Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (430)
  • Open Access

    ARTICLE

    Safeguarding Cloud Computing Infrastructure: A Security Analysis

    Mamdouh Alenezi*

    Computer Systems Science and Engineering, Vol.37, No.2, pp. 159-167, 2021, DOI:10.32604/csse.2021.015282

    Abstract Cloud computing is the provision of hosted resources, comprising software, hardware and processing over the World Wide Web. The advantages of rapid deployment, versatility, low expenses and scalability have led to the widespread use of cloud computing across organizations of all sizes, mostly as a component of the combination/multi-cloud infrastructure structure. While cloud storage offers significant benefits as well as cost-effective alternatives for IT management and expansion, new opportunities and challenges in the context of security vulnerabilities are emerging in this domain. Cloud security, also recognized as cloud computing security, refers to a collection of policies, regulations, systematic processes that… More >

  • Open Access

    ARTICLE

    A Resource Management Algorithm for Virtual Machine Migration in Vehicular Cloud Computing

    Sohan Kumar Pande1, Sanjaya Kumar Panda2, Satyabrata Das1, Kshira Sagar Sahoo3, Ashish Kr. Luhach4, N. Z. Jhanjhi5,*, Roobaea Alroobaea6, Sivakumar Sivanesan5

    CMC-Computers, Materials & Continua, Vol.67, No.2, pp. 2647-2663, 2021, DOI:10.32604/cmc.2021.015026

    Abstract In recent years, vehicular cloud computing (VCC) has gained vast attention for providing a variety of services by creating virtual machines (VMs). These VMs use the resources that are present in modern smart vehicles. Many studies reported that some of these VMs hosted on the vehicles are overloaded, whereas others are underloaded. As a circumstance, the energy consumption of overloaded vehicles is drastically increased. On the other hand, underloaded vehicles are also drawing considerable energy in the underutilized situation. Therefore, minimizing the energy consumption of the VMs that are hosted by both overloaded and underloaded is a challenging issue in… More >

  • Open Access

    ARTICLE

    High Security for De-Duplicated Big Data Using Optimal SIMON Cipher

    A. Muthumari1, J. Banumathi2, S. Rajasekaran3, P. Vijayakarthik4, K. Shankar5, Irina V. Pustokhina6, Denis A. Pustokhin7,*

    CMC-Computers, Materials & Continua, Vol.67, No.2, pp. 1863-1879, 2021, DOI:10.32604/cmc.2021.013614

    Abstract Cloud computing offers internet location-based affordable, scalable, and independent services. Cloud computing is a promising and a cost-effective approach that supports big data analytics and advanced applications in the event of forced business continuity events, for instance, pandemic situations. To handle massive information, clusters of servers are required to assist the equipment which enables streamlining the widespread quantity of data, with elevated velocity and modified configurations. Data deduplication model enables cloud users to efficiently manage their cloud storage space by getting rid of redundant data stored in the server. Data deduplication also saves network bandwidth. In this paper, a new… More >

  • Open Access

    ARTICLE

    OPPR: An Outsourcing Privacy-Preserving JPEG Image Retrieval Scheme with Local Histograms in Cloud Environment

    Jian Tang, Zhihua Xia*, Lan Wang, Chengsheng Yuan, Xueli Zhao

    Journal on Big Data, Vol.3, No.1, pp. 21-33, 2021, DOI:10.32604/jbd.2021.015892

    Abstract As the wide application of imaging technology, the number of big image data which may containing private information is growing fast. Due to insufficient computing power and storage space for local server device, many people hand over these images to cloud servers for management. But actually, it is unsafe to store the images to the cloud, so encryption becomes a necessary step before uploading to reduce the risk of privacy leakage. However, it is not conducive to the efficient application of image, especially in the Content-Based Image Retrieval (CBIR) scheme. This paper proposes an outsourcing privacypreserving JPEG CBIR scheme. We… More >

  • Open Access

    REVIEW

    A Review of Dynamic Resource Management in Cloud Computing Environments

    Mohammad Aldossary*

    Computer Systems Science and Engineering, Vol.36, No.3, pp. 461-476, 2021, DOI:10.32604/csse.2021.014975

    Abstract In a cloud environment, Virtual Machines (VMs) consolidation and resource provisioning are used to address the issues of workload fluctuations. VM consolidation aims to move the VMs from one host to another in order to reduce the number of active hosts and save power. Whereas resource provisioning attempts to provide additional resource capacity to the VMs as needed in order to meet Quality of Service (QoS) requirements. However, these techniques have a set of limitations in terms of the additional costs related to migration and scaling time, and energy overhead that need further consideration. Therefore, this paper presents a comprehensive… More >

  • Open Access

    ARTICLE

    Live Data Analytics with IoT Intelligence-Sensing System in Public Transportation for COVID-19 Pandemic

