An oblique-matrix technique for data integrity assurance

نویسندگان

  • Jasim A. Ghaeb
  • J. Chebil
چکیده

Data integrity is insuring that the data retrieved is the same as the data stored or transmitted. It is an important aspect of storage security and reliability which are prerequisite for most computer system applications. This paper proposes a new technique for improving the detection of data integrity violations. The method is based on check determinant approach. Each block of data is arranged in a matrix form, and then into its corresponding oblique matrix. Because of the new arrangement in the block elements through the oblique matrix, a powerful error detection mechanism is obtained. Simulation results show that the new method outperforms the traditional techniques.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A high performance data integrity assurance based on the determinant technique

Data integrity is an important aspect of storage and network security. The reality is that no security strategy is achieved without assuring data integrity. Data assurance provides reliability which is a prerequisite for most computer systems and network applications. This paper proposes a new technique for improving the detection of data integrity violations. The proposed technique is based on...

متن کامل

Leakage-Free Integrity Assurance for Tree Data Structures

Data sharing with multiple parties over a third-party distribution framework requires that both data integrity and confidentiality be assured. One of the most widely used data organization structures is the tree structure. When such structures encode sensitive information (such as in the XML documents), it is crucial that integrity and confidentiality be assured not only for the content, but al...

متن کامل

Structural signatures for tree data structures

Data sharing with multiple parties over a third-party distribution framework requires that both data integrity and confidentiality be assured. One of the most widely used data organization structures is the tree structure. When such structures encode sensitive information (such as in XML documents), it is crucial that integrity and confidentiality be assured not only for the content, but also f...

متن کامل

A Common Weight Multi-criteria Decision analysis-data Envelopment Analysis Approach with Assurance Region for Weight Derivation from Pairwise Comparison Matrices

Deriving weights from a pairwise comparison matrix (PCM) is a subject for which a wide range of methods have ever been presented. This paper proposes a common weight multi criteria decision analysis-data envelopment analysis (MCDA-DEA) approach with assurance region for weight derivation from a PCM. The proposed model has several merits over the competing approaches and removes the drawbacks of...

متن کامل

Calculation of One-dimensional Forward Modelling of Helicopter-borne Electromagnetic Data and a Sensitivity Matrix Using Fast Hankel Transforms

The helicopter-borne electromagnetic (HEM) frequency-domain exploration method is an airborne electromagnetic (AEM) technique that is widely used for vast and rough areas for resistivity imaging. The vast amount of digitized data flowing from the HEM method requires an efficient and accurate inversion algorithm. Generally, the inverse modelling of HEM data in the first step requires a precise a...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:
  • Computers & Security

دوره 28  شماره 

صفحات  -

تاریخ انتشار 2009