Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (426)
  • Open Access

    ARTICLE

    Fine-Grained Binary Analysis Method for Privacy Leakage Detection on the Cloud Platform

    Jiaye Pan1, Yi Zhuang1, *, Xinwen Hu1, 2, Wenbing Zhao3

    CMC-Computers, Materials & Continua, Vol.64, No.1, pp. 607-622, 2020, DOI:10.32604/cmc.2020.09853

    Abstract Nowadays cloud architecture is widely applied on the internet. New malware aiming at the privacy data stealing or crypto currency mining is threatening the security of cloud platforms. In view of the problems with existing application behavior monitoring methods such as coarse-grained analysis, high performance overhead and lack of applicability, this paper proposes a new fine-grained binary program monitoring and analysis method based on multiple system level components, which is used to detect the possible privacy leakage of applications installed on cloud platforms. It can be used online in cloud platform environments for fine-grained automated analysis of target programs, ensuring… More >

  • Open Access

    ARTICLE

    A Revised Satellite Cloud-Derived Wind Inversion Algorithm Based on Computer Cluster

    Lili He1, 2, Zhiwei Cai1, 2, Dantong Ouyang1, 2, Changshuai Wang1, 2, Yu Jiang1, 2, Chong Wang1, 2, 3, Hongtao Bai1, 2, *

    CMC-Computers, Materials & Continua, Vol.64, No.1, pp. 373-388, 2020, DOI:10.32604/cmc.2020.09860

    Abstract In view of the satellite cloud-derived wind inversion has the characteristics of large scale, intensive computing and time-consuming serial inversion algorithm is very difficult to break through the bottleneck of efficiency. We proposed a parallel acceleration scheme of cloud-derived wind inversion algorithm based on MPI cluster parallel technique in this paper. The divide-and-conquer idea, assigning winds vector inversion tasks to each computing unit, is identified according to a certain strategy. Each computing unit executes the assigned tasks in parallel, namely divide-and-rule the inversion task, so as to reduce the efficiency bottleneck of long inversion time caused by serial time accumulation.… More >

  • Open Access

    ARTICLE

    Efficient Hierarchical Multi-Server Authentication Protocol for Mobile Cloud Computing

    Jiangheng Kou1, Mingxing He1, *, Ling Xiong1, Zihang Ge2, Guangmin Xie1

    CMC-Computers, Materials & Continua, Vol.64, No.1, pp. 297-312, 2020, DOI:10.32604/cmc.2020.09758

    Abstract With the development of communication technologies, various mobile devices and different types of mobile services became available. The emergence of these services has brought great convenience to our lives. The multi-server architecture authentication protocols for mobile cloud computing were proposed to ensure the security and availability between mobile devices and mobile services. However, most of the protocols did not consider the case of hierarchical authentication. In the existing protocol, when a mobile user once registered at the registration center, he/she can successfully authenticate with all mobile service providers that are registered at the registration center, but real application scenarios are… More >

  • Open Access

    ARTICLE

    Toward a More Accurate Web Service Selection Using Modified Interval DEA Models with Undesirable Outputs

    Alireza Poordavoodi1, Mohammad Reza Moazami Goudarzi2,*, Hamid Haj Seyyed Javadi3, Amir Masoud Rahmani4, Mohammad Izadikhah5

    CMES-Computer Modeling in Engineering & Sciences, Vol.123, No.2, pp. 525-570, 2020, DOI:10.32604/cmes.2020.08854

    Abstract With the growing number of Web services on the internet, there is a challenge to select the best Web service which can offer more quality-of-service (QoS) values at the lowest price. Another challenge is the uncertainty of QoS values over time due to the unpredictable nature of the internet. In this paper, we modify the interval data envelopment analysis (DEA) models [Wang, Greatbanks and Yang (2005)] for QoS-aware Web service selection considering the uncertainty of QoS attributes in the presence of desirable and undesirable factors. We conduct a set of experiments using a synthesized dataset to show the capabilities of… More >

  • Open Access

    ARTICLE

    An Efficient Ciphertext-Policy Attribute-Based Encryption Scheme with Policy Update

    Changji Wang1, *, Yuan Yuan2

    CMC-Computers, Materials & Continua, Vol.63, No.2, pp. 1031-1041, 2020, DOI:10.32604/cmc.2020.06278

    Abstract Ciphertext-policy attribute-based encryption (CP-ABE) is a promising cryptographic solution to the problem for enforcing fine-grained access control over encrypted data in the cloud. However, when applying CP-ABE to data outsourcing scenarios, we have to address the challenging issue of policy updates because access control elements, such as users, attributes, and access rules may change frequently. In this paper, we propose a notion of access policy updatable ciphertext-policy attribute-based encryption (APU-CP-ABE) by combining the idea of ciphertext-policy attribute-based key encapsulation and symmetric proxy re-encryption. When an access policy update occurs, data owner is no longer required to download any data for… More >

