A trusted de-swinging k-anonymity scheme for location privacy protection
K-anonymity has been gaining widespread attention as one of the most widely used technologies to protect location privacy. Nevertheless, there are still some threats such as behavior deception and service swing, since utilizing distributed k-...
Security scheduling and transaction mechanism of virtual power plants based on dual blockchains
Aiming at the data authenticity and storage problems in the current coordinated scheduling of virtual power plants, as well as the opaque information and high transaction costs, a dual blockchains security mechanism is proposed to solve above ...
Application of deterministic, stochastic, and hybrid methods for cloud provider selection
Cloud Computing popularization inspired the emergence of many new cloud service providers. The significant number of cloud providers available drives users to complex or even impractical choice of the most suitable one to satisfy his needs without ...
Deep Reinforcement Learning-Based Workload Scheduling for Edge Computing
Edge computing is a new paradigm for providing cloud computing capacities at the edge of network near mobile users. It offers an effective solution to help mobile devices with computation-intensive and delay-sensitive tasks. However, the edge of ...
Scalability resilience framework using application-level fault injection for cloud-based software services
This paper presents an investigation into the effect of faults on the scalability resilience of cloud-based software services. The study introduces an experimental framework using the Application-Level Fault Injection (ALFI) to investigate how the ...
Performance evaluation of publish-subscribe systems in IoT using energy-efficient and context-aware secure messages
The Internet of Things (IoT) enables the development of innovative applications in various domains such as healthcare, transportation, and Industry 4.0. Publish-subscribe systems enable IoT devices to communicate with the cloud platform. ...
Identity-based remote data checking with a designated verifier
Traditional remote data possession auditing mechanisms are usually divided into two types: private auditing and public auditing. Informally, private auditing only allows the original data owner to check the integrity of its outsourced data, ...
KeyPIn – mitigating the free rider problem in the distributed cloud based on Key, Participation, and Incentive
In a distributed cloud, unlike centralized resource management, users provide and share resources. However, this allows for the existence of free riders who do not provide resources to others, but at the same time use resources that others ...
Look-ahead energy efficient VM allocation approach for data centers
Energy efficiency is an important issue for reducing environmental dissipation. Energy efficient resource provisioning in cloud environments is a challenging problem because of its dynamic nature and varied application workload characteristics. In ...
Improved firefly algorithm with courtship learning for unrelated parallel machine scheduling problem with sequence-dependent setup times
The Unrelated Parallel Machines Scheduling Problem (UPMSP) with sequence-dependent setup times has been widely applied to cloud computing, edge computing and so on. When the setup times are ignored, UPMSP will be a NP problem. Moreover, when ...
Multi-Recipient encryption with keyword search without pairing for cloud storage
With the rapid development of cloud computing technology and communication technology, cloud storage has become a tool used by people in daily life. Cloud storage service enables users to outsource data to cloud servers and retrieve desired ...
EDQWS: an enhanced divide and conquer algorithm for workflow scheduling in cloud
A workflow is an effective way for modeling complex applications and serves as a means for scientists and researchers to better understand the details of applications. Cloud computing enables the running of workflow applications on many types of ...
OpenIaC: open infrastructure as code - the network is my computer
Modern information systems are built fron a complex composition of networks, infrastructure, devices, services, and applications, interconnected by data flows that are often private and financially sensitive. The 5G networks, which can create ...
Agent-based multi-tier SLA negotiation for intercloud
The evolving intercloud enables idle resources to be traded among cloud providers to facilitate utilization optimization and to improve the cost-effectiveness of the service for cloud consumers. However, several challenges are raised for this ...
An improved secure designated server public key searchable encryption scheme with multi-ciphertext indistinguishability
In the cloud, users prefer to store their sensitive data in encrypted form. Searching keywords over encrypted data without loss of data confidentiality is an important issue. In 2004, Boneh et al. proposed the first public-key searchable ...
Attribute reduction based scheduling algorithm with enhanced hybrid genetic algorithm and particle swarm optimization for optimal device selection
The applications of the Internet of Things in different areas and the resources that demand these applications are on the increase. However, the limitations of the IoT devices such as processing capability, storage, and energy are challenging. ...
