Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (217)
  • Open Access

    ARTICLE

    An Effective Non-Commutative Encryption Approach with Optimized Genetic Algorithm for Ensuring Data Protection in Cloud Computing

    S. Jerald Nirmal Kumar1,*, S. Ravimaran2, M. M. Gowthul Alam3

    CMES-Computer Modeling in Engineering & Sciences, Vol.125, No.2, pp. 671-697, 2020, DOI:10.32604/cmes.2020.09361

    Abstract Nowadays, succeeding safe communication and protection-sensitive data from unauthorized access above public networks are the main worries in cloud servers. Hence, to secure both data and keys ensuring secured data storage and access, our proposed work designs a Novel Quantum Key Distribution (QKD) relying upon a non-commutative encryption framework. It makes use of a Novel Quantum Key Distribution approach, which guarantees high level secured data transmission. Along with this, a shared secret is generated using Diffie Hellman (DH) to certify secured key generation at reduced time complexity. Moreover, a non-commutative approach is used, which effectively allows the users to store… More >

  • Open Access

    ARTICLE

    Information Flow Security Models for Cloud Computing

    Congdong Lv1, *, Ji Zhang2, Zhoubao Sun1, Gang Qian1

    CMC-Computers, Materials & Continua, Vol.65, No.3, pp. 2687-2705, 2020, DOI:10.32604/cmc.2020.011232

    Abstract Cloud computing provides services to users through Internet. This open mode not only facilitates the access by users, but also brings potential security risks. In cloud computing, the risk of data leakage exists between users and virtual machines. Whether direct or indirect data leakage, it can be regarded as illegal information flow. Methods, such as access control models can control the information flow, but not the covert information flow. Therefore, it needs to use the noninterference models to detect the existence of illegal information flow in cloud computing architecture. Typical noninterference models are not suitable to certificate information flow in… More >

  • Open Access

    ARTICLE

    Heuristic and Bent Key Exchange Secured Energy Efficient Data Transaction for Traffic Offloading in Mobile Cloud

    Nithya Rekha Sivakumar1, *, Sara Ghorashi1, Mona Jamjoom1, Mai Alduailij1

    CMC-Computers, Materials & Continua, Vol.65, No.3, pp. 1925-1943, 2020, DOI:10.32604/cmc.2020.011505

    Abstract In today’s world, smart phones offer various applications namely face detection, augmented-reality, image and video processing, video gaming and speech recognition. With the increasing demand for computing resources, these applications become more complicated. Cloud Computing (CC) environment provides access to unlimited resource pool with several features, including on demand self-service, elasticity, wide network access, resource pooling, low cost, and ease of use. Mobile Cloud Computing (MCC) aimed at overcoming drawbacks of smart phone devices. The task remains in combining CC technology to the mobile devices with improved battery life and therefore resulting in significant performance. For remote execution, recent studies… More >

  • Open Access

    ARTICLE

    Image Feature Computation in Encrypted Domain Based on Mean Value

    Xiangshu Ou1, Mingfang Jiang2,*, Shuai Li1, Yao Bai1

    Journal of Cyber Security, Vol.2, No.3, pp. 123-130, 2020, DOI:10.32604/jcs.2020.09703

    Abstract In smart environments, more and more teaching data sources are uploaded to remote cloud centers which promote the development of the smart campus. The outsourcing of massive teaching data can reduce storage burden and computational cost, but causes some privacy concerns because those teaching data (especially personal image data) may contain personal private information. In this paper, a privacy-preserving image feature extraction algorithm is proposed by using mean value features. Clients use block scrambling and chaotic map to encrypt original images before uploading to the remote servers. Cloud servers can directly extract image mean value features from encrypted images. Experiments… More >

  • Open Access

    ARTICLE

    The Implementation of an English Word Learning System Feedback System and Smartphone App

    Ye Zhang

    Computer Systems Science and Engineering, Vol.35, No.3, pp. 207-214, 2020, DOI:10.32604/csse.2020.35.207

