In this paper, we present the design and implementation of an automated resource management system that achieves a good balance between the two goals i.e. Overload avoidance and Green computing. We develop a resource allocation system that can avoid overload in the system effectively while minimizing the number of servers used. . We introduce the […]
To protect the Patient’s privacy for mobile health monitoring system
In this paper, we design a cloud-assisted privacy preserving mobile health monitoring system, called CAM, which can effectively protect the privacy of clients and the intellectual proerty of m Health service providers. To protect the clients’privacy, we apply the anonymous Boneh-Franklin identity based encryption (IBE) in medical diagnostic branching programs. To reduce clients’ decryption complexity, […]
Performance evaluation of Cloud computing infrastructures using SRN (Stochastic Reward Nets)
In order to integrate business requirements and application level needs, in terms of Quality of Service (QoS), cloud service provisioning is regulated by Service Level Agreements. In this paper, we present a stochastic model, based on Stochastic Reward Nets (SRNs), that exhibits features allowing capturing the key concepts of an IaaS cloud system. The proposed […]
Secure data sharing for dynamic groups in the cloud
This paper proposes a secure multi-owner data sharing scheme. It implies that any user in the group can securely share data with others by the untrusted cloud. The proposed scheme is able to support dynamic groups efficiently. Specifically, new granted users can directly decrypt data files uploaded before their participation without contacting with data owners. […]
CloudRank: Cloud Service QoS Ranking Prediction
Nonfunctional performance of cloud services is usually described by quality-of-service (QoS). QoS is an important research topic in cloud computingThis paper proposes a personalized ranking prediction framework, named CloudRank, to predict the QoS ranking of a set of cloud services without requiring additional real-world service invocations from the intended users. Our approach takes advantage of […]
Anonymous Location-based efficient routing protocol
In order to provide high anonymity protection (for sources, destination, and route) with low cost, this paper proposes an Anonymous Location-based and Efficient Routing proTocol (ALERT). ALERT dynamically partitions a network field into zones and randomly chooses nodes in zones as intermediate relay nodes, which form a non traceable anonymous route. Specifically, in each routing […]
A fuzzy logic-based node localization Framework for mobile Sensor Network
Fuzzy logic offers an inexpensive and robust way to deal with highly complex and variable models of noisy, uncertain environments. It provides a mechanism to learn about an environment in a way that treats variability consistently FUZLOC, a fuzzy logic-based localization method suitable for wireless sensor nodes that are mobile in noisy, harsh environments. We […]
Improving Classification Accuracy
This paper considers the notion of identifying subsets of critical data instances in data sets. Critical nuggets of information can take the following form during classification tasks: small subsets of data instances that lie very close to the class boundary and are sensitive to small changes in attribute values, such that these small changes result […]
Reserving room before encryption using Reversible Data Hiding
Reversible data hiding (RDH) in images is a technique, by which the original cover can be losslessly recovered after the embedded message is extracted. In the proposed method, we first empty out room by embedding LSBs of some pixels into other pixels with a traditional RDH method and then encrypt the image, so the positions […]
Decentralized, Key-Based Caching And Checking System To Catch Cloned Nodes
In this paper, we propose two novel node clone detection protocols with different tradeoffs on network conditions and performance. The first one is based on a distributed hash table (DHT), by which a fully decentralized, key-based caching and checking system is constructed to catch cloned nodes effectively. The protocol performance on efficient storage consumption and […]
- « Previous Page
- 1
- …
- 4
- 5
- 6
- 7
- 8
- 9
- Next Page »