A Pre-Authentication Approach to Proxy Re-encryption in Big Data Context Abstract-In the first place,Big Data growing amount of data, the demand of big data storage significantly increases. Through the cloud center, data providers can conveniently share data stored in the center with others. However, one practically important problem in big data storage is privacy Cloud…
A Precoding-Based Multicarrier Non-Orthogonal Multiple Access Scheme for 5G Cellular Networks Abstract-Non-orthogonal multiple access (NOMA) has become one of the desirable schemes for the 5G cellular network standard due to its better cell coverage capability, higher data rate, and massive connectivity. Orthogonal frequency division multiplexing (OFDM) can be combined with NOMA to get the higher…
A Precoding-based PAPR Reduction Technique for UF-OFDM and Filtered-OFDM Modulations in 5G Systems Abstract-In the first place, the universal filtered-orthogonal frequency division multiplexing (UF-OFDM) (also called universal filtered multicarrier (UFMC)) and the filtered-OFDM (F-OFDM) are candidates to be alternative to the OFDM modulation in the upcoming 5G systems thanks to their improved spectral occupation and…
A Predictive Cross-Layered Interference Management in a Multichannel MAC with Reactive Routing in VANET Abstract? Vehicular ad hoc networks (VANETs) represent a particular mobile technology that permits communication between vehicles, offering security and comfort. Nowadays, distributed mobile wireless computing is becoming a very important communication paradigm, due to its flexibility to adapt to different mobile…
A Privacy Leakage Upper Bound Constraint-Based Approach for Cost-Effective Privacy Preserving of Intermediate Data Sets in Cloud Abstract? A Privacy Leakage Upper Bound Constraint-Based Approach for Cost-Effective Privacy Preserving of Intermediate Data Sets in Cloud. Video View Demo [numbers_sections number=”1″ title=”Including =Packages=” last=”no” ] Complete Source Code Complete Documentation Complete Presentation Slides Flow Diagram Database…
A Privacy Leakage Upper Bound Constraint-Based Approach for Cost-Effective Privacy Preserving of Intermediate Data Sets in Cloud Abstract? Cloud computing provides massive computation power and storage capacity which enable users to deploy computation and data-intensive applications without infrastructure investment. Along the processing of such applications, a large volume of intermediate data sets will be generated,…
A Privacy Preserving Communication Protocol for IoT Applications in Smart Homes Abstract– The development of the Internet of Things (IoT) has made extraordinary progress in recent years in both academic and industrial fields. There are quite a few smart home systems that have been developed by major companies to achieve home automation. However, the nature…
A Privacy-Aware Authentication Scheme for Distributed Mobile Cloud Computing Services Abstract? A Privacy-Aware Authentication Scheme for Distributed Mobile Cloud Computing Services. The number of mobile users has dramatically risen in recent years. In this paper, an ef?cient authentication scheme for distributed mobile cloud computing services is proposed. The proposed scheme provides security and convenience for…
A Privacy-Aware Authentication Scheme for Distributed Mobile Cloud Computing Services Abstract? A Privacy-Aware Authentication Scheme for Distributed Mobile Cloud Computing Services. In modern societies, the number of mobile users has dramatically risen in recent years. In this paper, an ef?cient authentication scheme for distributed mobile cloud computing services is proposed. The proposed scheme provides security…
A Privacy-Preserving Framework for Large-ScaleContent-Based Information Retrieval Abstract?We propose a privacy protection framework for large-scale content-based information retrieval. It offers two layers of protection. First, robust hash values are used as queries to prevent revealing original content or features. Second, the client can choose to omit certain bits in a hash value to further increase…
A Privacy-Preserving Remote Data Integrity Checking Protocol with Data Dynamics and Public Verifiability Abstract-Remote data integrity checking is a crucial technology in cloud computing. Recently, many works focus on providing data dynamics and/or public verifiability to this type of protocols. Existing protocols can support both features with the help of a third-party auditor. In a…
A Proactive Workflow Model for Healthcare Operation and Management Abstract– Advances in real-time location systems have enabled us to collect massive amounts of fine-grained semantically rich location traces, which provide unparalleled opportunities for understanding human activities and generating useful knowledge. Explicitly, delivers intelligence for real-time decision making in various fields, such as workflow management. Indeed,…