CLOUD computing has emerged as a compelling paradigm for the deployment of ease-of-use virtual environment on the Internet. One typical feature of clouds is its pool of easily accessible virtualized resources (such as hardware, platform or services) that can be dynamically reconfigured to adjust to a variable load (scale). Cloud systems usually do not provision […]
Similarity relevance scheme for protecting data in cloud computing
Cloud computing, a critical pattern for advanced data service, has became a necessary feasibility for data users to outsource data. Controversies on privacy, It is incessantly presented as outsourcing of sensitive information including emails, health history and personal photos is explosively expanding. Traditional SSE schemes enable users to securely retrieve the cipher text, but these […]
Predictive ACKs: Reducing Latency and Operational Cost in Cloud Computing
PACK (Predictive ACKs), traffic redundancy elimination (TRE) system, designed for cloud computing customers. In this paper, we present a novel receiver-based end-to-end TRE solution that relies on the power of predictions to eliminate redundant traffic between the cloud and its end-users. In this solution, each receiver observes the incoming stream and tries to match its […]
Skewness Minimization: Improving utilization of Cloud servers
In this paper, we present the design and implementation of an automated resource management system that achieves a good balance between the two goals i.e. Overload avoidance and Green computing. We develop a resource allocation system that can avoid overload in the system effectively while minimizing the number of servers used. . We introduce the […]
Secure data sharing for dynamic groups in the cloud
This paper proposes a secure multi-owner data sharing scheme. It implies that any user in the group can securely share data with others by the untrusted cloud. The proposed scheme is able to support dynamic groups efficiently. Specifically, new granted users can directly decrypt data files uploaded before their participation without contacting with data owners. […]
CloudRank: Cloud Service QoS Ranking Prediction
Nonfunctional performance of cloud services is usually described by quality-of-service (QoS). QoS is an important research topic in cloud computingThis paper proposes a personalized ranking prediction framework, named CloudRank, to predict the QoS ranking of a set of cloud services without requiring additional real-world service invocations from the intended users. Our approach takes advantage of […]
Anonymous Location-based efficient routing protocol
In order to provide high anonymity protection (for sources, destination, and route) with low cost, this paper proposes an Anonymous Location-based and Efficient Routing proTocol (ALERT). ALERT dynamically partitions a network field into zones and randomly chooses nodes in zones as intermediate relay nodes, which form a non traceable anonymous route. Specifically, in each routing […]
A fuzzy logic-based node localization Framework for mobile Sensor Network
Fuzzy logic offers an inexpensive and robust way to deal with highly complex and variable models of noisy, uncertain environments. It provides a mechanism to learn about an environment in a way that treats variability consistently FUZLOC, a fuzzy logic-based localization method suitable for wireless sensor nodes that are mobile in noisy, harsh environments. We […]
Improving Classification Accuracy
This paper considers the notion of identifying subsets of critical data instances in data sets. Critical nuggets of information can take the following form during classification tasks: small subsets of data instances that lie very close to the class boundary and are sensitive to small changes in attribute values, such that these small changes result […]
Multi-path Wireless Routing Protocols with Minimum Cost Blocking Problem
We present a class of Minimum Cost Blocking (MCB) problems in Wireless Mesh Networks (WMNs) with multi-path wireless routing protocols. We establish the provable superiority of multi-path routing protocols over conventional protocols against blocking, node-isolation and network-partitioning type attacks. In our attack model, an adversary is considered successful if he is able to capture/isolate a […]
- « Previous Page
- 1
- …
- 8
- 9
- 10
- 11
- 12
- …
- 15
- Next Page »