Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (43)
  • Open Access

    ARTICLE

    Improved Chameleon Swarm Optimization-Based Load Scheduling for IoT-Enabled Cloud Environment

    Manar Ahmed Hamza1,*, Shaha Al-Otaibi2, Sami Althahabi3, Jaber S. Alzahrani4, Abdullah Mohamed5, Abdelwahed Motwakel1, Abu Sarwar Zamani1, Mohamed I. Eldesouki6

    Computer Systems Science and Engineering, Vol.46, No.2, pp. 1371-1383, 2023, DOI:10.32604/csse.2023.030232

    Abstract Internet of things (IoT) and cloud computing (CC) becomes widespread in different application domains such as business, e-commerce, healthcare, etc. The recent developments of IoT technology have led to an increase in large amounts of data from various sources. In IoT enabled cloud environment, load scheduling remains a challenging process which is applied for ensuring network stability with maximum resource utilization. The load scheduling problem was regarded as an optimization problem that is solved by metaheuristics. In this view, this study develops a new Circle Chaotic Chameleon Swarm Optimization based Load Scheduling (C3SOA-LS) technique for IoT enabled cloud environment. The… More >

  • Open Access

    ARTICLE

    Lattice-Based Authentication Scheme to Prevent Quantum Attack in Public Cloud Environment

    Naveed Khan1, Zhang Jianbiao1, Intikhab Ullah2, Muhammad Salman Pathan3, Huhnkuk Lim4,*

    CMC-Computers, Materials & Continua, Vol.75, No.1, pp. 35-49, 2023, DOI:10.32604/cmc.2023.036189

    Abstract Public cloud computing provides a variety of services to consumers via high-speed internet. The consumer can access these services anytime and anywhere on a balanced service cost. Many traditional authentication protocols are proposed to secure public cloud computing. However, the rapid development of high-speed internet and organizations’ race to develop quantum computers is a nightmare for existing authentication schemes. These traditional authentication protocols are based on factorization or discrete logarithm problems. As a result, traditional authentication protocols are vulnerable in the quantum computing era. Therefore, in this article, we have proposed an authentication protocol based on the lattice technique for… More >

  • Open Access

    ARTICLE

    Secured Access Policy in Ciphertext-Policy Attribute-Based Encryption for Cloud Environment

    P. Prathap Nayudu, Krovi Raja Sekhar*

    Computer Systems Science and Engineering, Vol.46, No.1, pp. 1079-1092, 2023, DOI:10.32604/csse.2023.033961

    Abstract The cloud allows clients to store and share data. Depending on the user’s needs, it is imperative to design an effective access control plan to share the information only with approved users. The user loses control of their data when the data is outsourced to the cloud. Therefore, access control mechanisms will become a significant challenging problem. The Ciphertext-Policy Attribute-Based Encryption (CP-ABE) is an essential solution in which the user can control data access. CP-ABE encrypts the data under a limited access policy after the user sets some access policies. The user can decrypt the data if they satisfy the… More >

  • Open Access

    ARTICLE

    Blockchain and Data Integrity Authentication Technique for Secure Cloud Environment

    A. Ramachandran1,*, P. Ramadevi2, Ahmed Alkhayyat3, Yousif Kerrar Yousif4

    Intelligent Automation & Soft Computing, Vol.36, No.2, pp. 2055-2070, 2023, DOI:10.32604/iasc.2023.032942

    Abstract Nowadays, numerous applications are associated with cloud and user data gets collected globally and stored in cloud units. In addition to shared data storage, cloud computing technique offers multiple advantages for the user through different distribution designs like hybrid cloud, public cloud, community cloud and private cloud. Though cloud-based computing solutions are highly convenient to the users, it also brings a challenge i.e., security of the data shared. Hence, in current research paper, blockchain with data integrity authentication technique is developed for an efficient and secure operation with user authentication process. Blockchain technology is utilized in this study to enable… More >

  • Open Access

    ARTICLE

    Remote Sensing Data Processing Process Scheduling Based on Reinforcement Learning in Cloud Environment

    Ying Du1,2, Shuo Zhang1,2, Pu Cheng3,*, Rita Yi Man Li4, Xiao-Guang Yue5,6

    CMES-Computer Modeling in Engineering & Sciences, Vol.135, No.3, pp. 1965-1979, 2023, DOI:10.32604/cmes.2023.024871

    Abstract Task scheduling plays a crucial role in cloud computing and is a key factor determining cloud computing performance. To solve the task scheduling problem for remote sensing data processing in cloud computing, this paper proposes a workflow task scheduling algorithm---Workflow Task Scheduling Algorithm based on Deep Reinforcement Learning (WDRL). The remote sensing data process modeling is transformed into a directed acyclic graph scheduling problem. Then, the algorithm is designed by establishing a Markov decision model and adopting a fitness calculation method. Finally, combine the advantages of reinforcement learning and deep neural networks to minimize make-time for remote sensing data processes… More >

