-
41
Privacy-preserving indoor localization scheme based on Wi-Fi fingerprint with outsourced computing
Published 2024-02-01Subjects: Get full text
Article -
42
Tenant-Oriented Customized VM Networking Technology
Published 2015-10-01Subjects: Get full text
Article -
43
An approach for multipath optimal selection of network service combinations based on golden eagle optimizer with double learning strategies
Published 2025-01-01Subjects: “…Cloud service…”
Get full text
Article -
44
On the performance optimization for the cloud architecture with sleep-mode and registration service
Published 2019-10-01Subjects: Get full text
Article -
45
-
46
Neural network inspired efficient scalable task scheduling for cloud infrastructure
Published 2024-01-01“…For further improvement in cloud services, cloud resource optimization is a vital cog that defines the performance of cloud. …”
Get full text
Article -
47
TBAS: Token-based authorization service architecture in Internet of things scenarios
Published 2017-07-01“…How to make Internet of things become a smart terminal is an important topic. By connecting cloud services, the devices can receive more accurate information so as to be applied in people’s daily life. …”
Get full text
Article -
48
Dynamic game and reliable recommendation based transferring reputation mechanism for mobile cloud computing
Published 2018-05-01“…The booming development of the mobile internet and cloud computing leads to the emerging of many mobile cloud platforms based services.However,since mobile users store lots of data and privacy information in the cloud when they are using the mobile cloud services,they are facing multiple increasingly serious security threats such as data leaks and privacy exposures.The data security and privacy protection was investigated in mobile cloud computing,aiming at the internal bad mouthing attacks and mobile attacks.A dynamic game and reliable recommendation based transferring reputation mechanism was proposed.First,a dynamic game based recommendation incentive mechanism was proposed.Secondly,a reliable recommendation reputation evaluation model was established based on the incentive mechanism.Last,a novel transferring reputation mechanism was proposed that combined the above mentioned incentive mechanism and reputation evaluation model.Simulation results demonstrate the proposed transferring reputation mechanism can defend against the internal bad mouthing attacks and mobile attacks effectively,enhance the credibility of mobile terminals and improve the data security and privacy protection of mobile cloud services.…”
Get full text
Article -
49
Exploring the feasibility of a data center-free cloud computing framework utilizing underutilized personal computers
Published 2023-09-01“…These dormant resources can be harnessed to form an alternative cloud infrastructure, offering a wide array of cloud services, particularly focusing on infrastructure as a service. …”
Get full text
Article -
50
A decision framework for cloud migration: A hybrid approach
Published 2022-12-01“…There are several inhibitors and motivations related factors to determine whether one can embrace the cloud services or not. Therefore, this paper presents a holistic and flexible cloud decision framework by taking a wide spectrum weighted factors related to the acceptance or denial of the cloud services. …”
Get full text
Article -
51
MOBILE LEARNING IN CONDITIONS OF INFORMATION INEQUALITY
Published 2016-12-01“…The article considers the modern tools of using mobile means of communication and cloud services.…”
Get full text
Article -
52
A Method for Trust Quantification in Cloud Computing Environments
Published 2016-02-01“…In this paper, we propose a method for trust quantification based on fuzzy comprehensive evaluation theory for cloud computing to protect user data through trust quantification of cloud services after we introduce trust ontology for cloud services and define user preference trust values. …”
Get full text
Article -
53
Cloud Security Certification Technology Based on Fingerprint Recognition
Published 2015-08-01“…As the guarantee of cloud security,user identity authentication is crucial to cloud computing.In this work,the requirements of security authentication in the current cloud service systems were analyzed.Considering the principle and the advantages of fingerprint recognition,a novel system based on fingerprint recognition was proposed for cloud security authentication.The architecture and workflow of the proposed system were investigated in depth to prevent the unauthorized access,achieving the secure access of user data for cloud services.…”
Get full text
Article -
54
Research on Security of Virtualization on Cloud Computing
