-
81
Advancing eHealth in Society 5.0: A Fuzzy Logic and Blockchain-Enhanced Framework for Integrating IoMT, Edge, and Cloud With AI
Published 2024-01-01“…To advance eHealth within this vision, we present a comprehensive framework that integrates the Internet of Medical Things (IoMT), edge computing, and cloud services with Explainable Artificial Intelligence (XAI) and blockchain technology, customized for the 6G era. …”
Get full text
Article -
82
Dynamic and efficient vehicular cloud management scheme with privacy protection
Published 2022-12-01“…The vehicular cloud (VC) formed by vehicles is used for localization processing and consumption of traffic sensing data to achieve timely intelligent traffic management.The vehicle cloud is highly dynamic, self-organizing and timely, in which the identity and location privacy of vehicle users need to be protected as this poses challenges to the vehicular cloud management.A dynamic and self-organizing vehicle cloud management scheme based on the asymmetric group key agreement protocol was designed, where the vehicle cloud is automatically formed through the self-organized group key agreement of vehicles.The group key was used to control the provision and access of vehicle cloud services, and the dynamic management of the vehicle cloud was implemented through group key update.The scheme used traceable one-time pseudonym technology to achieve anonymous authentication and conditional privacy protection of vehicle users, and the group key agreement stage only included one bilinear pair operation to achieve high efficiency.In addition, the key negotiation and update process used lightweight signatures, supporting batch verification, to achieve efficient message source authentication and integrity authentication.Then the security and efficiency of vehicle cloud communications in the self-organizing environment can be ensured.The dynamic key update mechanism of the key agreement protocol realized the dynamic joining or exiting of vehicles in the vehicle cloud, adapting to the dynamic characteristics of the vehicle cloud.Under the random oracle model and the difficult assumption of the inverse computational Diffie Hellman (ICDH) problem, it was proved that the asymmetric group key agreement scheme satisfied the selective-plaintext security.The security analysis shows that the scheme can protect the identity and location privacy of vehicle users, realize the legal tracking of malicious vehicles, and ensure the confidentiality, integrity and anti-counterfeiting of communications, as well as the forward security of vehicle cloud dynamic management.The performance comparison analysis shows that this scheme has certain advantages in communication and computing efficiency under the condition of the same function and security level.…”
Get full text
Article -
83
Strategy of container migration and honeypot deployment based on signal game in cloud environment
Published 2022-06-01“…Multi-tenant coexistence and resource sharing in the SaaS cloud pose serious security risks.On the one hand, soft isolation of logical namespaces is easy to be bypassed or broken.On the other hand, it is easy to be subjected to co-resident attacks due to sharing of the host operating system and underlying physical resources.Therefore it poses a serious threat to data availability, integrity and confidentiality in the container cloud.Given the problem that SaaS cloud services are vulnerable to container escape and side-channel equivalent resident attack, network deception technology increases the uncertainty of the cloud environment and reduces the effectiveness of attack by hiding the business function and characteristic attributes of the executor.Aiming at the security threat caused by the co-resident attack, combining dynamic migration and virtual honeypot security technology, the economical and reasonable network deception method was studied.Specifically, a container migration and honeypot deployment strategy based on the signal game was proposed.According to the security threat analysis, container migration and honeypot were used as defense methods.The former improved the undetectability of the system based on the idea of moving to target defense, while the latter confused attackers by placing decoy containers or providing false services.Furthermore, since network reconnaissance was the pre-step of the network attack chain, the attack and defense process was modeled as a two-person signal game with incomplete information.The sender chose to release a signal according to his type, and the receiver could only obtain the signal released by the sender but could not determine the type.Then, a game tree was constructed for the complete but imperfect information dynamic game, and the costs and benefits of different strategy combinations were set.The optimal deception strategy was determined by equilibrium analysis of attack-defense model.Experimental results show that the proposed strategy can effectively improve system security.Besides, it can also reduce container migration frequency and defense cost.…”
