I
AE
S
I
nte
rna
t
io
na
l J
o
urna
l o
f
Art
if
icia
l In
t
ellig
ence
(
I
J
-
AI
)
Vo
l.
6
,
No
.
4
,
D
e
ce
m
b
er
2017
,
p
p
.
1
4
3
~1
49
I
SS
N:
2252
-
8938
,
DOI
: 1
0
.
1
1
5
9
1
/i
j
ai.
v
6
.
i
4
.
p
p
1
4
3
-
1
49
143
J
o
ur
na
l ho
m
ep
a
g
e
:
h
ttp
:
//ia
e
s
jo
u
r
n
a
l.c
o
m/o
n
lin
e/in
d
ex
.
p
h
p
/I
J
AI
Fu
zz
y
-
Se
t
Ba
sed
Priva
cy
P
reserv
in
g
Acce
ss
Con
trol
Techniqu
es
in Cloud
(F
B
-
PP
AC)
Sus
h
m
it
a
K
u
m
a
ri,
Su
d
ha
.
S,
B
rindh
a
.
K
S
c
h
o
o
l
o
f
I
n
f
o
rm
a
ti
o
n
T
e
c
h
n
o
lo
g
y
a
n
d
En
g
i
n
e
e
rin
g
,
V
IT
Un
iv
e
rsit
y
,
V
e
ll
o
re
-
6
3
2
0
1
4
,
T
a
m
il
Na
d
u
,
In
d
ia
Art
icle
I
nfo
AB
ST
RAC
T
A
r
ticle
his
to
r
y:
R
ec
eiv
ed
Au
g
17
,
2
0
1
7
R
ev
i
s
ed
Oct
19
,
2
0
1
7
A
cc
ep
ted
No
v
2
,
2
0
1
7
T
h
e
w
o
rd
“
Clo
u
d
”
re
f
e
rs
to
n
e
tw
o
rk
o
r
in
tern
e
t.
It
is
p
re
se
n
t
a
t.
re
m
o
te
lo
c
a
ti
o
n
.
Clo
u
d
c
o
m
p
u
ti
n
g
is
a
l
a
tes
t
m
e
c
h
a
n
is
m
u
se
d
n
o
w
-
a
-
d
a
y
s
f
o
r
a
c
c
e
s
sin
g
,
m
a
n
ip
u
latin
g
a
n
d
c
o
n
f
ig
u
rin
g
a
p
p
li
c
a
ti
o
n
s
o
n
li
n
e
v
ia
in
tern
e
t.
It
a
ll
o
w
s
u
se
rs
f
o
r
o
n
li
n
e
d
a
t
a
sto
ra
g
e
,
v
a
rio
u
s
a
p
p
li
c
a
ti
o
n
s
an
d
in
f
ra
stru
c
tu
re
.
T
h
e
re
a
re
f
e
w
d
o
w
n
sid
e
s
o
f
c
lo
u
d
c
o
m
p
u
ti
n
g
l
ik
e
in
p
u
b
li
c
c
lo
u
d
sh
a
ri
n
g
o
f
d
a
ta,
se
lec
ted
d
a
t
a
sh
a
re
d
w
it
h
u
se
rs
o
f
v
a
rio
u
s lev
e
l
w
it
h
o
u
t
c
o
n
f
id
e
n
ti
a
li
ty
a
n
d
p
riv
a
c
y
o
f
d
a
ta.
Dif
fe
re
n
t
m
e
th
o
d
s
w
e
re
u
se
d
to
f
ix
th
is
p
ro
b
lem
li
k
e
e
n
c
r
y
p
ti
o
n
o
f
a
tt
ri
b
u
te;
e
n
c
ry
p
ti
o
n
o
f
a
c
c
e
ss
c
o
n
tro
l
b
u
t
t
h
e
y
h
a
v
e
th
e
ir
o
w
n
p
ro
b
lem
s
re
late
d
to
b
ig
c
o
m
p
u
tati
o
n
f
o
r
a
c
c
q
u
iri
n
g
a
c
c
e
ss
stru
c
tu
re
,
in
v
o
k
in
g
a
n
d
b
e
h
a
v
i
o
r
m
a
n
a
g
e
m
e
n
t.
S
o
f
o
r
re
m
o
v
in
g
th
e
se
w
e
a
k
n
e
ss
,
th
e
c
o
m
b
in
a
ti
o
n
o
f
f
u
z
z
y
-
s
e
t
th
e
o
ry
a
n
d
RS
A
a
lg
o
rit
h
m
h
a
s
b
e
e
n
in
tro
d
u
c
e
d
.
F
u
z
z
y
-
se
t
is
u
se
d
f
o
r
c
lu
ste
rin
g
th
e
d
a
ta
b
a
se
d
o
n
t
h
e
ir
p
o
i
n
ts.
F
u
rth
e
r
f
o
r
p
riv
a
c
y
,
I
h
a
v
e
in
c
lu
d
e
d
RS
A
f
o
r
e
n
c
r
y
p
ti
o
n
a
n
d
d
e
c
ry
p
ti
o
n
o
f
d
a
ta
w
h
ich
is
u
se
d
to
sto
re
in
c
lo
u
d
d
a
tab
a
se
.
T
h
e
a
n
a
l
y
sis
o
f
m
y
e
x
p
e
ri
m
e
n
t
sh
o
w
s
th
e
s
y
ste
m
is
e
ff
icie
n
t,
f
l
e
x
ib
le
a
n
d
p
r
o
v
id
e
s
c
o
n
f
id
e
n
ti
a
l
it
y
o
f
th
e
d
a
t
a.
K
ey
w
o
r
d
:
B
lin
d
ed
R
S
A
E
n
cr
y
p
tio
n
Fu
zz
y
s
et
t
h
eo
r
y
Co
p
y
rig
h
t
©
2
0
1
7
In
stit
u
te o
f
A
d
v
a
n
c
e
d
E
n
g
i
n
e
e
rin
g
a
n
d
S
c
ien
c
e
.
Al
l
rig
h
ts
re
se
rv
e
d
.
C
o
r
r
e
s
p
o
nd
ing
A
uth
o
r
:
Su
d
h
a.
S,
Sch
o
o
l o
f
I
n
f
o
r
m
atio
n
T
ec
h
n
o
lo
g
y
a
n
d
E
n
g
in
ee
r
i
n
g
,
VI
T
Un
iv
er
s
it
y
,
Vello
r
e
-
6
3
2
0
1
4
,
T
am
il
Nad
u
,
I
n
d
ia
.
E
m
ail:
s
u
d
h
a.
s
@
v
it.a
c.
i
n
1.
I
NT
RO
D
UCT
I
O
N
T
h
e
clo
u
d
co
m
p
u
ti
n
g
i
s
a
d
ev
elo
p
in
g
in
n
o
v
a
tio
n
w
h
ich
i
s
q
u
ick
l
y
p
ick
in
g
u
p
n
o
to
r
iet
y
as
a
d
if
f
er
en
t
o
p
tio
n
f
o
r
co
n
v
en
tio
n
al
d
ata
in
n
o
v
atio
n
.
C
lo
u
d
co
m
p
u
ti
n
g
co
n
v
e
y
s
a
m
o
r
e
ad
ap
tab
le
en
v
ir
o
n
m
e
n
t
f
o
r
co
lo
s
s
al
m
ea
s
u
r
es
o
f
in
f
o
r
m
a
tio
n
th
at
ar
e
u
t
ilized
as
a
p
ar
t
o
f
d
if
f
er
e
n
t
ap
p
licatio
n
s
a
n
d
ad
m
in
is
tr
atio
n
s
th
r
o
u
g
h
o
n
-
in
ter
est
s
e
lf
-
ad
m
i
n
is
tr
atio
n
s
.
O
n
e
e
s
s
e
n
tial
tr
ad
em
ar
k
to
w
ar
d
s
t
h
i
s
o
u
tlo
o
k
ch
an
g
i
n
g
is
th
a
t
in
f
o
r
m
atio
n
ar
e
b
ein
g
co
m
b
i
n
e
d
an
d
o
u
ts
o
u
r
ce
d
in
to
clo
u
d
s
.
T
h
e
clo
u
d
o
u
ts
o
u
r
ce
d
ca
p
ac
it
y
ad
m
in
is
tr
atio
n
s
b
ea
r
th
e
co
s
t
o
f
an
o
t
h
er
b
en
ef
it
d
ev
elo
p
m
en
t
f
o
r
th
e
cl
ie
n
t
b
y
m
et
h
o
d
f
o
r
o
f
f
er
i
n
g
a
n
ar
ea
f
r
ee
s
ta
g
e,
ad
ap
tab
ilit
y
s
u
p
p
o
r
t
f
o
r
d
ea
li
n
g
w
it
h
t
h
eir
in
f
o
r
m
at
io
n
.
