Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
Volume 11, Issue 1Dec 2022
Publisher:
  • Hindawi Limited
  • Adam House, 3rd Floor, 1 Fitzroy Square
  • London
  • United Kingdom
ISSN:2192-113X
EISSN:2192-113X
Reflects downloads up to 13 Jan 2025Bibliometrics
research-article
A trusted de-swinging k-anonymity scheme for location privacy protection
Abstract

K-anonymity has been gaining widespread attention as one of the most widely used technologies to protect location privacy. Nevertheless, there are still some threats such as behavior deception and service swing, since utilizing distributed k-...

research-article
Security scheduling and transaction mechanism of virtual power plants based on dual blockchains
Abstract

Aiming at the data authenticity and storage problems in the current coordinated scheduling of virtual power plants, as well as the opaque information and high transaction costs, a dual blockchains security mechanism is proposed to solve above ...

research-article
Application of deterministic, stochastic, and hybrid methods for cloud provider selection
Abstract

Cloud Computing popularization inspired the emergence of many new cloud service providers. The significant number of cloud providers available drives users to complex or even impractical choice of the most suitable one to satisfy his needs without ...

research-article
Deep Reinforcement Learning-Based Workload Scheduling for Edge Computing
Abstract

Edge computing is a new paradigm for providing cloud computing capacities at the edge of network near mobile users. It offers an effective solution to help mobile devices with computation-intensive and delay-sensitive tasks. However, the edge of ...

research-article
Scalability resilience framework using application-level fault injection for cloud-based software services
Abstract

This paper presents an investigation into the effect of faults on the scalability resilience of cloud-based software services. The study introduces an experimental framework using the Application-Level Fault Injection (ALFI) to investigate how the ...

research-article
Performance evaluation of publish-subscribe systems in IoT using energy-efficient and context-aware secure messages
AbstractBackground

The Internet of Things (IoT) enables the development of innovative applications in various domains such as healthcare, transportation, and Industry 4.0. Publish-subscribe systems enable IoT devices to communicate with the cloud platform. ...

research-article
Identity-based remote data checking with a designated verifier
Abstract

Traditional remote data possession auditing mechanisms are usually divided into two types: private auditing and public auditing. Informally, private auditing only allows the original data owner to check the integrity of its outsourced data, ...

research-article
KeyPIn – mitigating the free rider problem in the distributed cloud based on Key, Participation, and Incentive
Abstract

In a distributed cloud, unlike centralized resource management, users provide and share resources. However, this allows for the existence of free riders who do not provide resources to others, but at the same time use resources that others ...

research-article
Look-ahead energy efficient VM allocation approach for data centers
Abstract

Energy efficiency is an important issue for reducing environmental dissipation. Energy efficient resource provisioning in cloud environments is a challenging problem because of its dynamic nature and varied application workload characteristics. In ...

research-article
Improved firefly algorithm with courtship learning for unrelated parallel machine scheduling problem with sequence-dependent setup times
Abstract

The Unrelated Parallel Machines Scheduling Problem (UPMSP) with sequence-dependent setup times has been widely applied to cloud computing, edge computing and so on. When the setup times are ignored, UPMSP will be a NP problem. Moreover, when ...

research-article
Multi-Recipient encryption with keyword search without pairing for cloud storage
Abstract

With the rapid development of cloud computing technology and communication technology, cloud storage has become a tool used by people in daily life. Cloud storage service enables users to outsource data to cloud servers and retrieve desired ...

research-article
EDQWS: an enhanced divide and conquer algorithm for workflow scheduling in cloud
Abstract

A workflow is an effective way for modeling complex applications and serves as a means for scientists and researchers to better understand the details of applications. Cloud computing enables the running of workflow applications on many types of ...

research-article
OpenIaC: open infrastructure as code - the network is my computer
Abstract

Modern information systems are built fron a complex composition of networks, infrastructure, devices, services, and applications, interconnected by data flows that are often private and financially sensitive. The 5G networks, which can create ...

research-article
Agent-based multi-tier SLA negotiation for intercloud
Abstract

The evolving intercloud enables idle resources to be traded among cloud providers to facilitate utilization optimization and to improve the cost-effectiveness of the service for cloud consumers. However, several challenges are raised for this ...

research-article
An improved secure designated server public key searchable encryption scheme with multi-ciphertext indistinguishability
Abstract

In the cloud, users prefer to store their sensitive data in encrypted form. Searching keywords over encrypted data without loss of data confidentiality is an important issue. In 2004, Boneh et al. proposed the first public-key searchable ...

