This paper focuses the problem of optimal multi-server configuration for profit maximization in a cloud computing environment. This approach is to treat a multi-server system as an M/M/m queuing model, such that our optimization problem can be formulated and solved analytically. We consider two server speed and power consumption models, namely, the idle-speed model and […]
To protect the Patient’s privacy for mobile health monitoring system
In this paper, we design a cloud-assisted privacy preserving mobile health monitoring system, called CAM, which can effectively protect the privacy of clients and the intellectual proerty of m Health service providers. To protect the clients’privacy, we apply the anonymous Boneh-Franklin identity based encryption (IBE) in medical diagnostic branching programs. To reduce clients’ decryption complexity, […]
Performance evaluation of Cloud computing infrastructures using SRN (Stochastic Reward Nets)
In order to integrate business requirements and application level needs, in terms of Quality of Service (QoS), cloud service provisioning is regulated by Service Level Agreements. In this paper, we present a stochastic model, based on Stochastic Reward Nets (SRNs), that exhibits features allowing capturing the key concepts of an IaaS cloud system. The proposed […]
CloudRank: Cloud Service QoS Ranking Prediction
Nonfunctional performance of cloud services is usually described by quality-of-service (QoS). QoS is an important research topic in cloud computingThis paper proposes a personalized ranking prediction framework, named CloudRank, to predict the QoS ranking of a set of cloud services without requiring additional real-world service invocations from the intended users. Our approach takes advantage of […]
A fuzzy logic-based node localization Framework for mobile Sensor Network
Fuzzy logic offers an inexpensive and robust way to deal with highly complex and variable models of noisy, uncertain environments. It provides a mechanism to learn about an environment in a way that treats variability consistently FUZLOC, a fuzzy logic-based localization method suitable for wireless sensor nodes that are mobile in noisy, harsh environments. We […]
Improving Classification Accuracy
This paper considers the notion of identifying subsets of critical data instances in data sets. Critical nuggets of information can take the following form during classification tasks: small subsets of data instances that lie very close to the class boundary and are sensitive to small changes in attribute values, such that these small changes result […]
Combined and Differentiated Localization approach for localization using received signal strength indicator (RSSI)
In this paper, we propose CDL, a Combined and Differentiated Localization approach for localization that exploits the strength of range-free approaches and range-based approaches using received signal strength indicator (RSSI). A critical observation is that ranging quality greatly impacts the overall localization accuracy. To achieve a better ranging quality, our method CDL incorporates virtual-hop localization, […]
DISTRIBUTED AND SELF-MANAGED ADDRESSING PROTOCOL FOR DYNAMIC AD HOC NETWORKS
We proposed a distributed and self-managed addressing protocol, called Filter-based Addressing protocol, which fits well for dynamic ad hoc networks with fading channels, frequent partitions, and joining/leaving nodes. Address assignment is a key challenge in ad hoc networks due to the lack of infrastructure. Autonomous addressing protocols require a distributed and self-managed mechanism to avoid […]
To detect and mitigate collaborative attacks in the cloud Virtual networking environment
NICE utilizes the attack graph model to conduct attack detection and prediction. The proposed solution investigates how to use the programmability of software switches based solutions to improve the detection accuracy and defeat victim exploitation phases of collaborative attacksCloud security is one of most important issues that has attracted a lot of research and development […]
Enhanced Adaptive ACKnowledgment to detect Secure Intrusion in for MANETs
In this paper, we propose and implement a new intrusion-detection system named Enhanced Adaptive ACKnowledgment (EAACK) specially designed for MANETs. Compared to contemporary approaches, EAACK demonstrates higher malicious- behavior-detection rates in certain circumstances while does not greatly affect the network performances. The migration to wireless network from wired network has been a global trend in […]