Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (217)
  • Open Access

    ARTICLE

    A Novel Anonymous Authentication Scheme Based on Edge Computing in Internet of Vehicles

    Xiaoliang Wang1, Xinhui She1, Liang Bai2,*, Yang Qing1, Frank Jiang3

    CMC-Computers, Materials & Continua, Vol.67, No.3, pp. 3349-3361, 2021, DOI:10.32604/cmc.2021.012454

    Abstract The vehicular cloud computing is an emerging technology that changes vehicle communication and underlying traffic management applications. However, cloud computing has disadvantages such as high delay, low privacy and high communication cost, which can not meet the needs of real-time interactive information of Internet of vehicles. Ensuring security and privacy in Internet of Vehicles is also regarded as one of its most important challenges. Therefore, in order to ensure the user information security and improve the real-time of vehicle information interaction, this paper proposes an anonymous authentication scheme based on edge computing. In this scheme, the concept of edge computing… More >

  • Open Access

    ARTICLE

    A Trusted NUMFabric Algorithm for Congestion Price Calculation at the Internet-of-Things Datacenter

    Shan Chun1, Xiaolong Chen2, Guoqiang Deng3,*, Hao Liu4

    CMES-Computer Modeling in Engineering & Sciences, Vol.126, No.3, pp. 1203-1216, 2021, DOI:10.32604/cmes.2021.012230

    Abstract The important issues of network TCP congestion control are how to compute the link price according to the link status and regulate the data sending rate based on link congestion pricing feedback information. However, it is difficult to predict the congestion state of the link-end accurately at the source. In this paper, we presented an improved NUMFabric algorithm for calculating the overall congestion price. In the proposed scheme, the whole network structure had been obtained by the central control server in the Software Defined Network, and a kind of dual-hierarchy algorithm for calculating overall network congestion price had been demonstrated.… More >

  • Open Access

    ARTICLE

    A Data Security Framework for Cloud Computing Services

    Luis-Eduardo Bautista-Villalpando1,*, Alain Abran2

    Computer Systems Science and Engineering, Vol.37, No.2, pp. 203-218, 2021, DOI:10.32604/csse.2021.015437

    Abstract Cyberattacks are difficult to prevent because the targeted companies and organizations are often relying on new and fundamentally insecure cloud-based technologies, such as the Internet of Things. With increasing industry adoption and migration of traditional computing services to the cloud, one of the main challenges in cybersecurity is to provide mechanisms to secure these technologies. This work proposes a Data Security Framework for cloud computing services (CCS) that evaluates and improves CCS data security from a software engineering perspective by evaluating the levels of security within the cloud computing paradigm using engineering methods and techniques applied to CCS. This framework… More >

  • Open Access

    ARTICLE

    Safeguarding Cloud Computing Infrastructure: A Security Analysis

    Mamdouh Alenezi*

    Computer Systems Science and Engineering, Vol.37, No.2, pp. 159-167, 2021, DOI:10.32604/csse.2021.015282

    Abstract Cloud computing is the provision of hosted resources, comprising software, hardware and processing over the World Wide Web. The advantages of rapid deployment, versatility, low expenses and scalability have led to the widespread use of cloud computing across organizations of all sizes, mostly as a component of the combination/multi-cloud infrastructure structure. While cloud storage offers significant benefits as well as cost-effective alternatives for IT management and expansion, new opportunities and challenges in the context of security vulnerabilities are emerging in this domain. Cloud security, also recognized as cloud computing security, refers to a collection of policies, regulations, systematic processes that… More >

  • Open Access

    ARTICLE

    A Resource Management Algorithm for Virtual Machine Migration in Vehicular Cloud Computing

    Sohan Kumar Pande1, Sanjaya Kumar Panda2, Satyabrata Das1, Kshira Sagar Sahoo3, Ashish Kr. Luhach4, N. Z. Jhanjhi5,*, Roobaea Alroobaea6, Sivakumar Sivanesan5

    CMC-Computers, Materials & Continua, Vol.67, No.2, pp. 2647-2663, 2021, DOI:10.32604/cmc.2021.015026

    Abstract In recent years, vehicular cloud computing (VCC) has gained vast attention for providing a variety of services by creating virtual machines (VMs). These VMs use the resources that are present in modern smart vehicles. Many studies reported that some of these VMs hosted on the vehicles are overloaded, whereas others are underloaded. As a circumstance, the energy consumption of overloaded vehicles is drastically increased. On the other hand, underloaded vehicles are also drawing considerable energy in the underutilized situation. Therefore, minimizing the energy consumption of the VMs that are hosted by both overloaded and underloaded is a challenging issue in… More >

  • Open Access

    REVIEW

    A Review of Dynamic Resource Management in Cloud Computing Environments

    Mohammad Aldossary*

    Computer Systems Science and Engineering, Vol.36, No.3, pp. 461-476, 2021, DOI:10.32604/csse.2021.014975

