A Pareto-based Genetic Algorithm for Optimized Assignment of VM Requests on a Cloud Brokering Environment Abstract– In the first place, deal with cloud brokering for the assignment optimization of VM requests in three-tier cloud infrastructures. We investigate the Pareto-based meta-heuristic approach to take into account multiple client and broker centric optimization criteria. We propose a…
A Pre-Authentication Approach to Proxy Re-encryption in Big Data Context Abstract-In the first place,Big Data growing amount of data, the demand of big data storage significantly increases. Through the cloud center, data providers can conveniently share data stored in the center with others. However, one practically important problem in big data storage is privacy Cloud…
A Predictive Cross-Layered Interference Management in a Multichannel MAC with Reactive Routing in VANET Abstract? Vehicular ad hoc networks (VANETs) represent a particular mobile technology that permits communication between vehicles, offering security and comfort. Nowadays, distributed mobile wireless computing is becoming a very important communication paradigm, due to its flexibility to adapt to different mobile…
A Privacy Leakage Upper Bound Constraint-Based Approach for Cost-Effective Privacy Preserving of Intermediate Data Sets in Cloud Abstract? A Privacy Leakage Upper Bound Constraint-Based Approach for Cost-Effective Privacy Preserving of Intermediate Data Sets in Cloud. Video View Demo [numbers_sections number=”1″ title=”Including =Packages=” last=”no” ] Complete Source Code Complete Documentation Complete Presentation Slides Flow Diagram Database…
A Privacy-Aware Authentication Scheme for Distributed Mobile Cloud Computing Services Abstract? A Privacy-Aware Authentication Scheme for Distributed Mobile Cloud Computing Services. In modern societies, the number of mobile users has dramatically risen in recent years. In this paper, an ef?cient authentication scheme for distributed mobile cloud computing services is proposed. The proposed scheme provides security…
A Privacy-Aware Authentication Scheme for Distributed Mobile Cloud Computing Services Abstract? A Privacy-Aware Authentication Scheme for Distributed Mobile Cloud Computing Services. The number of mobile users has dramatically risen in recent years. In this paper, an ef?cient authentication scheme for distributed mobile cloud computing services is proposed. The proposed scheme provides security and convenience for…
A Privacy-Preserving Remote Data Integrity Checking Protocol with Data Dynamics and Public Verifiability Abstract-Remote data integrity checking is a crucial technology in cloud computing. Recently, many works focus on providing data dynamics and/or public verifiability to this type of protocols. Existing protocols can support both features with the help of a third-party auditor. In a…
A Profit Maximization Scheme with Guaranteed Quality of Service in Cloud Computing Abstract? As an effective and ef?cient way to provide computing resources and services to customers on demand, cloud computing has become more and more popular. From cloud service providers? perspective, pro?t is one of the most important considerations, and it is mainly determined…
A Proxy-Based Approach to Continuous Location-Based Spatial Queries in Mobile Environments Abstract? Caching valid regions of spatial queries at mobile clients is effective in reducing the number of queries submitted by mobile clients and query load on the server. However, mobile clients suffer from longer waiting time for the server to compute valid regions….
A QoS-Oriented Distributed Routing Protocol for Hybrid Wireless Networks Abstract? A QoS-Oriented Distributed Routing Protocol for Hybrid Wireless Networks.As wireless communication gains popularity, significant research has been devoted to supporting real-time transmission with stringent Quality of Service (QoS) requirements for wireless applications. At the same time, a wireless hybrid network that integrates a mobile wireless…
A robust reputation management mechanism in the federated cloud Abstract-In the Infrastructure as a Service (IaaS) paradigm of cloud computing, computational resources are available for rent.Although it offers a cost efficient solution to virtual network requirements, low trust on the rented computational resources prevents users from using it. To reduce the cost, computational resources are…
A Secure and Dynamic Multi-keyword Ranked Search Scheme over Encrypted Cloud Data Abstract? Due to the increasing popularity of cloud computing, more and more data owners are motivated to outsource their data to cloud servers for great convenience and reduced cost in data management. However, sensitive data should be encrypted before outsourcing for privacy requirements,…