Showing 25–36 of 468 results

  • A Hyper-Heuristic Scheduling Algorithm for Cloud

    0 out of 5
    4,500

    A Hyper-Heuristic Scheduling Algorithm for Cloud Abstract?A Hyper-Heuristic Scheduling Algorithm for Cloud. Rule-based scheduling algorithms have been widely used on many cloud computing systems because they are simple and easy to implement. However, there is plenty of room to improve the performance of these algorithms, especially by using heuristic scheduling. As such, this paper presents…

  • A Joint Optimization of Operational Cost and Performance Interference in Cloud Data Centers

    0 out of 5
    4,500

    A Joint Optimization of Operational Cost and Performance Interference in Cloud Data Centers Abstract– Virtual machine (VM) scheduling is an important technique to efficiently operate the computing resources in a data center. Previous work has mainly focused on consolidating VMs to improve resource utilization and thus to optimize energy consumption. However, the interference between collocated…

  • A Key-Policy Attribute-Based Temporary Keyword Search Scheme for Secure Cloud Storage

    0 out of 5
    4,500

    A Key-Policy Attribute-Based Temporary Keyword Search scheme for Secure Cloud Storage Abstract-Temporary keyword search on con?dential data in a cloud environment is the main focus of this research. The cloud providers are not fully trusted. So, it is necessary to outsource data in the encrypted form. In the attribute-based keyword search (ABKS) schemes, the authorized…

  • A Lightweight Secure Data Sharing Scheme for Mobile Cloud Computing

    0 out of 5
    5,500

    A Lightweight Secure Data Sharing Scheme for Mobile Cloud Computing Abstract? The popularity of cloud computing, mobile devices can store/retrieve personal data from anywhere at any time. Consequently, the data security problem in mobile cloud becomes more and more severe and prevents further development of mobile cloud. There are substantial studies that have been conducted…

  • A Lightweight Secure Data Sharing Scheme for Mobile Cloud Computing

    0 out of 5
    4,500

    A Lightweight Secure Data Sharing Scheme for Mobile Cloud Computing Abstract-With the popularity of cloud computing, mobile devices can store/retrieve personal data from anywhere at any time. Consequently, the data security problem in mobile cloud becomes more and more severe and prevents further development of mobile cloud. There are sustantial studies that have been conducted…

  • A Load Balancing and Multi-tenancy Oriented Data Center Virtualization Framework

    0 out of 5
    4,500

    A Load Balancing and Multi-tenancy Oriented Data Center Virtualization Framework Abstract– Virtualization is an essential step before a baremetal data center being ready for commercial usage, because it bridges the foreground interface for cloud tenants and the background resource management on underlying infrastructures. A concept at the heart of the foreground is multi-tenancy, which deals…

  • A Load Balancing Model Based on Cloud Partitioning

    0 out of 5
    4,500

    A Load Balancing Model Based on Cloud Partitioning Abstract? A Load Balancing Model Based on Cloud Partitioning. Load balancing in the cloud computing environment has an important impact on the performance. Good load balancing makes cloud computing more efficient and improves user satisfaction. This article introduces a better load balance model for the public cloud…

  • A Mechanism Design Approach to Resource Procurement in Cloud Computing

    0 out of 5
    4,500

    A Mechanism Design Approach to Resource Procurement in Cloud Computing Abstract? A Mechanism Design Approach to Resource Procurement in Cloud Computing. We present a cloud resource procurement approach which not only automates the selection of an appropriate cloud vendor but also implements dynamic pricing. Three possible mechanisms are suggested for cloud resource procurement: cloud-dominant strategy…

  • A Modified Hierarchical Attribute-Based Encryption Access Control Method for Mobile Cloud Computing

    0 out of 5
    5,500

    A Modified Hierarchical Attribute-Based Encryption Access Control Method for Mobile Cloud Computing Abstract?In energy harvesting wireless sensor networks (EH-WSNs), maximizing the data collection throughput is one of the most challenging issues. < final year projects > [numbers_sections number=”1″ title=”Including =Packages=” last=”no” ] Complete Source Code Complete Documentation Complete Presentation Slides Flow Diagram Database File Screenshots…

  • A Modified Hierarchical Attribute-Based Encryption Access Control Method for Mobile Cloud Computing

    0 out of 5
    4,500

    [vc_row][vc_column][vc_column_text] A Modified Hierarchical Attribute-Based Encryption Access Control Method for Mobile Cloud Computing Abstract? A Modified Hierarchical Attribute-Based Encryption Access Control Method for Mobile Cloud Computing. Cloud computing is an Internet-based computing pattern through which shared resources are provided to devices on-demand. Its an emerging but promising paradigm to integrating mobile devices into cloud computing,…

  • A New Multiple Service Key Management Scheme for Secure Wireless Mobile Multicast

    0 out of 5
    4,500

    A New Multiple Service Key Management Scheme for Secure Wireless Mobile Multicast Abstract? A New Multiple Service Key Management Scheme for Secure Wireless Mobile Multicast. Addressing key management in mobile multicast communication is currently a booming topic due to the convergence of wireless and mobile technologies. With the proliferation of multiple group based services that…

  • A Novel Efficient Remote Data Possession Checking Protocol in Cloud Storage

    0 out of 5
    4,500

    A Novel Efficient Remote Data Possession Checking Protocol in Cloud Storage Abstract– As an important application in cloud computing, cloud storage offers user scalable, flexible, and high-quality data storage and computation services. A growing number of data owners choose to outsource data files to the cloud. Because cloud storage servers are not fully trustworthy, data…

End of content

End of content