Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (43)
  • Open Access

    ARTICLE

    Privacy-Preserving Multi-Keyword Fuzzy Adjacency Search Strategy for Encrypted Graph in Cloud Environment

    Bin Wu1,2, Xianyi Chen3, Jinzhou Huang4,*, Caicai Zhang5, Jing Wang6, Jing Yu1,2, Zhiqiang Zhao7, Zhuolin Mei1,2

    CMC-Computers, Materials & Continua, Vol.78, No.3, pp. 3177-3194, 2024, DOI:10.32604/cmc.2023.047147

    Abstract In a cloud environment, outsourced graph data is widely used in companies, enterprises, medical institutions, and so on. Data owners and users can save costs and improve efficiency by storing large amounts of graph data on cloud servers. Servers on cloud platforms usually have some subjective or objective attacks, which make the outsourced graph data in an insecure state. The issue of privacy data protection has become an important obstacle to data sharing and usage. How to query outsourcing graph data safely and effectively has become the focus of research. Adjacency query is a basic and frequently used operation in… More >

  • Open Access

    ARTICLE

    Person Re-Identification with Model-Contrastive Federated Learning in Edge-Cloud Environment

    Baixuan Tang1,2,#, Xiaolong Xu1,2,#, Fei Dai3, Song Wang4,*

    Intelligent Automation & Soft Computing, Vol.38, No.1, pp. 35-55, 2023, DOI:10.32604/iasc.2023.036715

    Abstract Person re-identification (ReID) aims to recognize the same person in multiple images from different camera views. Training person ReID models are time-consuming and resource-intensive; thus, cloud computing is an appropriate model training solution. However, the required massive personal data for training contain private information with a significant risk of data leakage in cloud environments, leading to significant communication overheads. This paper proposes a federated person ReID method with model-contrastive learning (MOON) in an edge-cloud environment, named FRM. Specifically, based on federated partial averaging, MOON warmup is added to correct the local training of individual edge servers and improve the model’s… More >

  • Open Access

    ARTICLE

    A Lightweight ABE Security Protection Scheme in Cloud Environment Based on Attribute Weight

    Lihong Guo*, Jie Yang, Haitao Wu

    CMC-Computers, Materials & Continua, Vol.76, No.2, pp. 1929-1946, 2023, DOI:10.32604/cmc.2023.039170

    Abstract Attribute-based encryption (ABE) is a technique used to encrypt data, it has the flexibility of access control, high security, and resistance to collusion attacks, and especially it is used in cloud security protection. However, a large number of bilinear mappings are used in ABE, and the calculation of bilinear pairing is time-consuming. So there is the problem of low efficiency. On the other hand, the decryption key is not uniquely associated with personal identification information, if the decryption key is maliciously sold, ABE is unable to achieve accountability for the user. In practical applications, shared message requires hierarchical sharing in… More >

  • Open Access

    ARTICLE

    Machine Learning Based Cybersecurity Threat Detection for Secure IoT Assisted Cloud Environment

    Z. Faizal Khan1, Saeed M. Alshahrani2,*, Abdulrahman Alghamdi2, Someah Alangari3, Nouf Ibrahim Altamami4, Khalid A. Alissa5, Sana Alazwari6, Mesfer Al Duhayyim7, Fahd N. Al-Wesabi8

    Computer Systems Science and Engineering, Vol.47, No.1, pp. 855-871, 2023, DOI:10.32604/csse.2023.036735

    Abstract The Internet of Things (IoT) is determine enormous economic openings for industries and allow stimulating innovation which obtain between domains in childcare for eldercare, in health service to energy, and in developed to transport. Cybersecurity develops a difficult problem in IoT platform whereas the presence of cyber-attack requires that solved. The progress of automatic devices for cyber-attack classifier and detection employing Artificial Intelligence (AI) and Machine Learning (ML) devices are crucial fact to realize security in IoT platform. It can be required for minimizing the issues of security based on IoT devices efficiently. Thus, this research proposal establishes novel mayfly… More >

  • Open Access

    ARTICLE

    BFS-SVM Classifier for QoS and Resource Allocation in Cloud Environment

    A. Richard William1,*, J. Senthilkumar2, Y. Suresh2, V. Mohanraj2

    Computer Systems Science and Engineering, Vol.47, No.1, pp. 777-790, 2023, DOI:10.32604/csse.2023.031753

    Abstract In cloud computing Resource allocation is a very complex task. Handling the customer demand makes the challenges of on-demand resource allocation. Many challenges are faced by conventional methods for resource allocation in order to meet the Quality of Service (QoS) requirements of users. For solving the about said problems a new method was implemented with the utility of machine learning framework of resource allocation by utilizing the cloud computing technique was taken in to an account in this research work. The accuracy in the machine learning algorithm can be improved by introducing Bat Algorithm with feature selection (BFS) in the… More >