Published 2015-06-01“…One of the problems,virtualization security,draws most attention of cloud services providers and security manufacturers. The main security threats of cloud computing virtualization environment were combed and cloud computing virtualization security technology architecture which contains virtualization security technology framework based on KVM and virtualization centralized management and control platform was proposed. …”
Get full text
Article -
55
New cross-layer reputation mechanism for mobile cloud computing
Published 2018-03-01“…Users are facing increasingly serious security threats such as data leakage and privacy exposure while using various mobile cloud services.Based on the data security and privacy protection for mobile cloud computing research background,combining the cross-layer design and credit mechanism,in the node between the introduction of the MAC layer and network layer in the process of credit evaluation of factors affecting user reputation,to identify and manage internal malicious nodes.The credibility of the simulation results show that the proposed mechanism can effectively resist the internal defamation and multilayer attack,enhance the credibility of mobile terminals,thus improve the mobile cloud service data security and privacy protection.…”
Get full text
Article -
56
Research on data encryption system and technology for cloud storage
Published 2020-08-01“…To order to address the problem of cloud storage data security,the generic proxy-based data protection system was proposed,which could automatically and transparently secure sensitive data in browser-based cloud storage applications.A novel dynamic program analysis technique was adopted based on JavaScript API function hooking for automatically extending to various cloud applications.And a novel proxy executed searchable encryption solution was presented so that it could achieve data encryption while maintaining the original functions of cloud applications.Experimental results show that the system can support a variety of typical cloud services,effectively protect sensitive data,and bring a relatively low overhead.…”
Get full text
Article -
57
Research on intelligent control technology for OSU-based OTN
Published 2023-10-01“…With the development of information and cloud technology, the dynamic demand for OTN service is gradually increasing.As a next generation OTN switching technology, OSU needs to provide network and cloud services for high-quality enterprise leased lines and boutique home broadband services.The OSU-based OTN needs to be able to provide integrated services and automated service provisioning through end-to-end management and control capabilities to support one-hop service into the cloud.Firstly, the background, technical characteristics, and standardization progress of OSU technology were introduced.Then, a service-aware control framework for OSU-OTN was proposed to meet the demand for efficient bearer of government and enterprise leased lines.Finally, an experimental validation of the end-to-end management and control capability of the access OSU-OTN controller system was carried out.…”
Get full text
Article -
58
Privacy in the Internet: Myth or reality
Published 2016-01-01“…The present time, unthinkable without using Internet - from e-mail, through social networks, cloud services, GPS, to YouTube and mobile computing in business, as well as on a private level, poses a question: Is there a way to protect data and their privacy on the Internet? …”
Get full text
Article -
59
Scheme of virtual machine trusted migration in cloud environment
Published 2018-01-01“…With the rapid development of cloud computing,as an advantage of cloud services,virtual machine migration technology has been widely noticed and applied.However,there are some problems about VMs migration which should be solved,such as the complication of authentication of platform and the security issues of data transmission,etc.For these problems,firstly,the existing virtual machine migration scheme based on trusted computing technology was analyzed.Secondly,three secure needs that the virtual machine migration scheme which based on trusted computing technology should meet were proposed:the authenticated platform,confidentiality and integrity preserving transfer and atomicity of the vTPCM.Thirdly,a trusted migration scheme of virtual machines for cloud environment was proposed,in which the virtual machine central migration engine and trusted migration agent were introduced to solve the atomicity protection of vTPCM during the migration process.Finally,the concrete scheme was given with verification.…”
Get full text
Article -
60
Big Data with Cloud Computing: Discussions and Challenges
Published 2022-03-01“…In this work, the definition, classification, and characteristics of big data are discussed, along with various cloud services, such as Microsoft Azure, Google Cloud, Amazon Web Services, International Business Machine cloud, Hortonworks, and MapR. …”
Get full text
Article