Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (466)
  • Open Access

    ARTICLE

    Research on Trust Model in Container-Based Cloud Service

    Xiaolan Xie1,2, Tianwei Yuan1,*, Xiao Zhou3, Xiaochun Cheng4

    CMC-Computers, Materials & Continua, Vol.56, No.2, pp. 273-283, 2018, DOI:10.3970/cmc.2018.03587

    Abstract Container virtual technology aims to provide program independence and resource sharing. The container enables flexible cloud service. Compared with traditional virtualization, traditional virtual machines have difficulty in resource and expense requirements. The container technology has the advantages of smaller size, faster migration, lower resource overhead, and higher utilization. Within container-based cloud environment, services can adopt multi-target nodes. This paper reports research results to improve the traditional trust model with consideration of cooperation effects. Cooperation trust means that in a container-based cloud environment, services can be divided into multiple containers for different container nodes. When multiple More >

  • Open Access

    ARTICLE

    A Proxy Re-Encryption with Keyword Search Scheme in Cloud Computing

    Yongli Tang1, Huanhuan Lian1, Zemao Zhao2, Xixi Yan1,*

    CMC-Computers, Materials & Continua, Vol.56, No.2, pp. 339-352, 2018, DOI:10.3970/cmc.2018.02965

    Abstract With the widespread use of cloud computing technology, more and more users and enterprises decide to store their data in a cloud server by outsourcing. However, these huge amounts of data may contain personal privacy, business secrets and other sensitive information of the users and enterprises. Thus, at present, how to protect, retrieve, and legally use the sensitive information while preventing illegal accesses are security challenges of data storage in the cloud environment. A new proxy re-encryption with keyword search scheme is proposed in this paper in order to solve the problem of the low… More >

  • Open Access

    ARTICLE

    On the Privacy-Preserving Outsourcing Scheme of Reversible Data Hiding over Encrypted Image Data in Cloud Computing

    Lizhi Xiong1,*, Yunqing Shi2

    CMC-Computers, Materials & Continua, Vol.55, No.3, pp. 523-539, 2018, DOI:10.3970/cmc.2018.01791

    Abstract Advanced cloud computing technology provides cost saving and flexibility of services for users. With the explosion of multimedia data, more and more data owners would outsource their personal multimedia data on the cloud. In the meantime, some computationally expensive tasks are also undertaken by cloud servers. However, the outsourced multimedia data and its applications may reveal the data owner’s private information because the data owners lose the control of their data. Recently, this thought has aroused new research interest on privacy-preserving reversible data hiding over outsourced multimedia data. In this paper, two reversible data hiding… More >

  • Open Access

    ARTICLE

    Verifiable Diversity Ranking Search Over Encrypted Outsourced Data

    Yuling Liu1,*, Hua Peng1, Jie Wang2

    CMC-Computers, Materials & Continua, Vol.55, No.1, pp. 37-57, 2018, DOI:10.3970/cmc.2018.055.037

    Abstract Data outsourcing has become an important application of cloud computing. Driven by the growing security demands of data outsourcing applications, sensitive data have to be encrypted before outsourcing. Therefore, how to properly encrypt data in a way that the encrypted and remotely stored data can still be queried has become a challenging issue. Searchable encryption scheme is proposed to allow users to search over encrypted data. However, most searchable encryption schemes do not consider search result diversification, resulting in information redundancy. In this paper, a verifiable diversity ranking search scheme over encrypted outsourced data is More >

  • Open Access

    ABSTRACT

    High Performance Optimization of Civil Infrastructure Systems on Cloud

    Zheng Yi Wu

    The International Conference on Computational & Experimental Engineering and Sciences, Vol.20, No.2, pp. 60-62, 2011, DOI:10.3970/icces.2011.020.060

    Abstract Infrastructure system analysis is a computation-intensive task. Equipped with the software tools, engineers are able to analyze a handful of alternative solutions, but often end up with a workable alternative far from the optimized solution. Effectively optimizing an infrastructure system is a challenging task. Undertaking such a task requires not only well-developed optimization software tools, but also powerful computing facilities. Therefore, infrastructure system optimization is highly desirable to be conducted on cloud.
    Infrastructure system optimization is usually an implicit and nonlinear programming problem. The problem has to be carefully formulated in the way that classic mathematic… More >

  • Open Access

    ARTICLE

    The Reproducing Kernel DMS-FEM: 3D Shape Functions and Applications to Linear Solid Mechanics

    Sunilkumar N1, D Roy1,2

    CMES-Computer Modeling in Engineering & Sciences, Vol.66, No.3, pp. 249-284, 2010, DOI:10.3970/cmes.2010.066.249

    Abstract We propose a family of 3D versions of a smooth finite element method (Sunilkumar and Roy 2010), wherein the globally smooth shape functions are derivable through the condition of polynomial reproduction with the tetrahedral B-splines (DMS-splines) or tensor-product forms of triangular B-splines and 1D NURBS bases acting as the kernel functions. While the domain decomposition is accomplished through tetrahedral or triangular prism elements, an additional requirement here is an appropriate generation of knotclouds around the element vertices or corners. The possibility of sensitive dependence of numerical solutions to the placements of knotclouds is largely arrested… More >

Displaying 461-470 on page 47 of 466. Per Page