Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (219)
  • Open Access

    ARTICLE

    A Heuristics-Based Cost Model for Scientific Workflow Scheduling in Cloud

    Ehab Nabiel Al-Khanak1,*, Sai Peck Lee2, Saif Ur Rehman Khan3, Navid Behboodian4, Osamah Ibrahim Khalaf5, Alexander Verbraeck6, Hans van Lint1

    CMC-Computers, Materials & Continua, Vol.67, No.3, pp. 3265-3282, 2021, DOI:10.32604/cmc.2021.015409

    Abstract Scientific Workflow Applications (SWFAs) can deliver collaborative tools useful to researchers in executing large and complex scientific processes. Particularly, Scientific Workflow Scheduling (SWFS) accelerates the computational procedures between the available computational resources and the dependent workflow jobs based on the researchers’ requirements. However, cost optimization is one of the SWFS challenges in handling massive and complicated tasks and requires determining an approximate (near-optimal) solution within polynomial computational time. Motivated by this, current work proposes a novel SWFS cost optimization model effective in solving this challenge. The proposed model contains three main stages: (i) scientific workflow application, (ii) targeted computational environment,… More >

  • Open Access

    ARTICLE

    Prediction of Cloud Ranking in a Hyperconverged Cloud Ecosystem Using Machine Learning

    Nadia Tabassum1, Allah Ditta2, Tahir Alyas3, Sagheer Abbas4, Hani Alquhayz5, Natash Ali Mian6, Muhammad Adnan Khan7,*

    CMC-Computers, Materials & Continua, Vol.67, No.3, pp. 3129-3141, 2021, DOI:10.32604/cmc.2021.014729

    Abstract Cloud computing is becoming popular technology due to its functional properties and variety of customer-oriented services over the Internet. The design of reliable and high-quality cloud applications requires a strong Quality of Service QoS parameter metric. In a hyperconverged cloud ecosystem environment, building high-reliability cloud applications is a challenging job. The selection of cloud services is based on the QoS parameters that play essential roles in optimizing and improving cloud rankings. The emergence of cloud computing is significantly reshaping the digital ecosystem, and the numerous services offered by cloud service providers are playing a vital role in this transformation. Hyperconverged… More >

  • Open Access

    ARTICLE

    A Novel Anonymous Authentication Scheme Based on Edge Computing in Internet of Vehicles

    Xiaoliang Wang1, Xinhui She1, Liang Bai2,*, Yang Qing1, Frank Jiang3

    CMC-Computers, Materials & Continua, Vol.67, No.3, pp. 3349-3361, 2021, DOI:10.32604/cmc.2021.012454

    Abstract The vehicular cloud computing is an emerging technology that changes vehicle communication and underlying traffic management applications. However, cloud computing has disadvantages such as high delay, low privacy and high communication cost, which can not meet the needs of real-time interactive information of Internet of vehicles. Ensuring security and privacy in Internet of Vehicles is also regarded as one of its most important challenges. Therefore, in order to ensure the user information security and improve the real-time of vehicle information interaction, this paper proposes an anonymous authentication scheme based on edge computing. In this scheme, the concept of edge computing… More >

  • Open Access

    ARTICLE

    A Trusted NUMFabric Algorithm for Congestion Price Calculation at the Internet-of-Things Datacenter

    Shan Chun1, Xiaolong Chen2, Guoqiang Deng3,*, Hao Liu4

    CMES-Computer Modeling in Engineering & Sciences, Vol.126, No.3, pp. 1203-1216, 2021, DOI:10.32604/cmes.2021.012230

    Abstract The important issues of network TCP congestion control are how to compute the link price according to the link status and regulate the data sending rate based on link congestion pricing feedback information. However, it is difficult to predict the congestion state of the link-end accurately at the source. In this paper, we presented an improved NUMFabric algorithm for calculating the overall congestion price. In the proposed scheme, the whole network structure had been obtained by the central control server in the Software Defined Network, and a kind of dual-hierarchy algorithm for calculating overall network congestion price had been demonstrated.… More >

  • Open Access

    ARTICLE

    A Data Security Framework for Cloud Computing Services

    Luis-Eduardo Bautista-Villalpando1,*, Alain Abran2

    Computer Systems Science and Engineering, Vol.37, No.2, pp. 203-218, 2021, DOI:10.32604/csse.2021.015437

    Abstract Cyberattacks are difficult to prevent because the targeted companies and organizations are often relying on new and fundamentally insecure cloud-based technologies, such as the Internet of Things. With increasing industry adoption and migration of traditional computing services to the cloud, one of the main challenges in cybersecurity is to provide mechanisms to secure these technologies. This work proposes a Data Security Framework for cloud computing services (CCS) that evaluates and improves CCS data security from a software engineering perspective by evaluating the levels of security within the cloud computing paradigm using engineering methods and techniques applied to CCS. This framework… More >