research-article
Attribute reduction based scheduling algorithm with enhanced hybrid genetic algorithm and particle swarm optimization for optimal device selection
Abstract

The applications of the Internet of Things in different areas and the resources that demand these applications are on the increase. However, the limitations of the IoT devices such as processing capability, storage, and energy are challenging. ...

research-article
A SINS/DVL/USBL integrated navigation and positioning IoT system with multiple sources fusion and federated Kalman filter
Abstract

The navigation and positioning subsystem offers important position information for an autonomous underwater vehicle (AUV) system. It plays a crucial role during the underwater exploration and operations of AUV. Many scholars research underwater ...

research-article
Joint task offloading and resource allocation in mobile edge computing with energy harvesting
Abstract

Mobile edge computing (MEC) is considered to be a promising technique to enhance the computation capability and reduce the energy consumption of smart mobile devices (SMDs) in the sixth-generation (6G) networks. With the huge increase of SMDs, ...

research-article
PICF-LDA: a topic enhanced LDA with probability incremental correction factor for Web API service clustering
Abstract

Web API is a popular way to organize network services in cloud computing environment. However, it is a challenge to find an appropriate service for the requestor from massive Web API services. Service clustering can improve the efficiency of ...

research-article
AWESOME: an auction and witness enhanced SLA model for decentralized cloud marketplaces
Abstract

In recent decades, the world has witnessed cloud computing as an essential technology that changes the traditional application Development and Operation (DevOps) lifecycle. However, current cloud software DevOps and Service Level Agreement (SLA) ...

research-article
Characterization of task response time in fog enabled networks using queueing theory under different virtualization modes
Abstract

Much research has focused on task offloading in fog-enabled IoT networks. However, there is an important offloading issue that has hardly been addressed—the impact of different virtualization modes on task response (TR) time. In the present ...

research-article
BVFLEMR: an integrated federated learning and blockchain technology for cloud-based medical records recommendation system
Abstract

Blockchain is the latest boon in the world which handles mainly banking and finance. The blockchain is also used in the healthcare management system for effective maintenance of electronic health and medical records. The technology ensures ...

research-article
ES-PPDA: an efficient and secure privacy-protected data aggregation scheme in the IoT with an edge-based XaaS architecture
Abstract

In an Internet of Things (IoT) system based on an anything as a service (XaaS) architecture, data are uploaded from heterogeneous nodes in a nonstandardized format and aggregated on the server side. Within this data-intensive architecture, privacy ...

research-article
Anomaly detection in microservice environments using distributed tracing data analysis and NLP
Abstract

In recent years DevOps and agile approaches like microservice architectures and Continuous Integration have become extremely popular given the increasing need for flexible and scalable solutions. However, several factors such as their distribution ...

research-article
The least-used key selection method for information retrieval in large-scale Cloud-based service repositories
Abstract

As the number of devices connected to the Internet of Things (IoT) increases significantly, it leads to an exponential growth in the number of services that need to be processed and stored in the large-scale Cloud-based service repositories. An ...

research-article
Grid-Based coverage path planning with NFZ avoidance for UAV using parallel self-adaptive ant colony optimization algorithm in cloud IoT
Abstract

In recent years, with the development of Unmanned Aerial Vehicle (UAV) and Cloud Internet-of-Things (Cloud IoT) technology, data collection using UAVs has become a new technology hotspot for many Cloud IoT applications. Due to constraints such as ...

research-article
Automated all in one misspelling detection and correction system for Ethiopian languages
Abstract

In this paper, a misspelling detection and correction system was developed for Ethiopian languages (Amharic, Afan Oromo, Tigrinya, Hadiyyisa, Kambatissa, and Awngi). For some of these languages, there have been few works on typo detection and ...

research-article
Private anomaly detection of student health conditions based on wearable sensors in mobile cloud computing
Abstract

With the continuous spread of COVID-19 virus, how to guarantee the healthy living of people especially the students who are of relative weak physique is becoming a key research issue of significant values. Specifically, precise recognition of the ...

research-article
Big data analytics in Cloud computing: an overview
Abstract

Big Data and Cloud Computing as two mainstream technologies, are at the center of concern in the IT field. Every day a huge amount of data is produced from different sources. This data is so big in size that traditional processing tools are unable ...

research-article
JSON-based control model for SQL and NoSQL data conversion in hybrid cloud database
Abstract

A data interaction transformation model, XYJSON, that is suitable for all data using current standard SQL syntax and JSON document data is proposed to solve the problem of increasing development workload and difficulty caused by using different ...

Comments