T
h
e
clo
u
d
s
to
r
ag
e
s
e
r
v
ice
(
C
SS
)
d
is
c
h
ar
g
e
s
t
h
e
w
ei
g
h
t
o
f
in
f
o
r
m
at
io
n
s
to
ck
p
ilin
g
ad
m
i
n
is
tr
atio
n
an
d
s
u
p
p
o
r
t.
Desp
ite
th
e
f
ac
t
th
at,
if
t
h
is
ad
m
i
n
i
s
tr
atio
n
v
u
l
n
er
ab
le
to
an
y
as
s
au
l
ts
o
r
d
is
ap
p
o
in
t
m
e
n
ts
,
it
w
o
u
ld
co
n
v
e
y
e
x
tr
e
m
e
m
o
n
e
tar
y
m
is
f
o
r
tu
n
e
s
to
clien
ts
a
s
th
eir
in
f
o
r
m
a
ti
o
n
ar
e
p
u
t
a
w
a
y
in
to
an
u
n
tr
u
s
ted
p
o
o
l
o
f
ca
p
ac
it
y
o
u
ts
id
e
th
e
clie
n
t
u
n
d
er
tak
i
n
g
s
.
T
h
ese
s
o
r
ts
o
f
s
ec
u
r
it
y
d
an
g
er
s
f
o
r
ce
d
b
ec
au
s
e
o
f
ta
k
i
n
g
af
ter
r
ea
s
o
n
s
:
t
h
e
clo
u
d
co
m
p
u
ti
n
g
f
r
a
m
e
w
o
r
k
s
ar
e
a
g
r
ea
t
d
ea
l
m
o
r
e
s
o
lid
an
d
in
ten
s
e
t
h
an
clien
t
i
n
d
iv
id
u
alize
d
co
m
p
u
ti
n
g
g
ad
g
et
s
.
No
n
et
h
ele
s
s
,
t
h
e
y
ar
e
s
till
h
elp
le
s
s
ag
ain
s
t
d
i
f
f
er
en
t
s
ec
u
r
it
y
d
an
g
er
s
b
o
th
f
r
o
m
in
s
id
e
an
d
o
u
t
s
id
e
th
e
clo
u
d
clie
n
ts
f
o
r
th
e
ad
v
an
ta
g
es
o
f
t
h
ei
r
o
w
n
er
s
h
ip
.
I
n
th
is
w
a
y
,
it
is
e
s
s
e
n
tial
f
o
r
clo
u
d
s
er
v
ice
s
u
p
p
lier
s
to
o
f
f
er
h
i
g
h
p
r
iv
ac
y
to
th
e
in
f
o
r
m
atio
n
th
a
t
is
ad
d
ed
o
n
it.
I
n
th
is
w
a
y
,
w
e
n
ee
d
a
s
u
itab
le
ac
ce
s
s
co
n
tr
o
l
s
tr
ateg
ie
s
to
s
ec
u
r
e
th
e
in
f
o
r
m
atio
n
ac
ce
s
s
in
t
h
e
clo
u
d
.
T
h
e
tr
ad
itio
n
al
ac
ce
s
s
co
n
tr
o
l
s
y
s
te
m
s
th
a
t
ar
e
u
tili
ze
d
as
a
p
ar
t
o
f
u
n
ch
a
n
g
ea
b
le
ap
p
r
o
p
r
iate
d
Evaluation Warning : The document was created with Spire.PDF for Python.
I
SS
N
:
2
2
5
2
-
8938
IJ
-
AI
Vo
l.
6
,
No
.
4
,
Dec
em
b
e
r
201
7
:
14
3
–
1
49
144
en
v
ir
o
n
m
e
n
t
ca
n
b
e
ca
teg
o
r
ized
as
Dis
cr
etio
n
ar
y
A
cc
e
s
s
C
o
n
tr
o
l
(
DAC),
Ma
n
d
ato
r
y
A
cc
ess
C
o
n
tr
o
l
(
MA
C
)
,
an
d
R
o
le
b
ased
A
cc
e
s
s
C
o
n
tr
o
ls
(
R
B
A
C
)
.
DAC
is
u
til
ized
in
cir
cu
m
s
ta
n
ce
s
t
h
at
r
ec
eiv
e
ea
c
h
ar
ticle
h
as
a
p
r
o
p
r
ieto
r
th
at
co
u
ld
co
n
tr
o
l
th
e
ac
ce
s
s
r
i
g
h
t
s
to
t
h
e
ite
m
.
M
AC
ex
p
ec
t
t
h
at
s
y
s
te
m
ad
m
in
h
as
th
e
co
n
tr
o
l
to
m
a
k
e
t
h
e
s
tr
ateg
ies
a
n
d
s
u
b
j
ec
ts
o
r
p
r
o
p
r
ieto
r
s
d
o
n
'
t
h
a
v
e
t
h
e
ab
ilit
y
to
o
v
er
r
id
e
th
e
ap
p
r
o
ac
h
.
R
B
A
C
is
t
h
e
m
o
d
el
w
h
ic
h
g
iv
e
s
t
h
e
clie
n
t
ac
ce
s
s
b
ased
o
n
th
e
r
o
le
o
f
th
e
clien
ts
.
I
n
e
v
er
y
o
n
e
o
f
t
h
es
e
m
o
d
els
clien
t
s
an
d
ass
et
s
ar
e
r
ec
o
g
n
ized
b
y
t
h
e
d
if
f
er
e
n
t
n
a
m
es.
T
h
ese
m
o
d
el
s
ar
e
n
o
t
f
itti
n
g
f
o
r
th
e
d
y
n
a
m
ic
d
is
tr
ib
u
ted
e
n
v
ir
o
n
m
en
t,
f
o
r
ex
a
m
p
le,
g
r
id
a
n
d
clo
u
d
co
m
p
u
tin
g
w
h
er
e
clie
n
ts
ar
e
d
is
ti
n
g
u
is
h
ed
b
y
th
e
i
r
q
u
alitie
s
a
n
d
n
o
t
b
y
p
r
ed
ef
i
n
ed
p
er
s
o
n
alitie
s
.
B
y
s
ee
in
g
all
t
h
ese
p
r
o
b
le
m
I
h
av
e
p
r
o
p
o
s
ed
f
u
zz
y
s
et
b
ased
ac
ce
s
s
co
n
tr
o
l te
ch
n
iq
u
e.
T
h
e
m
a
in
ai
m
o
f
t
h
is
p
r
o
j
ec
t
is
to
ap
p
ly
f
u
zz
y
s
et
t
h
eo
r
y
f
o
r
p
r
iv
ac
y
p
r
eser
v
i
n
g
in
clo
u
d
.
So
a
w
eb
ap
p
licatio
n
o
n
j
o
b
p
o
r
tal
is
cr
ea
ted
.
I
n
w
h
ic
h
F
u
zz
y
C
Me
a
n
C
l
u
s
ter
in
g
al
g
o
r
it
h
m
i
s
u
s
e
d
f
o
r
d
is
p
la
y
in
g
t
h
e
s
tatu
s
o
f
ea
ch
ap
p
lican
t
f
o
r
th
e
j
o
b
th
e
y
h
a
v
e
ap
p
lied
.
I
n
th
is
ap
p
licatio
n
R
S
A
alg
o
r
it
h
m
is
also
u
s
ed
f
o
r
en
cr
y
p
tio
n
p
u
r
p
o
s
e.
T
h
e
en
tire
d
ata
w
i
ll
b
e
s
to
r
ed
in
clo
u
d
s
er
v
er
.
Mic
r
o
s
o
f
t
A
zu
r
e
ac
co
u
n
t
an
d
v
i
s
u
al
s
tu
d
io
is
u
s
ed
f
o
r
th
is
p
r
o
j
ec
t.
T
h
e
p
r
o
p
o
s
ed
s
y
s
te
m
i
n
[
1
]
is
b
ased
o
n
Hier
ar
ch
y
B
as
ed
P
r
iv
ac
y
P
r
eser
v
i
n
g
Acc
e
s
s
C
o
n
tr
o
l
tech
n
iq
u
e
i
n
p
u
b
lic
clo
u
d
s
.
I
t
u
tili
ze
s
t
h
e
b
li
n
d
ed
en
cr
y
p
tio
n
a
n
d
d
ec
r
y
p
tio
n
p
r
o
ce
d
u
r
e,
f
o
r
a
s
ec
u
r
ed
ac
ce
s
s
co
n
tr
o
l
tech
n
iq
u
e
in
clo
u
d
.
