|
|
|
K.Ruben Raju,Danekula Rajya Lakshmi,Prof.Dr.G.Manoj Someswar
The authors have plagiarized part of a paper that had already appeared in IEEE Transactions on Cloud Computing, 1?1. doi:10.1109/tcc.2016.2545668. One of the conditions of submission of a paper for publication is that authors declare explicitly that thei...
ver más
|
|
|
|
|
|
|
Sriram Nandha Premnath and Zygmunt J. Haas
Cloud computing systems enable clients to rent and share computing resources of third party platforms, and have gained widespread use in recent years. Numerous varieties of mobile, small-scale devices such as smartphones, red e-health devices, etc., acro...
ver más
|
|
|
|
|
|
|
Hendrik Ballhausen and Ludwig Christian Hinske
Privacy-preserving computation (PPC) enables encrypted computation of private data. While advantageous in theory, the complex technology has steep barriers to entry in practice. Here, we derive design goals and principles for a middleware that encapsulat...
ver más
|
|
|
|
|
|
|
Indranil Roy, Reshmi Mitra, Nick Rahimi and Bidyut Gupta
Cloud-computing capabilities have revolutionized the remote processing of exploding volumes of healthcare data. However, cloud-based analytics capabilities are saddled with a lack of context-awareness and unnecessary access latency issues as data are pro...
ver más
|
|
|
|
|
|
|
Jean Raphael Ngnie Sighom, Pin Zhang and Lin You
In today?s society, cloud computing has significantly impacted nearly every section of our lives and business structures. Cloud computing is, without any doubt, one of the strategic directions for many companies and the most dominating infrastructure for...
ver más
|
|
|
|
|
|
|
Andrei Brazhuk
Pág. 36 - 41
This work considers challenges, related to the lack of methods of automatic threat modeling and well-formed data sources of threats and countermeasures as well as techniques to collect such security knowledge. Cloud computing domain has&nb...
ver más
|
|
|
|
|
|
|
Boubakeur Annane,Osman Ghazali
Pág. pp. 20 - 32
The principle constraints of mobile devices are their limited resources such as processing capability, storage space and battery life. While cloud computing offers a vast computing resources services. A new idea emerged by including the cloud computing i...
ver más
|
|
|
|
|
|
|
Hany F. Atlam, Robert J. Walters and Gary B. Wills
With the rapid growth of Internet of Things (IoT) applications, the classic centralized cloud computing paradigm faces several challenges such as high latency, low capacity and network failure. To address these challenges, fog computing brings the cloud ...
ver más
|
|
|
|
|
|
|
Hany F. Atlam, Robert J. Walters and Gary B. Wills
With the rapid growth of Internet of Things (IoT) applications, the classic centralized cloud computing paradigm faces several challenges such as high latency, low capacity and network failure. To address these challenges, fog computing brings the cloud ...
ver más
|
|
|
|
|
|
|
Saurabh Singh, Pradip Kumar Sharma, Seo Yeon Moon and Jong Hyuk Park
Nowadays, the high power consumption of data centers is the biggest challenge to making cloud computing greener. Many researchers are still seeking effective solutions to reduce or harvest the energy produced at data centers. To address this challenge, w...
ver más
|
|
|
|
|
|
|
Abdel Rahman Alzoubaidi
Pág. pp. 37 - 42
Cloud Computing is an environment where computing resources, such as processing power, storage, network, application, and other IT services, are provided to users as computing utility. This paper presents the university distributed databases consolidatio...
ver más
|
|
|
|
|
|
|
Rajni Goel
Cloud computing has become a force multiplier for organizations as they realize the benefit from the shared computing platforms and services offered by cloud computing. Providers market shared computing platforms and services because of their convenience...
ver más
|
|
|
|
|
|
|
Xingchen Wang and Peng Li
With the widespread adoption of cloud computing, the face verification process often requires the client to upload the face to an untrusted cloud server to obtain the verification results. Privacy leakage issues may arise if the client?s private informat...
ver más
|
|
|
|
|
|
|
Yunusa Simpa Abdulsalam and Mustapha Hedabou
Advances in the usage of information and communication technologies (ICT) has given rise to the popularity and success of cloud computing. Cloud computing offers advantages and opportunities for business users to migrate and leverage the scalability of t...
ver más
|
|
|
|
|
|
|
Yongbo Jiang, Juncheng Lu and Tao Feng
Searchable encryption is a keyword-based ciphertext retrieval scheme, which can selectively retrieve encrypted documents on encrypted cloud data. Most existing searchable encryption schemes focus only on exact keyword searches and cannot return data of i...
ver más
|
|
|
|
|
|
|
Elahe Fazeldehkordi and Tor-Morten Grønli
The Internet of Things (IoT) is an innovative scheme providing massive applications that have become part of our daily lives. The number of IoT and connected devices are growing rapidly. However, transferring the corresponding huge, generated data from t...
ver más
|
|
|
|
|
|
|
Agus Priyo Utomo, Idris Winarno, Iwan Syarif
Pág. 49 - 66
Currently, cloud computing technology is implemented by many industries in the world. This technology is very promising due to many companies only need to provide relatively smaller capital for their IT infrastructure. Virtualization is the core of cloud...
ver más
|
|
|
|
|
|
|
Michele De Donno, Alberto Giaretta, Nicola Dragoni, Antonio Bucchiarone and Manuel Mazzara
The Internet of Things (IoT) is rapidly changing our society to a world where every ?thing? is connected to the Internet, making computing pervasive like never before. This tsunami of connectivity and data collection relies more and more on the Cloud, wh...
ver más
|
|
|
|
|
|
|
Chen Guo, Xingbing Fu, Yaojun Mao, Guohua Wu, Fagen Li and Ting Wu
With the advent of cloud computing, more and more users begin to outsource encrypted files to cloud servers to provide convenient access and obtain security guarantees. Searchable encryption (SE) allows a user to search the encrypted files without leakin...
ver más
|
|
|
|
|
|
|
Mate Horvath,Istvan Vajda
Pág. 104 - 111
The proliferation of cloud computing highlights the importance of techniques that permit both secure storage of sensitive data and flexible data management at the same time. One line of research with this double motivation is the study&nbs...
ver más
|
|
|
|