Get full text
Article -
84
Entrepreneurial strategies for sustainable growth: a deep dive into cloud-native technology and its applications
Published 2025-02-01“…The study shows that startups can use cloud-native technologies for innovative business models that rely on serverless computing, subscription services, and on-demand cloud services which are providing opportunities. The findings of the study highlight the need for entrepreneurs to utilize emerging technologies to meet competition, and there is a requirement for continuous investment in data analytics, automation, cloud solutions, and emerging technologies. …”
Get full text
Article -
85
Relationship Between Anxiety Symptoms and Age-Related Differences in Tic Severity
Published 2025-01-01“…Tianyuan Lei,1,2 Kai Yang,1,2 JinHyun Jun,1,2 Shujin Hu,1,2 Qinghao Yang,1,2 Xu Hong,3 Yonghua Cui1,2 1Department of Psychiatry, Beijing Children’s Hospital, Capital Medical University, National Center for Children’s Health, Beijing, People’s Republic of China; 2Laboratory for Clinical Medicine, Capital Medical University, Beijing, People’s Republic of China; 3Cloud Services Innovation Laboratory, Institute of Intelligent Science and Technology, China Electronics Technology Group Corporation, Beijing, People’s Republic of ChinaCorrespondence: Yonghua Cui; Tianyuan Lei, Email cuiyonghua@bch.com.cn; tianyuanlei@bch.com.cnPurpose: Tic disorders are neurodevelopmental disorders characterized by movements or vocalizations, often accompanied by anxiety symptoms. …”
Get full text
Article -
86
Innovations at Ukrainian enterprises: use of information and communication technologies
Published 2024-06-01“…The article presents a subjective assessment, namely, the results of a survey of Ukraini-an companies based on 2023 data regarding using the new technologies, including: ChatGPT and Artificial Intelligence, cloud services and data storage, online services and platforms for remote work organization, QES for personal identification, CRM sys-tems for working with clients, creation of mobile applications and chatbots in messen-gers. …”
Get full text
Article -
87
Management of Sustainable Development of the Fuel and Energy Complex of the Regional Economic System Based on Digital Technologies
Published 2024-12-01“…Features of the new approach are: 1) transition from public administration to corporate governance; 2) reliance on digital technologies in management; 3) flexible use of digital technologies in management, which involves the limited and careful use of controversial technologies (geographic information systems, Internet of things, cloud services and artificial intelligence) and the expansion of the use of key technologies that positively affect the sustainability of the fuel and energy complex in the regional economy of Russia: ERP systems, large data and digital platforms. …”
Get full text
Article -
88
Game Theory-Based UAV-Cloud for Service Selection Architecture in Flying Ad Hoc Networks
Published 2024-01-01“…Moreover, when GT-SSA is compared with the Game Theory approach for Cloud Services in MEC- and UAV-enabled networks (GTCS), GT-SSA outperforms GTCS in terms of Successful Execution Rate, Average Execution Time, and Energy consumption. …”
Get full text
Article -
89
Chip Design of PTP Time Synchronization for Industrial IoT
Published 2025-01-01“…Its core concept is to apply technologies such as computer networking, big data, artificial intelligence and cloud services to manufacturing. Because information between each other must be communicated immediately to ensure that each device in the system performs work at an accurate time. …”
Get full text
Article -
90
ASSESSING THE RESULTS OF TRAINING IN DIGITAL ENTREPRENEURSHIP IN THE AGE OF HIGH AND DEEP TECH
Published 2024-02-01“…The massive penetration of network software applications and cloud services forces businesses to digitize their processes and provide innovative products and services. …”
Get full text
Article -
91
Efficient virtual machine placement in cloud computing environment using BSO-ANN based hybrid technique
Published 2025-01-01“…This manuscript contributes to the ongoing research in cloud resource management, offering a practical approach for cloud service providers and organizations to better utilize their resources and enhance the overall quality of cloud-based services. © 2012 Published by Elsevier Ltd. …”
Get full text