T
h
e
u
s
er
s
ar
e
d
iv
id
ed
in
to
v
ar
io
u
s
r
o
les
an
d
w
h
er
e
p
r
o
v
id
ed
w
it
h
s
ec
u
r
it
y
k
e
y
o
n
ce
th
e
y
p
r
o
v
id
e
th
e
ir
id
en
ti
t
y
to
th
e
tr
u
s
ted
au
t
h
o
r
it
y
.
W
h
en
t
h
e
d
ata
o
w
n
er
w
a
n
t
s
to
u
p
lo
ad
th
e
f
ile
t
h
e
b
lin
d
ed
p
ar
t
o
f
f
i
le
is
u
p
lo
ad
ed
an
d
en
cr
y
p
ted
i
n
clo
u
d
.
W
h
en
t
h
e
u
s
er
r
eq
u
e
s
t
to
ac
ce
s
s
a
f
ile,
t
h
e
n
t
h
e
en
cr
y
p
ted
f
ile,
e
n
cr
y
p
ted
s
ec
r
et
k
e
y
a
n
d
s
ess
io
n
k
e
y
is
d
ec
r
y
p
ted
a
n
d
r
etu
r
n
ed
to
th
e
u
s
er
ex
ce
p
t
th
e
b
lin
d
ed
p
ar
t.
T
h
en
u
s
er
a
s
k
T
A
f
o
r
u
n
b
lin
d
v
al
u
e
f
o
r
d
ec
r
y
p
tio
n
a
n
d
u
s
er
r
e
m
o
v
e
t
h
e
b
li
n
d
p
ar
t
an
d
v
ie
w
t
h
e
d
ata
.
T
h
is
p
r
o
ce
s
s
r
ed
u
ce
s
th
e
ti
m
e
co
m
p
le
x
it
y
i
n
to
s
o
m
e
e
x
ten
t.
T
h
e
p
r
o
p
o
s
ed
m
e
th
o
d
A
B
E
i
n
[
5
]
,
[
7
]
,
[
1
3
,
1
4
]
,
R
B
A
C
i
n
[
4
,
5]
,
[
1
0
]
an
d
A
B
AC
[
6
]
,
[
8
]
ar
e
s
o
m
e
o
f
th
e
tech
n
iq
u
e
s
w
h
ic
h
ar
e
u
tili
ze
d
f
o
r
o
u
ts
o
u
r
ce
d
d
ata
in
cl
o
u
d
.
A
B
E
s
tan
d
s
f
o
r
A
ttrib
u
t
e
B
ased
E
n
cr
y
p
tio
n
w
a
s
d
is
co
v
er
ed
b
y
s
ah
a
i
an
d
w
ater
s
[
2
]
to
u
s
e
i
n
i
m
p
le
m
e
n
t
ac
ce
s
s
co
n
tr
o
l
tec
h
n
iq
u
e
s
t
ak
in
g
i
n
to
ac
co
u
n
t
d
if
f
er
e
n
t
p
r
o
p
er
ties
.
T
h
e
t
w
o
v
ar
iet
y
o
f
A
B
E
li
k
e
C
P
-
A
B
E
[
2
]
an
d
K
P
-
A
B
E
[
6
]
w
as
in
tr
o
d
u
ce
d
b
y
Go
y
al
a
n
d
B
eth
en
co
u
r
t
et
al.
Yet,
u
tili
z
i
n
g
t
h
i
s
tech
n
iq
u
e
s
tr
ai
g
h
t
f
o
r
w
ar
d
l
y
,
to
a
n
ass
o
ciatio
n
w
a
s
n
o
t
f
itti
n
g
w
h
ic
h
o
r
g
an
ized
w
it
h
p
r
o
g
r
ess
i
v
e
le
v
el
o
f
clie
n
ts
.
Yu
et
al.
[
8
]
r
ec
o
m
m
e
n
d
ed
a
p
lan
to
p
er
f
o
r
m
s
ec
u
r
e,
f
i
n
e
g
r
ain
ed
an
d
v
er
s
atile
ac
ce
s
s
co
n
tr
o
l
in
clo
u
d
co
m
p
u
t
in
g
.
I
t
e
m
b
r
ac
es
KP
-
A
B
E
w
it
h
a
r
e
-
en
cr
y
p
tio
n
s
tr
a
teg
y
f
o
r
s
u
p
p
o
r
tin
g
e
f
f
e
ctiv
e
cl
ien
t
d
en
ial.
W
ith
KP
-
A
B
E
p
lan
,
t
h
e
i
n
f
o
r
m
atio
n
p
r
o
p
r
ieto
r
ca
n
'
t
h
a
v
e
co
n
tr
o
l
th
at
w
h
o
ca
n
u
n
s
cr
a
m
b
le
th
e
co
n
te
n
t.
W
an
et
al.
[
1
5
]
r
ec
o
m
m
e
n
d
ed
a
p
lan
to
ac
co
m
p
lis
h
v
er
s
atil
e
an
d
f
in
e
g
r
ai
n
ed
ac
ce
s
s
co
n
tr
o
l
f
o
r
th
e
c
lien
t
s
w
h
o
w
o
r
k
s
in
v
ar
io
u
s
le
v
el
a
s
s
o
ciatio
n
s
tr
u
c
tu
r
e.
T
h
e
y
d
e
v
elo
p
th
e
c
u
r
r
en
t
C
P
-
A
B
E
p
l
an
w
it
h
t
h
e
v
ar
io
u
s
lev
eled
clie
n
t
s
tr
u
ct
u
r
e.
T
h
is
p
lan
n
ee
d
s
i
n
g
en
er
al
f
r
a
m
e
w
o
r
k
ad
ap
tab
ilit
y
a
s
it
m
a
k
es
th
e
i
n
f
o
r
m
atio
n
cu
s
to
m
er
to
p
er
f
o
r
m
th
e
d
ec
o
d
in
g
.
W
a
n
g
e
t
al
[
3
]
o
f
f
er
ed
a
p
lan
b
y
co
n
s
o
lid
ati
n
g
C
P
-
A
B
E
w
i
th
h
ier
ar
ch
ical
I
d
en
tit
y
-
b
ased
e
n
cr
y
p
tio
n
(
HI
B
E
)
to
ac
h
iev
e
f
i
n
e
g
r
ai
n
ed
a
n
d
v
er
s
atile
ac
ce
s
s
co
n
tr
o
l
w
i
th
t
h
e
p
r
o
g
r
es
s
i
v
e
clien
t
s
tr
u
ctu
r
e.
T
h
i
s
p
la
n
d
o
es
n
o
t
b
o
ls
ter
co
m
p
o
u
n
d
q
u
alit
ies
a
n
d
n
u
m
er
o
u
s
w
o
r
th
ta
s
k
to
tr
a
its
.
Su
s
h
m
i
ta
R
u
j
et
al
[
1
3
]
r
ec
o
m
m
e
n
d
ed
a
d
is
tr
ib
u
ted
ac
ce
s
s
co
n
tr
o
l
p
lan
f
o
r
in
f
o
r
m
atio
n
ac
ce
s
s
in
clo
u
d
en
v
ir
o
n
m
e
n
t.
I
t
u
tili
ze
s
b
o
th
A
ttrib
u
te
B
ase
d
E
n
cr
y
p
tio
n
an
d
A
t
tr
ib
u
te
B
ased
Sig
n
atu
r
e
p
lan
s
to
g
iv
e
ef
f
ec
tiv
e
clien
t
d
en
ial
an
d
m
y
s
ter
io
u
s
v
alid
atio
n
.
I
t
u
tili
ze
s
t
h
e
ca
s
e
ap
p
r
o
ac
h
to
av
er
t
r
e
p
lay
ass
a
u
lt
s
in
clo
u
d
o
u
ts
o
u
r
ce
d
in
f
o
r
m
atio
n
.
A
f
e
w
R
B
A
C
v
ar
iet
y
m
o
d
el
[
4
,
5
]
is
in
tr
o
d
u
ce
d
to
s
u
ite
th
e
d
is
s
e
m
i
n
ated
en
v
ir
o
n
m
en
t
n
e
ed
s
th
at
is
ex
p
ec
ted
to
f
u
lf
i
l
th
e
lar
g
e
s
c
ale
in
d
u
s
tr
y
.
T
h
e
p
ap
er
[
5
]
b
r
o
u
g
h
t
u
p
th
i
s
p
r
o
b
lem
a
n
d
p
r
o
p
o
s
ed
a
p
ar
t
an
d
ass
o
ciatio
n
b
ased
ac
ce
s
s
co
n
t
r
o
l
m
o
d
el
to
co
n
q
u
er
th
i
s
is
s
u
e.