    Abstract In a cloud environment, Virtual Machines (VMs) consolidation and resource provisioning are used to address the issues of workload fluctuations. VM consolidation aims to move the VMs from one host to another in order to reduce the number of active hosts and save power. Whereas resource provisioning attempts to provide additional resource capacity to the VMs as needed in order to meet Quality of Service (QoS) requirements. However, these techniques have a set of limitations in terms of the additional costs related to migration and scaling time, and energy overhead that need further consideration. Therefore, this paper presents a comprehensive… More >

  • Open Access

    ARTICLE

    Live Data Analytics with IoT Intelligence-Sensing System in Public Transportation for COVID-19 Pandemic

    Abdullah Alamri1,*, Sultan Alamri2

    Intelligent Automation & Soft Computing, Vol.27, No.2, pp. 441-452, 2021, DOI:10.32604/iasc.2021.015198

    Abstract The COVID-19 pandemic has presented an unprecedented challenge to the entire world. It is a humanitarian crisis on a global scale. The virus continues to spread throughout nations, putting health systems under enormous pressure in the battle to save lives. With this growing crisis, companies and researchers worldwide are searching for ways to overcome the challenges associated with this virus. Also, the transport sector will play a critical role in revitalizing economies while simultaneously containing the spread of COVID-19. As the virus is still circulating, the only solution is to redesign public transportation to make people feel safe. In this… More >

  • Open Access

    ARTICLE

    Secure Cloud Data Storage System Using Hybrid Paillier–Blowfish Algorithm

    Bijeta Seth1, Surjeet Dalal1, Dac-Nhuong Le2,3,*, Vivek Jaglan4, Neeraj Dahiya1, Akshat Agrawal5, Mayank Mohan Sharma6, Deo Prakash7, K. D. Verma8

    CMC-Computers, Materials & Continua, Vol.67, No.1, pp. 779-798, 2021, DOI:10.32604/cmc.2021.014466

    Abstract Cloud computing utilizes enormous clusters of serviceable and manageable resources that can be virtually and dynamically reconfigured in order to deliver optimum resource utilization by exploiting the pay-per-use model. However, concerns around security have been an impediment in the extensive adoption of the cloud computing model. In this regard, advancements in cryptography, accelerated by the wide usage of the internet worldwide, has emerged as a key area in addressing some of these security concerns. In this document, a hybrid cryptographic protocol deploying Blowfish and Paillier encryption algorithms has been presented and its strength compared with the existing hybrid Advanced Encryption… More >

  • Open Access

    ARTICLE

    Security Requirement Management for Cloud-Assisted and Internet of Things—Enabled Smart City

    Muhammad Usman Tariq1, Muhammad Babar2, Mian Ahmad Jan3,4,5,*, Akmal Saeed Khattak6, Mohammad Dahman Alshehri7, Abid Yahya8

    CMC-Computers, Materials & Continua, Vol.67, No.1, pp. 625-639, 2021, DOI:10.32604/cmc.2021.014165

    Abstract The world is rapidly changing with the advance of information technology. The expansion of the Internet of Things (IoT) is a huge step in the development of the smart city. The IoT consists of connected devices that transfer information. The IoT architecture permits on-demand services to a public pool of resources. Cloud computing plays a vital role in developing IoT-enabled smart applications. The integration of cloud computing enhances the offering of distributed resources in the smart city. Improper management of security requirements of cloud-assisted IoT systems can bring about risks to availability, security, performance, confidentiality, and privacy. The key reason… More >

  • Open Access

    ARTICLE

    Intelligent Cloud Based Load Balancing System Empowered with Fuzzy Logic

    Atif Ishaq Khan1, Syed Asad Raza Kazmi1, Ayesha Atta1,*, Muhammad Faheem Mushtaq2, Muhammad Idrees3, Ilyas Fakir1, Muhammad Safyan1, Muhammad Adnan Khan4, Awais Qasim1

    CMC-Computers, Materials & Continua, Vol.67, No.1, pp. 519-528, 2021, DOI:10.32604/cmc.2021.013865

    Abstract Cloud computing is seeking attention as a new computing paradigm to handle operations more efficiently and cost-effectively. Cloud computing uses dynamic resource provisioning and de-provisioning in a virtualized environment. The load on the cloud data centers is growing day by day due to the rapid growth in cloud computing demand. Elasticity in cloud computing is one of the fundamental properties, and elastic load balancing automatically distributes incoming load to multiple virtual machines. This work is aimed to introduce efficient resource provisioning and de-provisioning for better load balancing. In this article, a model is proposed in which the fuzzy logic approach… More >

Displaying 161-170 on page 17 of 217. Per Page