  • Open Access

    ARTICLE

    A Temporal Multi-Tenant RBAC Model for Collaborative Cloud Services

    Zhengtao Liu1, *, Yi Ying1, Yaqin Peng1, Jinyue Xia2

    CMC-Computers, Materials & Continua, Vol.63, No.2, pp. 861-871, 2020, DOI:10.32604/cmc.2020.07142

    Abstract Multi-tenant collaboration brings the challenge to access control in cloud computing environment. Based on the multi-tenant role-based access control (MTRBAC) model, a Temporal MT-RBAC (TMT-RBAC) model for collaborative cloud services is proposed. It adds the time constraint between trusted tenants, including usable role time constraint based on both calendar and interval time. Analysis shows that the new model strengthens the presentation ability of MT-RBAC model, achieves the finergrained access control, reduces the management costs and enhances the security of multitenant collaboration in cloud computing environment. More >

  • Open Access

    ARTICLE

    Ground Nephogram Recognition Algorithm Based on Selective Neural Network Ensemble

    Tao Li1, Xiang Li1, *, Yongjun Ren2, Jinyue Xia3

    CMC-Computers, Materials & Continua, Vol.63, No.2, pp. 621-631, 2020, DOI:10.32604/cmc.2020.06463

    Abstract In view of the low accuracy of traditional ground nephogram recognition model, the authors put forward a k-means algorithm-acquired neural network ensemble method, which takes BP neural network ensemble model as the basis, uses k-means algorithm to choose the individual neural networks with partial diversities for integration, and builds the cloud form classification model. Through simulation experiments on ground nephogram samples, the results show that the algorithm proposed in the article can effectively improve the Classification accuracy of ground nephogram recognition in comparison with applying single BP neural network and traditional BP AdaBoost ensemble algorithm on classification of ground nephogram. More >

  • Open Access

    ARTICLE

    An Encrypted Image Retrieval Method Based on SimHash in Cloud Computing

    Jiaohua Qin1, Yusi Cao1, Xuyu Xiang1, *, Yun Tan1, Lingyun Xiang2, Jianjun Zhang3

    CMC-Computers, Materials & Continua, Vol.63, No.1, pp. 389-399, 2020, DOI:10.32604/cmc.2020.07819

    Abstract With the massive growth of images data and the rise of cloud computing that can provide cheap storage space and convenient access, more and more users store data in cloud server. However, how to quickly query the expected data with privacy-preserving is still a challenging in the encryption image data retrieval. Towards this goal, this paper proposes a ciphertext image retrieval method based on SimHash in cloud computing. Firstly, we extract local feature of images, and then cluster the features by K-means. Based on it, the visual word codebook is introduced to represent feature information of images, which hashes the… More >

  • Open Access

    ARTICLE

    A Mobile Cloud-Based eHealth Scheme

    Yihe Liu1, Aaqif Afzaal Abbasi2, Atefeh Aghaei3, Almas Abbasi4, Amir Mosavi5, 6, 7, Shahaboddin Shamshirband8, 9, *, Mohammed A. A. Al-qaness10

    CMC-Computers, Materials & Continua, Vol.63, No.1, pp. 31-39, 2020, DOI:10.32604/cmc.2020.07708

    Abstract Mobile cloud computing is an emerging field that is gaining popularity across borders at a rapid pace. Similarly, the field of health informatics is also considered as an extremely important field. This work observes the collaboration between these two fields to solve the traditional problem of extracting Electrocardiogram signals from trace reports and then performing analysis. The developed system has two front ends, the first dedicated for the user to perform the photographing of the trace report. Once the photographing is complete, mobile computing is used to extract the signal. Once the signal is extracted, it is uploaded into the… More >

  • Open Access

    ARTICLE

    Mobile Internet Mobile Agent System Dynamic Trust Model for Cloud Computing

    Weijin Jiang1, 2, 3, Yang Wang1,*, Yirong Jiang4,*, Yuhui Xu1, Jiahui Chen1, Lina Tan1, Guo Liang5

    CMC-Computers, Materials & Continua, Vol.62, No.1, pp. 123-136, 2020, DOI:10.32604/cmc.2020.05933

    Abstract In mobile cloud computing, trust is a very important parameter in mobile cloud computing security because data storage and data processing are performed remotely in the cloud. Aiming at the security and trust management of mobile agent system in mobile cloud computing environment, the Human Trust Mechanism (HTM) is used to study the subjective trust formation, trust propagation and trust evolution law, and the subjective trust dynamic management algorithm (MASTM) is proposed. Based on the interaction experience between the mobile agent and the execution host and the third-party recommendation information to collect the basic trust data, the public trust host… More >

Displaying 381-390 on page 39 of 426. Per Page