I
n
t
h
e
e
x
is
ti
n
g
s
y
s
te
m
[
4
]
d
is
tr
ib
u
ted
R
o
le
B
ased
A
cc
ess
co
n
tr
o
l
m
o
d
el
is
in
tr
o
d
u
ce
d
f
o
r
o
v
er
co
m
i
n
g
th
e
ex
te
n
s
ib
le
is
s
u
e
s
.
Desp
ite
th
e
f
ac
t
t
h
at,
th
es
e
mo
d
el
s
h
o
w
s
c
h
a
n
g
e
as
f
ar
as
ex
ec
u
tio
n
p
r
o
f
icien
c
y
a
n
d
ad
ap
tab
ilit
y
,
t
h
e
tec
h
n
iq
u
es
n
e
g
l
ec
ted
to
g
i
v
e
b
r
o
ad
an
s
w
er
f
o
r
v
er
s
atilit
y
i
s
s
u
e.
No
t
w
i
th
s
tan
d
i
n
g
t
h
is
,
th
e
R
B
AC
d
is
p
la
y
s
till
e
n
d
u
r
e
b
y
p
ar
t
b
last
is
s
u
e
[
1
0
]
w
h
ic
h
is
co
n
f
r
o
n
ted
b
y
a
f
e
w
s
u
b
s
ta
n
tial
s
c
ale
v
e
n
t
u
r
e
th
at
r
eq
u
ir
es
f
i
n
e
g
r
ai
n
ac
ce
s
s
co
n
tr
o
l
th
a
n
w
h
a
t
th
e
cu
r
r
en
t RB
AC
u
n
d
er
p
in
s
.
T
h
e
ex
is
ti
n
g
s
y
s
te
m
[
6
]
u
ti
liz
es
th
e
T
w
o
-
L
a
y
er
E
n
cr
y
p
tio
n
ap
p
r
o
ac
h
,
in
w
h
ich
t
h
e
ar
r
an
g
e
m
en
ts
ar
e
d
iv
id
ed
in
to
t
w
o
s
ec
tio
n
s
.
T
h
e
in
f
o
r
m
atio
n
p
r
o
p
r
ieto
r
th
at
co
n
v
e
y
s
t
h
e
p
r
i
m
ar
y
p
iece
o
f
AC
P
ap
p
r
o
ac
h
es
p
er
f
o
r
m
s
t
h
e
i
n
w
ar
d
la
y
er
en
cr
y
p
tio
n
.
T
h
e
ex
ter
n
a
l
la
y
er
e
n
cr
y
p
tio
n
p
er
f
o
r
m
ed
b
y
t
h
e
c
lo
u
d
ad
m
i
n
is
tr
atio
n
s
u
p
p
lier
s
as
p
er
th
e
s
ec
o
n
d
p
ar
t
o
f
A
C
P
'
s
.
Ho
w
e
v
er
,
n
o
n
e
o
f
th
e
s
e
A
B
AC
b
ased
p
lan
s
r
ec
o
m
m
e
n
d
ed
a
n
an
s
w
er
to
cl
u
s
ter
t
h
e
clie
n
t
s
as
p
er
th
e
d
is
ti
n
cti
v
e
p
r
er
eq
u
is
ites
o
f
b
ig
b
u
s
i
n
es
s
p
o
lices
s
o
clien
t
s
ee
k
in
g
s
h
o
u
ld
b
e
p
o
s
s
ib
le
p
r
o
d
u
cti
v
e
l
y
.
As
o
f
late,
a
f
e
w
s
cien
tis
t
s
ce
n
ter
ed
f
o
r
g
i
v
in
g
f
i
n
e
g
r
a
in
ed
ac
ce
s
s
co
n
tr
o
l
an
s
w
er
f
o
r
m
o
b
ile
clo
u
d
co
m
p
u
ti
n
g
e
n
v
ir
o
n
m
en
t.
Mo
h
an
e
t
a
l
[
1
1
]
in
tr
o
d
u
ce
d
an
ac
ce
s
s
co
n
tr
o
l
p
lan
in
c
lo
u
d
en
v
ir
o
n
m
en
t
tak
in
g
i
n
t
o
ac
co
u
n
t
p
o
ly
n
o
m
ia
l
b
ased
m
et
h
o
d
o
lo
g
y
.
T
h
e
in
f
o
r
m
atio
n
p
r
o
p
r
iet
o
r
u
tili
ze
s
t
h
e
p
o
l
y
n
o
m
ial
b
ased
m
y
s
ter
y
s
h
ar
i
n
g
p
lan
f
o
r
k
e
y
s
h
ar
i
n
g
a
n
d
u
s
e
s
s
y
m
m
e
tr
ic
en
cr
y
p
tio
n
p
r
o
ce
d
u
r
e
f
o
r
in
f
o
r
m
a
tio
n
en
cr
y
p
ti
o
n
.
I
n
an
y
ca
s
e,
n
o
Evaluation Warning : The document was created with Spire.PDF for Python.
IJ
-
AI
I
SS
N:
2252
-
8938
F
u
z
z
y
-
S
et
B
a
s
ed
P
r
iva
cy
P
r
eser
vin
g
A
cc
ess
C
o
n
tr
o
l Tec
h
n
iq
u
es in
…
(
S
u
d
h
a
.
S
)
145
tr
ial
in
v
esti
g
atio
n
i
n
clu
d
ed
f
o
r
co
n
tr
asti
n
g
th
e
e
x
ec
u
tio
n
o
f
t
h
i
s
p
lan
a
n
d
o
r
d
in
ar
y
m
ar
k
s
p
lan
s
.
B
y
co
n
s
id
er
in
g
ev
er
y
o
n
e
o
f
th
ese
ele
m
en
ts
i
n
d
if
f
er
en
t
p
lan
s
,
th
e
f
u
zz
y
s
e
t
b
ased
s
ec
u
r
it
y
s
af
e
g
u
ar
d
in
g
ac
ce
s
s
co
n
tr
o
l
s
tr
ate
g
ies
ar
e
p
r
o
p
o
s
ed
to
g
i
v
e
t
h
e
a
n
s
w
er
f
o
r
g
at
h
er
i
n
g
t
h
e
clie
n
t
s
a
n
d
v
alid
atio
n
b
ased
o
n
g
r
o
u
p
s
i
g
n
atu
r
e
[
1
6
]
an
d
f
u
r
t
h
er
g
iv
e
th
e
an
s
w
er
f
o
r
b
ac
k
i
n
g
ef
f
ec
ti
v
e
u
s
e
o
f
s
to
r
ag
e
r
o
o
m
an
d
b
ac
k
i
n
g
f
o
r
ele
m
e
n
t c
lie
n
t e
x
p
a
n
s
io
n
[
1
7
]
.
2.
RE
S
E
ARCH
M
E
T
H
O
D
C
lu
s
ter
i
n
g
m
ea
n
s
co
m
b
i
n
i
n
g
s
et
o
f
o
b
j
ec
ts
s
u
ch
t
h
at
o
b
j
ec
t
o
f
s
i
m
ilar
t
y
p
e
ar
e
in
o
n
e
g
r
o
u
p
an
d
d
is
s
i
m
ilar
i
n
o
th
er
g
r
o
u
p
.
Fu
z
z
y
clu
s
ter
i
n
g
i
n
f
o
r
m
atio
n
co
m
p
o
n
en
ts
ca
n
f
it
i
n
w
it
h
m
o
r
e
th
an
o
n
e
cl
u
s
ter
,
an
d
co
n
n
ec
ted
w
i
th
ev
er
y
co
m
p
o
n
en
t
i
s
a
n
ar
r
an
g
e
m
en
t
o
f
p
ar
ticip
atio
n
le
v
els.
T
h
ese
d
e
m
o
n
s
tr
ate
th
e
q
u
alit
y
o
f
th
e
r
elatio
n
s
h
ip
b
et
w
ee
n
th
a
t i
n
f
o
r
m
atio
n
co
m
p
o
n
en
t a
n
d
a
s
p
ec
if
ic
clu
s
ter
.
Fu
zz
y
cl
u
s
ter
i
n
g
is
a
p
r
o
ce
d
u
r
e
o
f
ap
p
o
in
tin
g
th
e
s
e
p
ar
ticip
atio
n
lev
els,
a
n
d
af
ter
t
h
at
u
tili
zi
n
g
th
e
m
to
d
o
le
o
u
t
in
f
o
r
m
a
tio
n
co
m
p
o
n
e
n
t
s
to
o
n
e
o
r
m
o
r
e
clu
s
ter
s
.
