Keyword search (KWS) over relational databases has recently received significant attention. Many solutions and many prototypes have been developed. This task requires addressing many issues, including robustness, accuracy, reliability, and privacy. An emerging issue, however, appears to be performance related: current KWS systems have unpredictable running times. In this paper, we present the most extensive […]
TAG POLLUTION ATTACK DETECTION USING TAG ENCODING SCHEME TO LINEAR NETWORK CODING
Linear network coding is a technique which can be used to improve a network’s throughput, efficiency and scalability, as well as resilience to attacks and eavesdropping. Linear network coding is a technique which can be used to improve a network’s throughput, efficiency and scalability, as well as resilience to attacks and eavesdropping. Network coding allows […]
ANONYMIZE LARGE SCALE DATASETS USING MAPREDUCE ON CLOUD BASED ON TWO-PHASE TOP-DOWN SPECIALIZATION APPROACH
Data anonymization has been extensively studied and widely adopted for data privacy preservation in non inter active data publishing and sharing scenarios. Data anonymization refers to hiding identity and/or sensitive data for owners of data records. Then, the privacy of an individual can be effectively preserved while certain aggregate information is exposed to data users […]
ITRUST: AN EFFICIENT TRUST ESTABLISHMENT FOR PROBABILISTIC MISBEHAVIOR DETECTION IN DELAY TOLERANT NETWORK
In DTNs, a node could misbehave by dropping packets intentionally even when it has the capability to forward the data (e.g., sufficient buffers and meeting opportunities). Routing misbehavior can be caused by selfish (or rational) nodes that try to maximize their own benefits by enjoying the services provided by DTN while refusing to forward the […]
Efficient ITRUST for Probabilistic Misbehavior Detection in Delay-Tolerant Networks
Delay-tolerant networking (DTN) is an approach to computer network architecture that seeks to address the technical issues in heterogeneous networks that may lack continuous network connectivity. Examples of such networks are those operating in mobile or extreme terrestrial environments, or planned networks in space. Due to the unique network characteristics, designing a misbehavior detection scheme […]
Ongoing Authorization Model for Cloud Computing
This paper proposed an Authorization Model for Cloud Computing. The proposed model aims to extend the UCONABC ongoing authorization model, providing resilience to the reevaluation of usage policies. Resilience means providing the model with the ability to deal with some individual user authorization attributes exceeding, while the SLA for the respective consumption service is under […]
Tail Theft Dual Queue Scheduling Algorithm for Energy Saving
This paper proposes TailTheft, a scheme that leverages the tail time for batching and prefetching to save energy. TailTheft provides a customized application programming interface (API) for applications. Applications indicate the type of request, the time that can be delayed or prefetched by calling the TailTheft API, as well as the type of action taken […]
KAC: Key Aggregate cryptosystem – A New Data Sharing Model
This paper proposes a new public key encryption called key aggregate cryptosystem (KAC). In KAC, the data owner establishes the public system parameter via Setup and generates a public/master-secret key pair via KeyGen. Messages can be encrypted via Encrypt by anyone who also decides what ciphertext class is associated with the plaintext message to be […]
ToF: Transformation based Optimizations in Cloud
we propose ToF, a transformation-based workflow optimization system to address the performance and monetary cost optimizations in the cloud. We develop and deploy the workflow optimization system in real cloud environments, and demonstrate its effectiveness and efficiency with extensive experiments. ToF has two major components for performance and cost optimizations: transformation model and planner. The […]
Video File Restoration Using Video Codec Specifications
This paper proposes a technique to restore the video data on a frame-by frame basis from its corrupted versions where the video data has been significantly fragmented or partly overwritten in the storage media. The proposed technique restores the video data in a frame unit, not in a file unit. The proposed method restores a […]
- « Previous Page
- 1
- …
- 14
- 15
- 16
- 17
- 18
- …
- 21
- Next Page »