Improving Efficiency and Lifetime of Logic-in-Memory by Combining IMPLY and MAGIC Families
Memristor-based memory computing has attracted much attention recently. By combining the storability and computability of memristor devices together, the memristor-based in-memory computing could break the so-called von Neumann ...
Self-secured devices: High performance and secure I/O access in TrustZone-based systems
Arm TrustZone is a hardware technology that adds significant value to the ongoing security picture. TrustZone-based systems typically consolidate multiple environments into the same platform, requiring resources to be shared among ...
QBLKe: Host-side flash translation layer management for Open-Channel SSDs
Open-Channel SSD (OCSSD) shows great potential in high-performance storage systems. Existing applications or file systems rely on host-based Flash Translation Layer (FTL) to use OCSSDs. However, the existing solution cannot fully ...
Edge based authentication protocol for vehicular communications without trusted party communication
Vehicular networking allows vehicles with sensing capabilities to carry out communication from vehicle to vehicle or with accessible roadside units. To attain effective communication in vehicular networking, we have proposed a hybrid ...
Energy efficient EDF-VD-based mixed-criticality scheduling with shared resources
In this paper, we consider simultaneously energy consumption and resource synchronization in mixed-criticality (MC) single processor systems. First, we give a feasibility analysis of single processor systems that execute real-time MC ...
DMSE: Dynamic Multi-keyword Search Encryption based on inverted index
With the popularity of cloud storage, increasing people are willing to upload their files to cloud services. They will encrypt these files before uploading to protect the privacy of files. However, encryption makes effective search ...
FreqCounter: Efficient Cacheability of Encryption and Integrity Tree Counters in Secure Processors
The data in the off-chip main memory can be potentially extracted or tampered by an adversary having physical access to the device and thus it becomes inevitable to secure the data present in the off-chip memory. The modern designs ...
An efficient and secure certificateless searchable encryption scheme against keyword guessing attacks
As the wave of data breaches continues crashing down on companies, specially for companies that provide cloud storage services, the data security and privacy have become the main concern of most clients that use this kind of services. ...
A scalable factory backbone for multiple independent time-sensitive networks
Convergence of time-sensitive machine control networks as part of the operational technology (OT) with the ubiquitous information technology (IT) networks is an essential requirement for the ongoing digitalization of production. In ...
A survey on data center cooling systems: Technology, power consumption modeling and control strategy optimization
- Qingxia Zhang,
- Zihao Meng,
- Xianwen Hong,
- Yuhao Zhan,
- Jia Liu,
- Jiabao Dong,
- Tian Bai,
- Junyu Niu,
- M. Jamal Deen
Data center is a fundamental infrastructure of computers and networking equipment to collect, store, process, and distribute huge amounts of data for a variety of applications such as Cyber–Physical–Social Systems, business enterprises ...
Accelerating DNNs from local to virtualized FPGA in the Cloud: A survey of trends
Field-programmable gate arrays (FPGAs) are widely used locally to speed up deep neural network (DNN) algorithms with high computational throughput and energy efficiency. Virtualizing FPGA and deploying FPGAs in the cloud are becoming ...
Highlights
- An overview of the main techniques used for accelerating DNNs on the FPGAs.
- An ...
A survey of SRAM-based in-memory computing techniques and applications
As von Neumann computing architectures become increasingly constrained by data-movement overheads, researchers have started exploring in-memory computing (IMC) techniques to offset data-movement overheads. Due to the widespread use of ...
Security analysis of Pan et al.’s “Public-key authenticated encryption with keyword search achieving both multi-ciphertext and multi-trapdoor indistinguishability”
Recently, Pan et al. proposed the “Public-Key Authenticated Encryption with Keyword Search Achieving both Multi-Ciphertext and Multi-Trapdoor Indistinguishability” in Pan and Li (2021). However, after carefully revisiting the scheme, ...
Combining admission tests for heuristic partitioning of real-time tasks on ARM big.LITTLE multi-processor architectures
This paper tackles the problem of admitting real-time tasks on non-symmetric multiprocessor platforms, where partitioned EDF-FF is used. We extend the already obtained results for symmetric multiprocessor platforms and provide an ...
A flexible attribute based data access management scheme for sensor-cloud system
Sensor-cloud combines the merits of WSN with cloud computing and has been deployed in many practical applications. Data security is the prerequisite for the implementation of a sensor-cloud system, but conventional security mechanisms ...
A lightweight verifiable trust based data collection approach for sensor–cloud systems
A Lightweight Verifiable Trust based Data Collection (LVT-DC) approach is proposed to obtain credible data for mobile vehicles network, in which, a large number of IoT devices are deployed in smart city, and Mobile Vehicles (MVs) ...
Secure boot, trusted boot and remote attestation for ARM TrustZone-based IoT Nodes
With the extensive application of IoT techniques, IoT devices have become ubiquitous in daily lives. Meanwhile, attacks against IoT devices have emerged to compromise IoT devices by tampering with system pre-installed programs or ...
Secure Top-k query in edge-computing-assisted sensor-cloud systems
Sensor cloud provides a new way for the owners of different WSNs (Wireless Sensor Networks) to share their data to other parties (users/organizations). The edge-computing-assisted sensor-cloud systems (EC-assisted SCSs) can even supply ...
Decentralized and expressive data publish-subscribe scheme in cloud based on attribute-based keyword search
- A decentralized and privacy-preserving data publish-subscribe scheme in cloud based on attribute-based keyword search with fine-grained access control and ...
Data publish-subscribe scheme is a valuable approach to share and retrieve data from cloud platforms selectively. However, the common practice of standard encryption hinders the effective keyword-based data subscription over outsourced ...
Removing bias from the judgment day: A Ravenscar-based toolbox for quantitative comparison of EDF-to-RM uniprocessor scheduling
Since 1973, Earliest Deadline First (EDF) uniprocessor scheduling has been known to be superior to its Rate Monotonic (Fixed-Priority, FPS) counterpart for its capacity to feasibly sustain full utilization, which FPS can only achieve ...
A case study for risk assessment in AR-equipped socio-technical systems
Augmented Reality (AR) technologies are used as human–machine interface within various types of safety-critical systems. Several studies have shown that AR improves human performance. However, the introduction of AR might introduce ...
A security policy hardening framework for Socio-Cyber-Physical Systems
Modern systems are heterogeneous inter-operating subsystems of different aspects that can be physical, technical, cybernetics, and even social like agent operators in smart grids or smart transportations. With the social dimension, we ...
Fair and size-scalable participant selection framework for large-scale mobile crowdsensing
Mobile Crowdsensing (MCS) is a cost-efficient community sensing paradigm. It employs massive mobile computing devices such as smartphones to sense and propagate data collectively. Two main problems in MCS aiming to use these ...