C
l
u
s
ter
i
n
g
i
s
o
f
d
i
f
f
er
en
t
t
y
p
e
s
a
n
d
ca
n
b
e
u
s
ed
i
n
v
ar
io
u
s
ar
ea
.
I
h
a
v
e
u
s
ed
Fu
zz
y
C
-
Me
an
s
clu
s
ter
i
n
g
m
et
h
o
d
.
Sh
o
w
n
in
Fig
u
r
e
1
S
y
s
te
m
A
r
c
h
itect
u
r
e
.
Fig
u
r
e
1
.
S
y
s
te
m
A
r
c
h
itect
u
r
e
2
.
1
.
G
ro
up
ing
ba
s
ed
o
n da
t
a
pro
v
ided
T
h
e
d
ata
is
g
r
o
u
p
ed
b
ased
o
n
t
h
eir
f
u
n
ctio
n
a
lit
y
an
d
o
t
h
er
ch
ar
ac
ter
is
tics
li
k
e
i
n
o
u
r
s
y
s
te
m
g
r
o
u
p
in
g
o
f
j
o
b
is
d
o
n
e
b
ased
o
n
f
u
n
c
ti
o
n
al
ar
ea
,
y
ea
r
o
f
ex
p
er
ien
ce
,
lo
ca
tio
n
.
T
h
e
B
o
o
lean
f
u
n
ctio
n
is
u
s
ed
f
o
r
A
ND
(
∧
)
an
d
OR
(
V)
is
u
s
e
d
.
Fo
r
ex
a
m
p
le
(
m
1
∧
m2
∧
m
3
)
,
(
m
1
)
V
(
m
2
∧
m
3
)
,
(
m
1
∧
m
2
)
V(
m
3
)
,
(
m
1
V
m
2
V
m
3
)
,
(
m
1
∧
m
3
)
V(
m
2
)
w
h
er
e
m
1
,
m
2
an
d
m
3
ar
e
attr
ib
u
tes.
2
.
2
.
E
ncry
ptio
n
T
h
e
s
tep
s
in
cl
u
d
ed
in
en
cr
y
p
ti
o
n
p
r
o
ce
s
s
ar
e:
-
1.
Gen
er
ate
a
R
ij
n
d
ae
l M
an
a
g
ed
as
y
m
m
etr
ic
k
e
y
f
o
r
en
cr
y
p
ti
n
g
th
e
d
ata.
2.
W
h
en
th
e
en
cr
y
p
tio
n
is
d
o
n
e
u
s
i
n
g
R
ij
n
d
ae
l
k
e
y
th
e
n
th
e
R
S
A
C
r
y
p
to
s
er
v
ice
o
b
j
ec
t
is
cr
e
ated
to
en
cr
y
p
t
th
e
R
ij
n
d
ae
l
k
e
y
.
3.
T
h
en
cr
y
p
to
s
tr
ea
m
o
b
j
ec
t
is
u
s
ed
to
r
ea
d
an
d
en
cr
y
p
t
t
h
e
s
o
u
r
ce
f
ile
i
n
b
lo
ck
s
o
f
b
y
tes
i
n
d
esti
n
atio
n
f
i
le
o
b
j
ec
t.
4.
T
h
e
b
y
te
ar
r
a
y
is
cr
ea
ted
b
y
f
i
n
d
in
g
th
e
le
n
g
t
h
o
f
en
cr
y
p
ted
k
e
y
a
n
d
I
V.
5.
T
h
e
k
e
y
s
ize,
I
V
an
d
t
h
eir
len
g
th
i
s
w
r
itte
n
to
en
cr
y
p
ted
p
ac
k
ag
e.
T
h
e
g
en
er
al
m
eth
o
d
f
o
r
en
cr
y
p
tio
n
an
d
d
ec
r
y
p
tio
n
i
n
cl
u
d
e
g
en
er
atin
g
t
h
e
p
r
iv
ate
k
e
y
a
n
d
p
u
b
lic
k
e
y
u
s
i
n
g
th
e
g
i
v
en
m
et
h
o
d
:
a)
Select
t
w
o
p
r
i
m
e
n
u
m
b
er
X
a
n
d
Y
b)
Fin
d
M=
X
*
Y
an
d
ɸ
(
M)
=(
X
-
1
)
*
(
Y
-
1)
c)
Select
p
s
u
c
h
th
a
t 1
<p
<
ɸ
(
M)
an
d
p
an
d
M
ar
e
co
p
r
im
e
d)
Fin
d
t
h
e
v
a
u
e
f
o
r
z
s
u
c
h
t
h
at
(
z
*
p
)
%
ɸ
(
M)
=1
e)
No
w
P
u
b
lic
Ke
y
is
(
p
,
M)
an
d
P
r
iv
ate
k
e
y
i
s
(
z,
M)
Evaluation Warning : The document was created with Spire.PDF for Python.
I
SS
N
:
2
2
5
2
-
8938
IJ
-
AI
Vo
l.
6
,
No
.
4
,
Dec
em
b
e
r
201
7
:
14
3
–
1
49
146
f)
E
n
cr
y
p
tio
n
i
s
q
≡c
p
(
m
o
d
)
M
2
.
3
.
Dec
ry
ptio
n
T
h
e
s
tep
s
in
cl
u
d
ed
in
d
ec
r
y
p
ti
o
n
p
r
o
ce
s
s
ar
e:
-
1.
Gen
er
ate
a
R
ij
n
d
ae
l M
an
a
g
ed
as
y
m
m
etr
ic
k
e
y
f
o
r
d
ec
r
y
p
ti
n
g
th
e
d
ata.
2.
T
h
en
in
b
y
te
ar
r
a
y
o
b
tain
t
h
e
l
en
g
t
h
I
V,
en
cr
y
p
ted
k
e
y
a
n
d
th
e
f
ir
s
t e
ig
h
t b
y
tes o
f
f
ile.
3.
No
w
R
S
A
o
b
j
ec
t is cr
ea
ted
to
d
ec
r
y
p
t t
h
e
R
ij
n
d
ae
l M
an
a
g
ed
k
e
y
.
4.
T
h
en
cr
y
p
to
s
tr
ea
m
o
b
j
ec
t is u
s
ed
to
d
ec
r
y
p
t th
e
cip
h
er
tex
t o
f
f
ile
i
n
b
lo
ck
s
o
f
b
y
tes.
5.
Dec
r
y
p
tio
n
is
c≡
q
z
(
m
o
d
)
M
T
h
e
R
S
A
Ke
y
s
ize
2
5
6
is
u
s
ed
,
I
V
len
g
t
h
is
b
et
w
ee
n
4
-
7
b
y
t
es.
T
h
e
R
S
A
alg
o
r
it
h
m
ca
n
’
t e
n
cr
y
p
t t
h
e
lar
g
er
f
ile
s
o
f
o
r
th
at
p
u
r
p
o
s
e
th
e
d
ata
is
en
cr
y
p
ted
u
s
i
n
g
as
y
m
m
etr
ic
k
e
y
a
n
d
th
e
n
th
e
as
y
m
m
e
tr
ic
k
e
y
i
s
en
cr
y
p
ted
u
s
in
g
R
S
A
.
2
.
4
.
Clus
t
er
ing
T
h
e
Fu
zz
y
-
C
Me
an
clu
s
t
er
in
g
is
u
s
ed
.
T
h
e
FC
M
clu
s
ter
in
g
f
o
r
m
u
la
u
s
e
d
h
er
e
is
∑
∑
‖
‖
1
≤
n
<∞
w
h
er
e
n
i
s
a
r
ea
l
n
u
m
b
er
,
v
ij
is
t
h
e
d
e
g
r
ee
o
f
ass
o
ciat
io
n
o
f
z
i
i
n
t
h
e
c
lu
s
ter
j
,
z
i
is
th
e
i
th
o
f
d
-
d
i
m
e
n
s
io
n
al
m
ea
s
u
r
ed
d
ata,
y
j
i
s
th
e
d
-
d
i
m
en
s
io
n
ce
n
tr
e
o
f
th
e
cl
u
s
ter
,
an
d
|
|
*
|
|
i
s
a
s
tan
d
ar
d
co
m
m
u
n
i
ca
tin
g
th
e
li
k
en
e
s
s
b
et
w
ee
n
an
y
d
elib
er
ate
in
f
o
r
m
atio
n
an
d
th
e
ce
n
tr
e.
‖
‖
is
th
e
E
u
clid
ea
n
d
is
tan
ce
b
et
w
ee
n
z
i
a
n
d
y
j
.