  • Open Access

    ARTICLE

    Safeguarding Cloud Computing Infrastructure: A Security Analysis

    Mamdouh Alenezi*

    Computer Systems Science and Engineering, Vol.37, No.2, pp. 159-167, 2021, DOI:10.32604/csse.2021.015282

    Abstract Cloud computing is the provision of hosted resources, comprising software, hardware and processing over the World Wide Web. The advantages of rapid deployment, versatility, low expenses and scalability have led to the widespread use of cloud computing across organizations of all sizes, mostly as a component of the combination/multi-cloud infrastructure structure. While cloud storage offers significant benefits as well as cost-effective alternatives for IT management and expansion, new opportunities and challenges in the context of security vulnerabilities are emerging in this domain. Cloud security, also recognized as cloud computing security, refers to a collection of policies, regulations, systematic processes that… More >

  • Open Access

    ARTICLE

    A Resource Management Algorithm for Virtual Machine Migration in Vehicular Cloud Computing

    Sohan Kumar Pande1, Sanjaya Kumar Panda2, Satyabrata Das1, Kshira Sagar Sahoo3, Ashish Kr. Luhach4, N. Z. Jhanjhi5,*, Roobaea Alroobaea6, Sivakumar Sivanesan5

    CMC-Computers, Materials & Continua, Vol.67, No.2, pp. 2647-2663, 2021, DOI:10.32604/cmc.2021.015026

    Abstract In recent years, vehicular cloud computing (VCC) has gained vast attention for providing a variety of services by creating virtual machines (VMs). These VMs use the resources that are present in modern smart vehicles. Many studies reported that some of these VMs hosted on the vehicles are overloaded, whereas others are underloaded. As a circumstance, the energy consumption of overloaded vehicles is drastically increased. On the other hand, underloaded vehicles are also drawing considerable energy in the underutilized situation. Therefore, minimizing the energy consumption of the VMs that are hosted by both overloaded and underloaded is a challenging issue in… More >

  • Open Access

    REVIEW

    A Review of Dynamic Resource Management in Cloud Computing Environments

    Mohammad Aldossary*

    Computer Systems Science and Engineering, Vol.36, No.3, pp. 461-476, 2021, DOI:10.32604/csse.2021.014975

    Abstract In a cloud environment, Virtual Machines (VMs) consolidation and resource provisioning are used to address the issues of workload fluctuations. VM consolidation aims to move the VMs from one host to another in order to reduce the number of active hosts and save power. Whereas resource provisioning attempts to provide additional resource capacity to the VMs as needed in order to meet Quality of Service (QoS) requirements. However, these techniques have a set of limitations in terms of the additional costs related to migration and scaling time, and energy overhead that need further consideration. Therefore, this paper presents a comprehensive… More >

  • Open Access

    ARTICLE

    Live Data Analytics with IoT Intelligence-Sensing System in Public Transportation for COVID-19 Pandemic

    Abdullah Alamri1,*, Sultan Alamri2

    Intelligent Automation & Soft Computing, Vol.27, No.2, pp. 441-452, 2021, DOI:10.32604/iasc.2021.015198

    Abstract The COVID-19 pandemic has presented an unprecedented challenge to the entire world. It is a humanitarian crisis on a global scale. The virus continues to spread throughout nations, putting health systems under enormous pressure in the battle to save lives. With this growing crisis, companies and researchers worldwide are searching for ways to overcome the challenges associated with this virus. Also, the transport sector will play a critical role in revitalizing economies while simultaneously containing the spread of COVID-19. As the virus is still circulating, the only solution is to redesign public transportation to make people feel safe. In this… More >

  • Open Access

    ARTICLE

    Secure Cloud Data Storage System Using Hybrid Paillier–Blowfish Algorithm

    Bijeta Seth1, Surjeet Dalal1, Dac-Nhuong Le2,3,*, Vivek Jaglan4, Neeraj Dahiya1, Akshat Agrawal5, Mayank Mohan Sharma6, Deo Prakash7, K. D. Verma8

    CMC-Computers, Materials & Continua, Vol.67, No.1, pp. 779-798, 2021, DOI:10.32604/cmc.2021.014466

    Abstract Cloud computing utilizes enormous clusters of serviceable and manageable resources that can be virtually and dynamically reconfigured in order to deliver optimum resource utilization by exploiting the pay-per-use model. However, concerns around security have been an impediment in the extensive adoption of the cloud computing model. In this regard, advancements in cryptography, accelerated by the wide usage of the internet worldwide, has emerged as a key area in addressing some of these security concerns. In this document, a hybrid cryptographic protocol deploying Blowfish and Paillier encryption algorithms has been presented and its strength compared with the existing hybrid Advanced Encryption… More >

Displaying 161-170 on page 17 of 219. Per Page