offer anonymity (from the server) of a user updating shared data in an enterprise setting. We compare the performance of our secure cloud Storage Protocol with that of other secure cloud Storage schemes and discuss some limitations of our scheme. Finally, we provide another construction of a secure cloud Storage Protocol specific to append-only data --- that overcomes some of the limitations of our earlier scheme.

Fei Chen - One of the best experts on this subject based on the ideXlab platform.

  • secure cloud Storage meets with secure network coding
    IEEE Transactions on Computers, 2016
    Co-Authors: Fei Chen, Tao Xiang, Yuanyuan Yang, Sherman S M Chow
    Abstract:

    This paper reveals an intrinsic relationship between secure cloud Storage and secure network coding for the first time. Secure cloud Storage was proposed only recently while secure network coding has been studied for more than ten years. Although the two areas are quite different in their nature and are studied independently, we show how to construct a secure cloud Storage Protocol given any secure network coding Protocol. This gives rise to a systematic way to construct secure cloud Storage Protocols. Our construction is secure under a definition which captures the real world usage of the cloud Storage. Furthermore, we propose two specific secure cloud Storage Protocols based on two recent secure network coding Protocols. In particular, we obtain the first publicly verifiable secure cloud Storage Protocol in the standard model. We also enhance the proposed generic construction to support user anonymity and third-party public auditing, which both have received considerable attention recently. Finally, we prototype the newly proposed Protocol and evaluate its performance. Experimental results validate the effectiveness of the Protocol.

  • INFOCOM - Secure cloud Storage hits distributed string equality checking: More efficient, conceptually simpler, and provably secure
    2015 IEEE Conference on Computer Communications (INFOCOM), 2015
    Co-Authors: Fei Chen, Tao Xiang, Yuanyuan Yang, Cong Wang, Shengyu Zhang
    Abstract:

    Cloud Storage has gained a remarkable success in recent years with an increasing number of consumers and enterprises outsourcing their data to the cloud. To assure the availability and integrity of the outsourced data, several Protocols have been proposed to audit cloud Storage. Despite the formally guaranteed security, the constructions employed heavy cryptographic operations as well as advanced concepts (e.g., bilinear maps over elliptic curves and digital signatures), and thus are inefficient to admit wide applicability in practice. In this paper, we design a novel secure cloud Storage Protocol, which is conceptually and technically simpler and significantly more efficient than previous constructions. Inspired by a classic string equality checking Protocol in distributed computing, our Protocol uses only basic integer arithmetic (without advanced techniques and concepts). As simple as the Protocol is, it supports both randomized and deterministic auditing to fit different applications. We further extend the proposed Protocol to support data dynamics, i.e., adding, deleting and modifying data, using a novel technique. As a further contribution, we find a systematic way to design secure cloud Storage Protocols based on verifiable computation Protocols. Theoretical and experimental analyses validate the efficacy of our Protocol.