  • Open Access

    REVIEW

    Survey on Task Scheduling Optimization Strategy under Multi-Cloud Environment

    Qiqi Zhang1, Shaojin Geng2, Xingjuan Cai1,*

    CMES-Computer Modeling in Engineering & Sciences, Vol.135, No.3, pp. 1863-1900, 2023, DOI:10.32604/cmes.2023.022287

    Abstract Cloud computing technology is favored by users because of its strong computing power and convenient services. At the same time, scheduling performance has an extremely efficient impact on promoting carbon neutrality. Currently, scheduling research in the multi-cloud environment aims to address the challenges brought by business demands to cloud data centers during peak hours. Therefore, the scheduling problem has promising application prospects under the multi-cloud environment. This paper points out that the currently studied scheduling problems in the multi-cloud environment mainly include independent task scheduling and workflow task scheduling based on the dependencies between tasks. This paper reviews the concepts,… More > Graphic Abstract

    Survey on Task Scheduling Optimization Strategy under Multi-Cloud Environment

  • Open Access

    ARTICLE

    Improved Metaheuristic Based Failure Prediction with Migration Optimization in Cloud Environment

    K. Karthikeyan1,*, Liyakathunisa2, Eman Aljohani2, Thavavel Vaiyapuri3

    Computer Systems Science and Engineering, Vol.45, No.2, pp. 1641-1654, 2023, DOI:10.32604/csse.2023.031582

    Abstract Cloud data centers consume high volume of energy for processing and switching the servers among different modes. Virtual Machine (VM) migration enhances the performance of cloud servers in terms of energy efficiency, internal failures and availability. On the other end, energy utilization can be minimized by decreasing the number of active, underutilized sources which conversely reduces the dependability of the system. In VM migration process, the VMs are migrated from underutilized physical resources to other resources to minimize energy utilization and optimize the operations. In this view, the current study develops an Improved Metaheuristic Based Failure Prediction with Virtual Machine… More >

  • Open Access

    ARTICLE

    Optimal Bottleneck-Driven Deep Belief Network Enabled Malware Classification on IoT-Cloud Environment

    Mohammed Maray1, Hamed Alqahtani2, Saud S. Alotaibi3, Fatma S. Alrayes4, Nuha Alshuqayran5, Mrim M. Alnfiai6, Amal S. Mehanna7, Mesfer Al Duhayyim8,*

    CMC-Computers, Materials & Continua, Vol.74, No.2, pp. 3101-3115, 2023, DOI:10.32604/cmc.2023.032969

    Abstract Cloud Computing (CC) is the most promising and advanced technology to store data and offer online services in an effective manner. When such fast evolving technologies are used in the protection of computer-based systems from cyberattacks, it brings several advantages compared to conventional data protection methods. Some of the computer-based systems that effectively protect the data include Cyber-Physical Systems (CPS), Internet of Things (IoT), mobile devices, desktop and laptop computer, and critical systems. Malicious software (malware) is nothing but a type of software that targets the computer-based systems so as to launch cyber-attacks and threaten the integrity, secrecy, and accessibility… More >

  • Open Access

    ARTICLE

    Improvised Seagull Optimization Algorithm for Scheduling Tasks in Heterogeneous Cloud Environment

    Pradeep Krishnadoss*, Vijayakumar Kedalu Poornachary, Parkavi Krishnamoorthy, Leninisha Shanmugam

    CMC-Computers, Materials & Continua, Vol.74, No.2, pp. 2461-2478, 2023, DOI:10.32604/cmc.2023.031614

    Abstract Well organized datacentres with interconnected servers constitute the cloud computing infrastructure. User requests are submitted through an interface to these servers that provide service to them in an on-demand basis. The scientific applications that get executed at cloud by making use of the heterogeneous resources being allocated to them in a dynamic manner are grouped under NP hard problem category. Task scheduling in cloud poses numerous challenges impacting the cloud performance. If not handled properly, user satisfaction becomes questionable. More recently researchers had come up with meta-heuristic type of solutions for enriching the task scheduling activity in the cloud environment.… More >

  • Open Access

    ARTICLE

    Replication Strategy with Comprehensive Data Center Selection Method in Cloud Environments

    M. A. Fazlina, Rohaya Latip*, Hamidah Ibrahim, Azizol Abdullah

    CMC-Computers, Materials & Continua, Vol.74, No.1, pp. 415-433, 2023, DOI:10.32604/cmc.2023.020764

    Abstract As the amount of data continues to grow rapidly, the variety of data produced by applications is becoming more affluent than ever. Cloud computing is the best technology evolving today to provide multi-services for the mass and variety of data. The cloud computing features are capable of processing, managing, and storing all sorts of data. Although data is stored in many high-end nodes, either in the same data centers or across many data centers in cloud, performance issues are still inevitable. The cloud replication strategy is one of best solutions to address risk of performance degradation in the cloud environment.… More >

Displaying 11-20 on page 2 of 43. Per Page