A SINS/DVL/USBL integrated navigation and positioning IoT system with multiple sources fusion and federated Kalman filter
- Qinghua Luo,
- Xiaozhen Yan,
- Chenxu Wang,
- Yang Shao,
- Zhiquan Zhou,
- Jianfeng Li,
- Cong Hu,
- Chuntao Wang,
- Jinfeng Ding
The navigation and positioning subsystem offers important position information for an autonomous underwater vehicle (AUV) system. It plays a crucial role during the underwater exploration and operations of AUV. Many scholars research underwater ...
Joint task offloading and resource allocation in mobile edge computing with energy harvesting
Mobile edge computing (MEC) is considered to be a promising technique to enhance the computation capability and reduce the energy consumption of smart mobile devices (SMDs) in the sixth-generation (6G) networks. With the huge increase of SMDs, ...
PICF-LDA: a topic enhanced LDA with probability incremental correction factor for Web API service clustering
Web API is a popular way to organize network services in cloud computing environment. However, it is a challenge to find an appropriate service for the requestor from massive Web API services. Service clustering can improve the efficiency of ...
AWESOME: an auction and witness enhanced SLA model for decentralized cloud marketplaces
In recent decades, the world has witnessed cloud computing as an essential technology that changes the traditional application Development and Operation (DevOps) lifecycle. However, current cloud software DevOps and Service Level Agreement (SLA) ...
Characterization of task response time in fog enabled networks using queueing theory under different virtualization modes
Much research has focused on task offloading in fog-enabled IoT networks. However, there is an important offloading issue that has hardly been addressed—the impact of different virtualization modes on task response (TR) time. In the present ...
BVFLEMR: an integrated federated learning and blockchain technology for cloud-based medical records recommendation system
Blockchain is the latest boon in the world which handles mainly banking and finance. The blockchain is also used in the healthcare management system for effective maintenance of electronic health and medical records. The technology ensures ...
ES-PPDA: an efficient and secure privacy-protected data aggregation scheme in the IoT with an edge-based XaaS architecture
In an Internet of Things (IoT) system based on an anything as a service (XaaS) architecture, data are uploaded from heterogeneous nodes in a nonstandardized format and aggregated on the server side. Within this data-intensive architecture, privacy ...
Anomaly detection in microservice environments using distributed tracing data analysis and NLP
In recent years DevOps and agile approaches like microservice architectures and Continuous Integration have become extremely popular given the increasing need for flexible and scalable solutions. However, several factors such as their distribution ...
The least-used key selection method for information retrieval in large-scale Cloud-based service repositories
As the number of devices connected to the Internet of Things (IoT) increases significantly, it leads to an exponential growth in the number of services that need to be processed and stored in the large-scale Cloud-based service repositories. An ...
Grid-Based coverage path planning with NFZ avoidance for UAV using parallel self-adaptive ant colony optimization algorithm in cloud IoT
In recent years, with the development of Unmanned Aerial Vehicle (UAV) and Cloud Internet-of-Things (Cloud IoT) technology, data collection using UAVs has become a new technology hotspot for many Cloud IoT applications. Due to constraints such as ...
Automated all in one misspelling detection and correction system for Ethiopian languages
In this paper, a misspelling detection and correction system was developed for Ethiopian languages (Amharic, Afan Oromo, Tigrinya, Hadiyyisa, Kambatissa, and Awngi). For some of these languages, there have been few works on typo detection and ...
Private anomaly detection of student health conditions based on wearable sensors in mobile cloud computing
With the continuous spread of COVID-19 virus, how to guarantee the healthy living of people especially the students who are of relative weak physique is becoming a key research issue of significant values. Specifically, precise recognition of the ...
Big data analytics in Cloud computing: an overview
Big Data and Cloud Computing as two mainstream technologies, are at the center of concern in the IT field. Every day a huge amount of data is produced from different sources. This data is so big in size that traditional processing tools are unable ...
JSON-based control model for SQL and NoSQL data conversion in hybrid cloud database
A data interaction transformation model, XYJSON, that is suitable for all data using current standard SQL syntax and JSON document data is proposed to solve the problem of increasing development workload and difficulty caused by using different ...