A Survey of Proxy Re-Encryption for Secure Data Sharing in Cloud Computing Abstract?Never before have data sharing been more convenient with the rapid development and wide adoption of cloud computing. However, how to ensure the cloud user?s data security is becoming the main obstacles that hinder cloud computing from extensive adoption. Proxy re-encryption serves as…
A Survey of Task Allocation and Load Balancing in Distributed Systems Abstract?In past decades, significant attention has been devoted to the task allocation and load balancing in distributed systems. Although there have been some related surveys about this subject, each of which only made a very preliminary review on the state of art of one…
A Survey of Task Allocation and Load Balancing in Distributed Systems Abstract? In past decades, significant attention has been devoted to the task allocation and load balancing in distributed systems. Although there have been some related surveys about this subject, each of which only made a very preliminary review on the state of art of…
A Survey on Ciphertext-Policy Attribute-based Encryption (CP-ABE) Approaches to Data Security on Mobile Devices and its Application to IoT Abstract-The growth in Cloud Computing and the ubiquity of Mobile devices to access Cloud services has generated a new paradigm, Mobile Cloud Computing (MCC). While the benefits of storing and accessing data in the Cloud are…
A Time Ef?cient Approach for Detecting Errors in Big Sensor Data on Cloud Abstract? A Time Ef?cient Approach for Detecting Errors in Big Sensor Data on Cloud. Big sensor data is prevalent in both industry and scienti?c research applications where the data is generated with high volume and velocity it is dif?cult to process using…
A Universal Fairness Evaluation Framework for Resource Allocation in Cloud Computing Abstract? In cloud computing, fairness is one of the most significant indicators to evaluate resource allocation algorithms, which reveals whether each user is allocated as much as that of all other users having the same bottleneck. However, how fair an allocation algorithm is remains…
A User Authentication Scheme of IoT Devices using Blockchain-enabled Fog Nodes Abstract-These days, IoT devices are deployed at a massive scale, with Cisco predicting 20 billion devices by the year 2020. As opposed to endpoint devices, IoT devices are resource-constrained devices, incapable of securing and defending themselves, and can be easily hacked and compromised. Fog…
Achieving Efficient and Secure Data Acquisition for Cloud-supported Internet of Things in Smart Grid Abstract– Cloud-supported Internet of Things (Cloud-IoT) has been broadly deployed in smart grid systems. The IoT front-ends are responsible for data acquisition and status supervision, while the substantial amount of data is stored and managed in the cloud server. Achieving data…
Achieving Secure and Efficient Dynamic Searchable Symmetric Encryption over Medical Cloud Data Abstract-In medical cloud computing, a patient can remotely outsource her medical data to the cloud server. In this case, only authorized doctors are allowed to access the data since the medical data is highly sensitive. Encrypting the data before outsourcing is a commonly…
Achieving Secure and Efficient Dynamic Searchable Symmetric Encryption over Medical Cloud Data Abstract-In medical cloud computing, a patient can remotely outsource her medical data to the cloud server. In this case, only authorized doctors are allowed to access the data since the medical data is highly sensitive. Encrypting the data before outsourcing is a commonly…
Achieving Simple, Secure and Efficient Hierarchical Access Control in Cloud Computing Abstract?Achieving Simple, Secure and Efficient Hierarchical Access Control in Cloud Computing. Access control is an indispensable security component of cloud computing, and hierarchical access control is of < Final Year Projects 2016 > interest since in practice one is entitled to different access privileges….
Adaptive and Fault-tolerant Data Processing in Healthcare IoT Based on Fog Computing Abstract-In recent years, healthcare IoT have been helpful in mitigating pressures of hospital and medical resources caused by aging population to a large extent. As a safety-critical system, the rapid response from the health care system is extremely important. To fulfill the low…