Article -
92
Dynamic trust evaluation model based on evaluation credibility in cloud computing
Published 2013-08-01“…Considering the problem that cloud users will select a trusted cloud service provider, a dynamic trust evalua-tion model based on evaluation credibility was proposed.This model divides the ability of cloud service provider and the one of the user's requirments into many ranks, which can effectively solve the potential damage caused by the dynamic change in the ability of cloud service providers. …”
Get full text
Article -
93
Cloud Resource Allocation Method Based on Elastic Resource Adjustment
Published 2014-11-01“…For cloud computing operating environment, cloud service providers leased cloud resources provider of resources, to provide the service to the user of the scene, taking the optimization of a cloud service provider costs, increase the operation profit as the goal, the design of the virtual machine resource allocation method for cost optimization was proposed. …”
Get full text
Article -
94
Research on continuous monitoring of cloud computing service
Published 2016-10-01“…The complexity and dynamism of cloud computing environment hardly lead to timely awareness of cloud computing service’s operating state and assessment of cloud computing service risk.In order to ensure that the security of cloud service abidingly conforms to relevant national standard,continuous monitoring of cloud computing service was researched,and the role of cloud service provider was defined,customer,and continuous monitoring,described their supervising responsibility,and assessed index system and interface specification,thus guaranteeing stable and secure employment of cloud computing service by government department and key industries.…”
Get full text
Article -
95
Network function outsourcing system based on prefix-preserving encryption
Published 2018-04-01“…Due to the problem of high cost and limited scalability of dedicated hardware middleboxes,it is popular for enterprises to outsource middleboxes as software processes to the cloud service provider.In the current network function outsourcing schemes,the cloud service provider requires the enterprise’s communication traffic and network strategy which poses a serious threat to the enterprise’s piracy.Based on prefix-preserving encryption,a privacy preserving network function outsourcing system was proposed.Compared with other similar schemes,the system not only realizes the privacy protection of communication traffic,but also has higher throughput and lower delay.…”
Get full text
Article -
96
Cloud outsourcing secret sharing scheme against covert adversaries
Published 2017-05-01“…In order to make computationally weak cloud tenants can reconstruct a secret with efficiency and fairness,a cloud outsourcing secret sharing scheme was proposed,which combined cloud outsourcing computation with secret sharing scheme.In the process of outsourcing secret sharing,cloud tenants just need a small amount of decryption and validation operations,while outsource expensive cryptographic operations to cloud service provider (CSP).The scheme,without complex interactive augment or zero-knowledge proof,could detect malicious behaviors of cloud tenants or cloud service providers.And the scheme was secure against covert adversaries.Finally,every cloud tenant was able to obtain the secret fairly and correctly.Security analysis and performance comparison show that scheme is safe and effective.…”
Get full text
Article -
97
SLA Audit Mechanism of Virtual Machine Memory on Cloud
Published 2013-06-01“…Cloud service style has shield physical hardware view to cloud tenant, thus untrusted CSP(cloud service provider)may replace expensive physical memory by cheaper hard disk resource, which violates the SLA. …”
Get full text
Article -
98
Service Outsourcing Character Oriented Privacy Conflict Detection Method in Cloud Computing
Published 2014-01-01“…In the meantime, the method avoids the exception in the process of service composition by the privacy conflict, and improves the trust degree of cloud service providers.…”
Get full text
Article -
99
Privacy-preserving digital rights management scheme in cloud computing
Published 2014-02-01“…In addition, the pro-posed scheme also allows the users to purchase content and acquire license anonymously from cloud service provider, which protects the user privacy and prevents cloud service provider, license server and key server in the cloud from collecting the user's sensitive information. …”
Get full text
Article -
100
Spectral Expansion Method for Cloud Reliability Analysis
Published 2019-01-01“…This approach solves the Markov model of cloud service providers (CSP) to predict the reliability. …”
Get full text
Article