    Abdullah Alamri1,*, Sultan Alamri2

    Intelligent Automation & Soft Computing, Vol.27, No.2, pp. 441-452, 2021, DOI:10.32604/iasc.2021.015198

    Abstract The COVID-19 pandemic has presented an unprecedented challenge to the entire world. It is a humanitarian crisis on a global scale. The virus continues to spread throughout nations, putting health systems under enormous pressure in the battle to save lives. With this growing crisis, companies and researchers worldwide are searching for ways to overcome the challenges associated with this virus. Also, the transport sector will play a critical role in revitalizing economies while simultaneously containing the spread of COVID-19. As the virus is still circulating, the only solution is to redesign public transportation to make people feel safe. In this… More >

  • Open Access

    ARTICLE

    An Enhanced Decentralized Virtual Machine Migration Approach for Energy-Aware Cloud Data Centers

    R. Jayamala*, A. Valarmathi

    Intelligent Automation & Soft Computing, Vol.27, No.2, pp. 347-358, 2021, DOI:10.32604/iasc.2021.012401

    Abstract Cloud computing is an increasingly important technology to deliver pay-as-you-go online computing services. In this study, the cloud service provider permits the cloud user to pay according to the user’s needs. Various methods have been used to reduce energy utilization in the cloud. The rapid increase of cloud users has led to increased energy consumption and higher operating costs for cloud providers. A key issue in cloud data centers is their massive energy consumption to operate and maintain computing services. Virtual machine (VM) migration is a method to reduce energy consumption. This study proposes enhanced decentralized virtual machine migration (EDVMM),… More >

  • Open Access

    ARTICLE

    Secure Cloud Data Storage System Using Hybrid Paillier–Blowfish Algorithm

    Bijeta Seth1, Surjeet Dalal1, Dac-Nhuong Le2,3,*, Vivek Jaglan4, Neeraj Dahiya1, Akshat Agrawal5, Mayank Mohan Sharma6, Deo Prakash7, K. D. Verma8

    CMC-Computers, Materials & Continua, Vol.67, No.1, pp. 779-798, 2021, DOI:10.32604/cmc.2021.014466

    Abstract Cloud computing utilizes enormous clusters of serviceable and manageable resources that can be virtually and dynamically reconfigured in order to deliver optimum resource utilization by exploiting the pay-per-use model. However, concerns around security have been an impediment in the extensive adoption of the cloud computing model. In this regard, advancements in cryptography, accelerated by the wide usage of the internet worldwide, has emerged as a key area in addressing some of these security concerns. In this document, a hybrid cryptographic protocol deploying Blowfish and Paillier encryption algorithms has been presented and its strength compared with the existing hybrid Advanced Encryption… More >

  • Open Access

    ARTICLE

    Security Requirement Management for Cloud-Assisted and Internet of Things—Enabled Smart City

    Muhammad Usman Tariq1, Muhammad Babar2, Mian Ahmad Jan3,4,5,*, Akmal Saeed Khattak6, Mohammad Dahman Alshehri7, Abid Yahya8

    CMC-Computers, Materials & Continua, Vol.67, No.1, pp. 625-639, 2021, DOI:10.32604/cmc.2021.014165

    Abstract The world is rapidly changing with the advance of information technology. The expansion of the Internet of Things (IoT) is a huge step in the development of the smart city. The IoT consists of connected devices that transfer information. The IoT architecture permits on-demand services to a public pool of resources. Cloud computing plays a vital role in developing IoT-enabled smart applications. The integration of cloud computing enhances the offering of distributed resources in the smart city. Improper management of security requirements of cloud-assisted IoT systems can bring about risks to availability, security, performance, confidentiality, and privacy. The key reason… More >

  • Open Access

    ARTICLE

    Intelligent Cloud Based Load Balancing System Empowered with Fuzzy Logic

    Atif Ishaq Khan1, Syed Asad Raza Kazmi1, Ayesha Atta1,*, Muhammad Faheem Mushtaq2, Muhammad Idrees3, Ilyas Fakir1, Muhammad Safyan1, Muhammad Adnan Khan4, Awais Qasim1

    CMC-Computers, Materials & Continua, Vol.67, No.1, pp. 519-528, 2021, DOI:10.32604/cmc.2021.013865

    Abstract Cloud computing is seeking attention as a new computing paradigm to handle operations more efficiently and cost-effectively. Cloud computing uses dynamic resource provisioning and de-provisioning in a virtualized environment. The load on the cloud data centers is growing day by day due to the rapid growth in cloud computing demand. Elasticity in cloud computing is one of the fundamental properties, and elastic load balancing automatically distributes incoming load to multiple virtual machines. This work is aimed to introduce efficient resource provisioning and de-provisioning for better load balancing. In this article, a model is proposed in which the fuzzy logic approach… More >

Displaying 331-340 on page 34 of 430. Per Page