  • Open Access

    ARTICLE

    Data Layout and Scheduling Tasks in a Meteorological Cloud Environment

    Kunfu Wang, Yongsheng Hao, Jie Cao*

    Intelligent Automation & Soft Computing, Vol.37, No.1, pp. 1033-1052, 2023, DOI:10.32604/iasc.2023.038036

    Abstract Meteorological model tasks require considerable meteorological basis data to support their execution. However, if the task and the meteorological datasets are located on different clouds, that enhances the cost, execution time, and energy consumption of execution meteorological tasks. Therefore, the data layout and task scheduling may work together in the meteorological cloud to avoid being in various locations. To the best of our knowledge, this is the first paper that tries to schedule meteorological tasks with the help of the meteorological data set layout. First, we use the FP-Growth-M (frequent-pattern growth for meteorological model datasets) method to mine the relationship… More >

  • Open Access

    ARTICLE

    Auto-Scaling Framework for Enhancing the Quality of Service in the Mobile Cloud Environments

    Yogesh Kumar1,*, Jitender Kumar1, Poonam Sheoran2

    CMC-Computers, Materials & Continua, Vol.75, No.3, pp. 5785-5800, 2023, DOI:10.32604/cmc.2023.039276

    Abstract On-demand availability and resource elasticity features of Cloud computing have attracted the focus of various research domains. Mobile cloud computing is one of these domains where complex computation tasks are offloaded to the cloud resources to augment mobile devices’ cognitive capacity. However, the flexible provisioning of cloud resources is hindered by uncertain offloading workloads and significant setup time of cloud virtual machines (VMs). Furthermore, any delays at the cloud end would further aggravate the miseries of real-time tasks. To resolve these issues, this paper proposes an auto-scaling framework (ACF) that strives to maintain the quality of service (QoS) for the… More >

  • Open Access

    ARTICLE

    Optimizing Resource Allocation Framework for Multi-Cloud Environment

    Tahir Alyas1, Taher M. Ghazal2,3, Badria Sulaiman Alfurhood4, Ghassan F. Issa2, Osama Ali Thawabeh5, Qaiser Abbas6,*

    CMC-Computers, Materials & Continua, Vol.75, No.2, pp. 4119-4136, 2023, DOI:10.32604/cmc.2023.033916

    Abstract Cloud computing makes dynamic resource provisioning more accessible. Monitoring a functioning service is crucial, and changes are made when particular criteria are surpassed. This research explores the decentralized multi-cloud environment for allocating resources and ensuring the Quality of Service (QoS), estimating the required resources, and modifying allotted resources depending on workload and parallelism due to resources. Resource allocation is a complex challenge due to the versatile service providers and resource providers. The engagement of different service and resource providers needs a cooperation strategy for a sustainable quality of service. The objective of a coherent and rational resource allocation is to… More >

  • Open Access

    ARTICLE

    Graph Convolutional Neural Network Based Malware Detection in IoT-Cloud Environment

    Faisal S. Alsubaei1, Haya Mesfer Alshahrani2, Khaled Tarmissi3, Abdelwahed Motwakel4,*

    Intelligent Automation & Soft Computing, Vol.36, No.3, pp. 2897-2914, 2023, DOI:10.32604/iasc.2023.034907

    Abstract Cybersecurity has become the most significant research area in the domain of the Internet of Things (IoT) owing to the ever-increasing number of cyberattacks. The rapid penetration of Android platforms in mobile devices has made the detection of malware attacks a challenging process. Furthermore, Android malware is increasing on a daily basis. So, precise malware detection analytical techniques need a large number of hardware resources that are significantly resource-limited for mobile devices. In this research article, an optimal Graph Convolutional Neural Network-based Malware Detection and classification (OGCNN-MDC) model is introduced for an IoT-cloud environment. The proposed OGCNN-MDC model aims to… More >

  • Open Access

    ARTICLE

    Many-Objective Optimization-Based Task Scheduling in Hybrid Cloud Environments

    Mengkai Zhao1, Zhixia Zhang2, Tian Fan1, Wanwan Guo1, Zhihua Cui1,*

    CMES-Computer Modeling in Engineering & Sciences, Vol.136, No.3, pp. 2425-2450, 2023, DOI:10.32604/cmes.2023.026671

    Abstract Due to the security and scalability features of hybrid cloud architecture, it can better meet the diverse requirements of users for cloud services. And a reasonable resource allocation solution is the key to adequately utilize the hybrid cloud. However, most previous studies have not comprehensively optimized the performance of hybrid cloud task scheduling, even ignoring the conflicts between its security privacy features and other requirements. Based on the above problems, a many-objective hybrid cloud task scheduling optimization model (HCTSO) is constructed combining risk rate, resource utilization, total cost, and task completion time. Meanwhile, an opposition-based learning knee point-driven many-objective evolutionary… More >

Displaying 1-10 on page 1 of 43. Per Page