T
h
e
f
u
zz
y
p
ar
titi
o
n
i
s
ca
r
r
ied
o
u
t th
r
o
u
g
h
iter
ati
v
e
f
u
n
ctio
n
b
y
u
p
d
atin
g
t
h
e
v
al
u
e
o
f
v
ij
a
n
d
Y
j
a
s
fo
llo
w
s
:
∑
(
‖
‖
)
∑
∑
2
.
4
.
Ca
s
e
Study
Sh
o
w
n
i
n
Fi
g
u
r
e
2
J
o
b
Po
r
tal
Hier
ar
ch
y
.
A
w
eb
ap
p
licatio
n
o
n
J
o
b
P
o
r
tal
n
a
m
ed
C
ar
ee
r
Fin
d
er
is
cr
ea
ted
.
T
h
e
ap
p
licatio
n
is
d
esig
n
ed
in
Vi
s
u
a
l
Stu
d
io
u
s
i
n
g
n
et
lan
g
u
ag
e.
T
h
er
e
ar
e
th
r
ee
en
titi
e
s
in
t
h
i
s
ap
p
licatio
n
th
e
y
ar
e:
a)
A
d
m
i
n
:
-
T
h
e
p
u
r
p
o
s
e
o
f
ad
m
i
n
is
to
j
u
s
t
v
ie
w
,
ed
it o
r
d
elete
th
e
j
o
b
s
ee
k
er
an
d
jo
b
p
r
o
v
id
er
d
etails.
b)
J
o
b
Seek
er
:
-
First
th
e
j
o
b
s
ee
k
er
h
a
s
to
r
e
g
is
ter
in
th
e
p
o
r
tal
an
d
p
r
o
v
id
e
all
th
e
n
ec
e
s
s
ar
y
d
etail
a
s
k
ed
in
p
o
r
tal.
A
f
ter
t
h
at
w
h
e
n
t
h
e
s
ee
k
er
lo
g
i
n
th
e
p
o
r
tal
th
er
e
w
il
l
b
e
th
r
ee
o
p
tio
n
av
ai
lab
l
e
f
o
r
s
ee
k
er
ed
it
d
etail,
ch
ec
k
a
v
ailab
le
j
o
b
s
an
d
h
o
m
e
s
cr
ee
n
.
I
n
ch
ec
k
a
v
ail
ab
le
j
o
b
s
p
ag
e
th
e
g
r
o
u
p
i
n
g
f
u
n
ct
io
n
is
u
s
ed
b
ased
o
n
th
is
f
o
r
m
u
la
(
m
1
∧
m2
∧
m
3
)
,
(
m
1
)
V
(
m
2
∧
m
3
)
,
(
m
1
∧
m
2
)
V(
m
3
)
,
(
m
1
V
m
2
V
m
3
)
,
(
m
1
∧
m
3
)
V(
m
2
)
w
h
er
e
s
ee
k
er
f
u
n
ctio
n
is
(
m
1
)
,
to
tal
y
ea
r
o
f
ex
p
er
ien
ce
s
is
(
m
2
)
an
d
lo
ca
tio
n
is
(
m
3
)
.
T
h
e
s
ee
k
er
ca
n
ch
ec
k
j
o
b
an
d
ap
p
ly
f
o
r
it.
B
ef
o
r
e
ap
p
ly
in
g
t
h
e
s
ee
k
er
f
ir
s
t
h
a
v
e
to
s
elec
t
t
h
e
j
o
b
an
d
s
elec
t
th
e
r
es
u
m
e
w
h
ic
h
w
il
l
b
e
en
cr
y
p
ted
a
n
d
t
h
en
s
to
r
ed
in
c
lo
u
d
.
T
h
en
t
h
e
r
e
is
tr
ac
k
ap
p
licatio
n
p
ag
e
wh
e
r
e
s
ee
k
er
ca
n
s
ee
th
er
e
j
o
b
s
tatu
s
w
h
e
th
er
t
h
e
y
ar
e
q
u
alif
ied
,
o
v
er
q
u
aili
f
ed
o
r
u
n
d
er
q
u
alif
ied
.
c)
J
o
b
P
r
o
v
id
er
:
-
T
h
e
j
o
b
p
r
o
v
id
er
ca
n
v
ie
w
o
r
ad
d
n
e
w
j
o
b
s
,
ch
ec
k
a
n
d
u
p
d
ate
s
co
r
e
f
o
r
ea
ch
ap
p
lican
t,
ch
ec
k
f
i
n
al
r
e
s
u
l
t
an
d
ed
it
t
h
ei
r
o
w
n
d
etails.
I
n
ch
ec
k
a
n
d
u
p
d
ate
s
co
r
e
f
o
r
ea
ch
ap
p
lican
t
t
h
e
p
r
o
v
id
er
h
a
s
to
f
ir
s
t
d
o
w
n
lo
ad
th
e
en
cr
y
p
t
ed
r
esu
m
e
f
r
o
m
t
h
e
d
atab
ase
w
h
ic
h
is
cr
ea
ted
in
clo
u
d
.
A
f
t
er
d
o
w
n
lo
ad
in
g
th
e
e
n
cr
y
p
ted
r
es
u
m
e
t
h
er
e
i
s
an
o
t
h
er
o
p
tio
n
a
v
ailab
le
to
d
ec
r
y
p
t
t
h
e
e
n
cr
y
p
ted
r
e
s
u
m
e
f
r
o
m
t
h
er
e
t
h
e
r
esu
m
e
w
ill
b
e
d
ec
r
y
tp
ted
an
d
s
to
r
ed
in
u
s
er
s
y
s
te
m
.
Af
ter
d
ec
r
y
p
tio
n
i
s
d
o
n
e
th
e
p
r
o
v
id
er
h
av
e
to
in
s
er
t
th
e
tec
h
n
ical
s
co
r
e
an
d
h
r
s
co
r
e
th
en
p
ar
tial
FC
M
c
lu
s
ter
in
g
is
p
er
f
o
r
m
ed
u
s
in
g
t
h
i
s
s
co
r
e.
I
n
r
esu
l
t
p
ag
e
th
e
o
th
er
h
a
lv
e
s
o
f
F
C
M
clu
s
t
er
in
g
i
s
p
er
f
o
r
m
ed
an
d
th
e
r
es
u
lt is
d
is
p
la
y
ed
b
ased
o
n
th
e
cl
u
s
ter
i
n
g
.
Evaluation Warning : The document was created with Spire.PDF for Python.
IJ
-
AI
I
SS
N:
2252
-
8938
F
u
z
z
y
-
S
et
B
a
s
ed
P
r
iva
cy
P
r
eser
vin
g
A
cc
ess
C
o
n
tr
o
l Tec
h
n
iq
u
es in
…
(
S
u
d
h
a
.
S
)
147
Fig
u
r
e
2
.
J
o
b
Po
r
tal
Hier
ar
ch
y
3.
RE
SU
L
T
S
A
ND
AN
AL
Y
SI
S
T
h
e
ex
p
er
i
m
e
n
t
w
a
s
d
o
n
e
o
n
a
lap
to
p
w
it
h
3
.
1
0
GH
Z
C
P
U
an
d
4
GB
R
A
M,
r
u
n
n
i
n
g
w
i
n
d
o
w
s
1
0
as
w
ell
as
tes
ted
in
w
i
n
d
o
w
s
7
OS.
T
h
e
p
er
f
o
r
m
a
n
ce
w
as
c
h
ec
k
ed
an
d
f
o
u
n
d
b
etter
th
a
n
t
h
e
e
x
is
tin
g
s
y
s
te
m
.
T
h
e
d
ata
w
h
ic
h
is
s
to
r
ed
in
clo
u
d
w
a
s
tak
e
n
f
r
o
m
i
n
ter
n
et.
T
h
e
ch
ar
t
h
as
b
ee
n
p
r
ep
ar
ed
to
s
h
o
w
t
h
e
d
if
f
er
en
ce
b
et
wee
n
ti
m
e
ta
k
en
b
y
ex
i
s
ti
n
g
s
y
s
te
m
a
n
d
p
r
o
p
o
s
ed
s
y
s
te
m
f
o
r
en
cr
y
p
tio
n
,
d
ec
r
y
p
tio
n
an
d
d
a
ta
tr
an
s
m
i
s
s
io
n
.
S
h
o
w
n
in
T
ab
le
1
-
2
,
an
d
Fig
u
r
e
3
-
4
.
T
ab
le
1
.
A
v
er
ag
e
Fi
le
Up
lo
ad
o
f
b
o
th
ex
i
s
tin
g
a
n
d
p
r
o
p
o
s
ed
s
y
s
te
m
F
i
l
e
si
z
e
2
7
K
B
5
2
K
B
1
7
2
K
B
5
2
0
K
B
HB
-
P
P
A
C
[
1
]
(
T
i
me
i
n
ms)
3
2
.
