Location-based social networking, such as Facebook, here users share their locations with friends and find others who are nearby. Another type of MLBSs requires the users to provide current or historical location proof to fulfill some purposes. Emerging as a new type of mobile marketing, mobile location-based services (MLBSs) have attracted intense attention recently. Unfortunately, […]
MULTI-AUTHORITY ACCESS CONTROL SCHEME FOR SECURE CLOUD STORAGE
In multi-authority cloud storage systems, users’ attributes can be changed dynamically. A user may be entitled some new attributes or revoked some current attributes. And his permission of data access should be changed accordingly. Ciphertext-Policy Attribute-based Encryption (CP-ABE) is regarded as one of the most suitable technologies for data access control in cloud storage, because […]
RESILIENCE TO THE UCONABC CONTINUOUS AUTHORIZATION REEVALUATION FOR CLOUD COMPUTING
The proposed approach provides a resilient UCONABC reevaluation authorization model for cloud computing. The usage architecture for collecting contextual data allows for fine-grained services accounting and authorization attributes. The data are consolidated on a management domain and provided to consumer management systems, enabling the reconfiguration of usage policies and monitoring of SLA fulfillment. The management […]
DOS ATTACK DETECTION BASED ON MULTIVARIATE CORRELATION ANALYSIS
DoS attacks severely degrade the availability of a victim, which can be a host, a router, or an entire network. They impose intensive computati on tasks to the victim by exploiting its system vulnerability or flooding it with huge amount of useless packets. The victim can be forced out of service from a few minutes […]
PREDICTING THE DEGREE OF THE DIFFICULTY FOR KEYWORD QUERIES OVER DATABASES
In Keyword Query Interface, any entity in a data set that contains the query keywords is a potential answer, keyword queries typically have many possible answers. KQIs must identify the information needs behind keyword queries and rank the answers so that the desired answers appear at the top of the list. In this abstract, we […]
A NOVEL ARCHITECTURE FOR INTEGRATES CLOUD DATABASE SERVICES WITH DATA CONFIDENTIALITY AND EXECUTING CONCURRENT OPERATIONS ON ENCRYPTED DATA
In this abstract, we propose SecureDBaaS as the first solution that allows cloud tenants to take full advantage of DBaaS qualities, such as availability, reliability, and elastic scalability, without exposing unencrypted data to the cloud provider. The architecture design was motivated by a threefold goal: to allow multiple, independent, and geographically distributed clients to execute […]
A NOVEL FRAMEWORK TO MEASURE THE DEGREE OF DIFFICULTY FOR A KEYWORD QUERY OVER A DATABASE
In this abstract, we analyze the characteristics of difficult queries over databases and propose a novel method to detect such queries. We propose the Structured Robustness (SR) score, which measures the difficulty of a query based on the differences between the rankings of the same query over the original and noisy (corrupted) versions of the […]
A SECUREDBAAS ARCHITECTURE FOR DISTRIBUTED, CONCURRENT, AND INDEPENDENT ACCESS TO ENCRYPTED CLOUD DATABASES
In this abstract proposed a novel SecureDBaaS architecture that integrates cloud database services with data confidentiality and the possibility of executing concurrent operations on encrypted data. It guarantees data confidentiality by allowing a cloud database server to execute concurrent SQL operations (not only read/write, but also modifications to the database structure) over encrypted data. It […]
FEDERATION OF SELFISH CLOUD PROVIDERS USING CAPACITY SHARING STRATEGY
One of the major problems that face the cloud providers (CPs) is the uncertainty in their work-loads; a spike in the requested VMs may result in higher service rejection rates and experienced delays by clients due to congested resources. A straightforward solution to overcome this problem is to over-provision the available resources to be able […]
CAPACITY SHARING STRATEGY IN A FEDERATION OF SELFISH CLOUD PROVIDERS
Federated clouds approach the CP problem by allowing peer CPs to share their unused capacities during low-demand periods and borrow spare capacity during peaks to maximize their profits and enhance their clients’ experience, with several strategies for capacity sharing in the federation. The proposed work models the interactions among the CPs as a repeated game […]
- « Previous Page
- 1
- …
- 9
- 10
- 11
- 12
- 13
- …
- 21
- Next Page »