7
1
3
7
.
5
8
4
8
.
2
5
5
5
.
5
3
FB
-
P
P
A
C
(
T
i
me
i
n
ms)
2
8
.
5
3
3
2
.
4
2
4
3
.
3
1
4
9
.
2
Fig
u
r
e
3
.
Av
er
ag
e
Fi
le
Up
lo
ad
o
f
b
o
th
ex
is
t
in
g
an
d
p
r
o
p
o
s
ed
s
y
s
te
m
T
ab
le
2
.
A
v
er
ag
e
Fi
le
Do
w
n
lo
ad
o
f
b
o
th
ex
is
ti
n
g
an
d
p
r
o
p
o
s
ed
s
y
s
te
m
F
i
l
e
si
z
e
2
7
K
B
5
2
K
B
1
7
2
K
B
5
2
0
K
B
HB
-
P
P
A
C
[
1
]
(
T
i
me
i
n
ms)
2
3
.
6
8
2
6
.
5
1
3
4
.
8
9
4
2
.
1
9
FB
-
P
P
A
C
(
T
i
me
i
n
ms)
2
0
.
5
3
2
1
.
4
2
2
9
.
3
1
3
8
.
2
Evaluation Warning : The document was created with Spire.PDF for Python.
I
SS
N
:
2
2
5
2
-
8938
IJ
-
AI
Vo
l.
6
,
No
.
4
,
Dec
em
b
e
r
201
7
:
14
3
–
1
49
148
Fig
u
r
e
4
.
Av
er
ag
e
Fi
le
Do
w
n
l
o
ad
o
f
b
o
th
ex
is
ti
n
g
a
n
d
p
r
o
p
o
s
ed
s
y
s
te
m
T
h
e
en
cr
y
p
tio
n
a
n
d
d
ec
r
y
p
tio
n
ti
m
e
v
ar
ie
s
ac
co
r
d
in
g
to
t
h
e
f
ile
s
ize.
Hen
ce
t
h
e
r
es
u
lt
s
h
o
w
s
t
h
e
p
r
o
p
o
s
ed
s
y
s
te
m
i
s
m
o
r
e
r
eliab
le
an
d
f
a
s
t th
e
n
ex
is
iti
n
g
s
y
s
te
m
.
4.
CO
NCLU
SI
O
N
I
n
t
h
is
p
ap
er
,
f
u
zz
y
s
et
b
a
s
ed
p
r
iv
ac
y
p
r
eser
v
in
g
ac
ce
s
s
co
n
tr
o
l
tech
n
iq
u
e
is
u
s
ed
to
p
r
o
v
i
d
e
p
r
iv
ac
y
f
o
r
ac
ce
s
s
i
n
g
p
u
b
lic
d
ata
in
cl
o
u
d
s
.
T
h
e
f
u
zz
y
c
-
m
ea
n
cl
u
s
t
er
in
g
is
u
s
ed
f
o
r
cl
u
s
ter
i
n
g
th
e
d
ata
b
y
u
s
er
s
id
e.
T
h
e
en
cr
y
p
tio
n
i
s
d
o
n
e
at
d
ata
o
w
n
er
s
id
e
f
o
r
e
n
cr
y
p
ti
n
g
t
h
e
d
ata
an
d
s
to
r
ed
in
clo
u
d
d
ata
b
ase.
T
h
e
d
ec
r
p
tio
n
is
d
o
n
e
at
u
s
er
s
id
e
f
o
r
d
ec
r
y
p
tin
g
th
e
d
ata
.
B
y
u
s
in
g
t
h
i
s
m
et
h
o
d
it
m
ak
e
s
t
h
e
s
y
s
te
m
u
n
iq
u
e
f
r
o
m
o
t
h
er
ex
is
t
in
g
s
y
s
te
m
.
T
h
e
ex
p
er
i
m
en
tal
a
n
al
y
s
is
p
r
o
v
es
t
h
at
s
y
s
te
m
p
er
f
o
r
m
s
b
etter
b
y
m
in
i
m
izin
g
t
h
e
co
m
p
u
tatio
n
co
s
t a
n
d
i
n
cr
ea
s
e
th
e
p
er
f
o
r
m
a
n
ce
s
p
ee
d
.
ACK
NO
WL
E
D
G
E
M
E
NT
S
Asi
d
e
f
r
o
m
th
e
e
n
d
ea
v
o
r
s
m
a
d
e
b
y
m
e,
t
h
e
ac
h
iev
e
m
e
n
t o
f
th
e
tas
k
d
ep
en
d
s
g
e
n
er
all
y
o
n
th
e
s
u
p
p
o
r
t
an
d
g
u
id
elin
e
s
o
f
m
a
n
y
o
t
h
er
s
.
W
e
w
o
u
ld
ta
k
e
th
is
c
h
an
ce
t
o
ex
p
r
ess
o
u
r
ap
p
r
ec
iatio
n
to
t
h
e
p
eo
p
le
w
h
o
h
a
v
e
b
ee
n
in
s
tr
u
m
en
tal
in
t
h
e
f
r
u
it
f
u
l c
o
m
p
letio
n
o
f
t
h
is
p
r
o
j
ec
t.
RE
F
E
R
E
NC
E
S
[1
]
S
u
d
h
a
S
e
n
th
il
k
u
m
a
r,
M
a
d
h
u
V
i
sw
a
n
a
th
a
m
,
(in
p
re
ss
).
HB
-
P
P
A
C:
h
iera
rc
h
y
b
a
se
d
p
riv
a
c
y
p
re
se
rv
in
g
a
c
c
e
ss
c
o
n
tro
l
tec
h
n
iq
u
e
in
p
u
b
li
c
c
l
o
u
d
s
,
In
ter
n
a
ti
o
n
a
l
J
o
u
rn
a
l
o
f
Hig
h
P
e
rfo
rm
a
n
c
e
Co
mp
u
ti
n
g
a
n
d
Ne
tw
o
rk
in
g
.
[2
]
Be
th
e
n
c
o
u
rt
,
Jo
h
n
,
Am
it
S
a
h
a
i,
a
n
d
Bre
n
t
W
a
ters
.
"
Cip
h
e
rtex
t
-
p
o
li
c
y
a
tt
rib
u
te
-
b
a
se
d
e
n
c
ry
p
ti
o
n
.
"
S
e
c
u
rity
a
n
d
Priva
c
y
,
2
0
0
7
.
S
P
'0
7
.
IEE
E
S
y
mp
o
siu
m
o
n
.
IEE
E,
2
0
0
7
.
(6
)
[3
]
Ca
d
e
n
h
e
a
d
,
T
y
ro
n
e
,
M
u
ra
t
Ka
n
t
a
rc
io
g
lu
,
a
n
d
Bh
a
v
a
n
i
T
h
u
ra
isi
n
g
h
a
m
.
“
S
c
a
lab
le
a
n
d
e
ff
icie
n
t
re
a
so
n
in
g
f
o
r
e
n
f
o
r
c
in
g
ro
le
-
b
a
se
d
a
c
c
e
ss
c
o
n
tro
l
.
”
Da
ta
a
n
d
Ap
p
li
c
a
ti
o
n
s
S
e
c
u
rity
a
n
d
Priva
c
y
XX
IV
.
S
p
rin
g
e
r
Ber
li
n
He
id
e
lb
e
rg
,
2
0
1
0
.
2
0
9
-
2
2
4
.
[4
]
Ell
io
tt
,
A
a
ro
n
,
a
n
d
S
c
o
tt
Kn
ig
h
t.
“
Ro
le
Ex
p
l
o
sio
n
:
A
c
k
n
o
w
le
d
g
in
g
th
e
P
ro
b
lem
.
”
In
S
o
ft
wa
re
En
g
in
e
e
rin
g
Res
e
a
rc
h
a
n
d
Pra
c
ti
c
e
,
p
p
.
3
4
9
-
3
5
5
.
2
0
1
0
.
(1
0
)
[5
]
F
re
u
d
e
n
t
h
a
l,
Er
ic,
e
t
a
l.
"
d
RBA
C:
d
istri
b
u
te
d
ro
le
-
b
a
se
d
a
c
c
e
ss
c
o
n
tr
o
l
f
o
r
d
y
n
a
m
ic
c
o
a
li
ti
o
n
e
n
v
iro
n
m
e
n
ts.
"
Distrib
u
ted
Co
mp
u
ti
n
g
S
y
ste
ms
,
2
0
0
2
.
Pro
c
e
e
d
in
g
s.
22
nd
I
n
ter
n
a
ti
o
n
a
l
Co
n
fer
e
n
c
e
o
n
.
IEE
E
,
2
0
0
2
.
(
9
)
[6
]
F
a
n
,
Bi
n
,
e
t
a
l.
"
Cu
c
k
o
o
F
il
ter:
P
ra
c
ti
c
a
ll
y
Be
tt
e
r
T
h
a
n
Blo
o
m
.
"
Pro
c
e
e
d
in
g
s
o
f
t
h
e
1
0
th
ACM
I
n
ter
n
a
ti
o
n
a
l
o
n
Co
n
fer
e
n
c
e
o
n
e
me
rg
in
g
Ne
two
rk
in
g
Exp
e
rime
n
ts
a
n
d
T
e
c
h
n
o
lo
g
ie
s
.
A
CM
,
2
0
1
4
.
(1
4
)
[7
]
G
o
y
a
l,
V
ip
u
l,
e
t
a
l.
"
A
tt
rib
u
te
-
b
a
se
d
e
n
c
r
y
p
ti
o
n
f
o
r
f
in
e
-
g
ra
in
e
d
a
c
c
e
ss
c
o
n
tro
l
o
f
e
n
c
r
y
p
ted
d
a
ta"
Pro
c
e
e
d
in
g
s
o
f
th
e
1
3
th
ACM
c
o
n
fer
e
n
c
e
o
n
Co
m
p
u
ter
a
n
d
c
o
mm
u
n
ica
ti
o
n
s se
c
u
rit
y
.
Ac
m
,
2
0
0
6
.
(5
)
[8
]
G
ro
b
a
u
e
r,
B.
,
W
a
ll
o
s
c
h
e
k
,
T
.
a
n
d
S
to
c
k
e
r,
E.
(2
0
1
1
)
“
Un
d
e
rst
a
n
d
in
g
c
lo
u
d
c
o
m
p
u
ti
n
g
v
u
ln
e
r
a
b
il
it
ies
.
”
IEE
E
S
e
c
u
rity a
n
d
Priv
a
c
y
,
Vo
l.
9
,
p
p
.
5
0
–
5
7
.
(
2
3
)
[9
]
L
i,
Qi,
M
in
g
w
e
i
X
u
,
a
n
d
X
i
n
w
e
n
Zh
a
n
g
"
T
o
wa
rd
s
a
g
ro
u
p
-
b
a
se
d
RB
A
C
m
o
d
e
l
a
n
d
d
e
c
e
n
tralize
d
u
se
r
-
ro
le
a
d
m
in
istratio
n
.
"
Distrib
u
ted
C
o
mp
u
ti
n
g
S
y
ste
ms
W
o
rk
sh
o
p
s,
2
0
0
8
.
ICDCS
'0
8
.
2
8
th
I
n
ter
n
a
t
io
n
a
l
Co
n
fer
e
n
c
e
o
n
.
IEE
E,
2
0
0
8
.
(
2
)
[1
0
]
M
o
h
a
n
,
a
n
d
M
.
S
u
d
h
e
e
p
El
a
y
id
o
m
.
"
F
in
e
G
ra
in
e
d
A
c
c
e
ss
Co
n
tro
l
a
n
d
Re
v
o
c
a
ti
o
n
f
o
r
S
e
c
u
re
Cl
o
u
d
En
v
ir
o
n
m
e
n
t
–
A
P
o
ly
n
o
m
ial
Ba
se
d
A
p
p
ro
a
c
h
.
"
Pro
c
e
d
ia
C
o
mp
u
ter
S
c
ien
c
e
4
6
(
2
0
1
5
):
7
1
9
-
7
2
4
.
(
1
7
)
Evaluation Warning : The document was created with Spire.PDF for Python.
IJ
-
AI
I
SS
N:
2252
-
8938
F
u
z
z
y
-
S
et
B
a
s
ed
P
r
iva
cy
P
r
eser
vin
g
A
cc
ess
C
o
n
tr
o
l Tec
h
n
iq
u
es in
…
(
S
u
d
h
a
.
S
)
149
[1
1
]
Ru
j,
S
u
s
h
m
it
a
,
M
il
ica
S
to
jm
e
n
o
v
ic,
a
n
d
Am
i
y
a
Na
y
a
k
.
"
D
e
c
e
n
tralize
d
a
c
c
e
ss
c
o
n
tro
l
w
it
h
a
n
o
n
y
m
o
u
s
a
u
th
e
n
ti
c
a
ti
o
n
o
f
d
a
ta
sto
re
d
in
c
l
o
u
d
s
.
"
Pa
ra
l
lel
a
n
d
Distrib
u
ted
S
y
ste
ms
,
IEE
E
T
ra
n
sa
c
ti
o
n
s
o
n
2
5
.
2
(
2
0
1
4
):
3
8
4
-
3
9
4
.
(1
5
)
[1
2
]
S
u
,
Ji
n
-
S
h
u
,
e
t
a
l.
"
A
tt
rib
u
te b
a
se
d
e
n
c
ry
p
ti
o
n
sc
h
e
m
e
s."
J
o
u
rn
a
l
o
f
S
o
ft
wa
re
2
2
.
6
(2
0
1
1
):
1
2
9
9
-
1
3
1
5
.
(1
)
[1
3
]
W
a
n
,
Zh
ig
u
o
,
J
u
n
E.
L
iu
,
a
n
d
R
o
b
e
rt
H.
De
n
g
.
"
HA
S
BE:
a
h
iera
rc
h
ica
l
a
tt
rib
u
te
-
b
a
se
d
so
lu
ti
o
n
f
o
r
f
lex
ib
le
a
n
d
sc
a
lab
le
a
c
c
e
ss
c
o
n
tro
l
i
n
c
lo
u
d
c
o
m
p
u
ti
n
g
.
“
I
n
fo
rm
a
ti
o
n
F
o
re
n
sic
s
a
n
d
S
e
c
u
rity,
IEE
E
T
ra
n
s
a
c
ti
o
n
s
o
n
7
.
2
(2
0
1
2
):
7
4
3
-
7
5
4
.
(7
)
[1
4
]
Ya
n
g
,
P
iy
i,
Zh
e
n
f
u
Ca
o
,
a
n
d
Xi
a
o
lei
Do
n
g
.
"
F
u
z
z
y
Id
e
n
ti
ty
Ba
s
e
d
S
ig
n
a
tu
re
.
"
IACR
Cry
p
t
o
lo
g
y
e
Prin
t
Arc
h
ive
2
0
0
8
(
2
0
0
8
):
2
.
[1
5
]
S
e
n
th
il
k
u
m
a
r,
S
.
,
a
n
d
V
isw
a
n
a
th
a
m
,
M
.
ACA
FD:
S
e
c
u
re
a
n
d
S
c
a
lab
le
A
c
c
e
ss
Co
n
tro
l
w
it
h
A
ss
u
re
d
F
il
e
De
letio
n
f
o
r
Ou
tso
u
rc
e
d
Da
ta i
n
Clo
u
d
.
J
o
u
rn
a
l
o
f
ICT
Res
e
a
rc
h
a
n
d
A
p
p
l
ica
ti
o
n
s,
(
2
0
1
4
)
8
(
1
),
1
8
-
3
0
.
[1
6
]
Ca
rli
n
,
S
e
a
n
;
Cu
rra
n
,
Ke
v
in
.
Cl
o
u
d
C
o
m
p
u
ti
n
g
T
e
c
h
n
o
lo
g
ies
.
I
n
ter
n
a
ti
o
n
a
l
J
o
u
rn
a
l
o
f
Cl
o
u
d
Co
mp
u
t
in
g
a
n
d
S
e
rv
ice
s S
c
ien
c
e
(
I
J
-
CL
OS
ER
)
Vo
l.
1
,
No
.
2
,
J
u
n
e
2
0
1
2
,
IS
S
N:
2
0
8
9
-
3
3
3
7
.
[1
7
]
Ku
m
a
r,
As
h
ish
.
W
o
rld
o
f
Clo
u
d
Co
m
p
u
ti
n
g
&
S
e
c
u
rit
y
.
In
ter
n
a
ti
o
n
a
l
J
o
u
rn
a
l
o
f
Cl
o
u
d
Co
mp
u
ti
n
g
a
n
d
S
e
rv
ice
s
S
c
ien
c
e
(
IJ
-
CL
OS
ER
)
Vo
l.
1
,
No
.
2
,
Ju
n
e
2
0
1
2
,
I
S
S
N:
2
0
8
9
-
3
3
3
7
.
Evaluation Warning : The document was created with Spire.PDF for Python.