    Abstract Considering the issue of Chinese college students that are not interested in learning English and have a lack of enthusiasm for learning overall, a feedback and motivation application based on cloud computing to teach English vocabulary to Chinese college students has been developed. The mobile application can collect and analyze the problems that users encounter in the process of learning English through the cloud server in real-time, and advise on how to resolve these problems. The feedback system also allows users to access this data. In the case of uploading to designated teachers, teachers can adjust their teaching methods and… More >

  • Open Access

    ARTICLE

    Japanese Teaching Quality Satisfaction Analysis with Improved Apriori Algorithms under Cloud Computing Platform

    Lini Cai

    Computer Systems Science and Engineering, Vol.35, No.3, pp. 183-189, 2020, DOI:10.32604/csse.2020.35.183

    Abstract In this paper, we use modern education concept and satisfaction theory to study the construction of a system used to evaluate Japanese teaching quality based on a satisfaction model. We use a cloud computing platform to mine the rules of Japanese teaching quality satisfaction by using an improved Apriori algorithm to explore the impact of measurement indicators of teaching objectives, processes and results on overall satisfaction with Japanese teaching practices, so as to improve Japanese teaching in the future. Scientific decision-making, improvement of teaching practices, transformation and innovation of students’ learning methods provide data reference and theoretical support. More >

  • Open Access

    ARTICLE

    Resource Management in Cloud Computing with Optimal Pricing Policies

    Haiyang Zhang1, Guolong Chen2, Xianwei Li2,3,*

    Computer Systems Science and Engineering, Vol.34, No.4, pp. 249-254, 2019, DOI:10.32604/csse.2019.34.249

    Abstract As a new computing paradigm, cloud computing has received much attention from research and economics fields in recent years. Cloud resources can be priced according to several pricing options in cloud markets. Usage-based and reserved pricing schemes are commonly adopted by leading cloud service providers (CSPs) such as Amazon and Google. With more and more CSPs entering cloud computing markets, the pricing of cloud resources is an important issue that they need to consider. In this paper, we study how to segment cloud resources using hybrid pricing schemes in order to obtain the maximum revenue by means of optimal pricing… More >

  • Open Access

    ARTICLE

    Dynamic Horizontal and Vertical Scaling for Multi-tier Web Applications

    Abid Nisar1, Waheed Iqbal1,*, Fawaz Bokhari1, Faisal Bukhari1, Khaled Almustafa2

    Intelligent Automation & Soft Computing, Vol.26, No.2, pp. 353-365, 2020, DOI:10.31209/2019.100000159

    Abstract The adaptive resource provisioning of cloud-hosted applications is enabled to provide a better quality of services to the users of applications. Most of the cloud-hosted applications follow the multi-tier architecture model. However, it is challenging to adaptively provision the resources of multi-tier applications. In this paper, we propose an auto-scaling method to dynamically scale resources for multi-tier web applications. The proposed method exploits the horizontal scaling at the web server tier and vertical scaling at the database tier dynamically to maintain response time guarantees. We evaluated our proposed method on Amazon Web Services using a real web application. The extensive… More >

  • Open Access

    ARTICLE

    A Middleware for Polyglot Persistence and Data Portability of Big Data PaaS Cloud Applications

    Kiranbir Kaur1, *, Sandeep Sharma1, Karanjeet Singh Kahlon2

    CMC-Computers, Materials & Continua, Vol.65, No.2, pp. 1625-1647, 2020, DOI:10.32604/cmc.2020.011535

    Abstract Vendor lock-in can occur at any layer of the cloud stack-Infrastructure, Platform, and Software-as-a-service. This paper covers the vendor lock-in issue at Platform as a Service (PaaS) level where applications can be created, deployed, and managed without worrying about the underlying infrastructure. These applications and their persisted data on one PaaS provider are not easy to port to another provider. To overcome this issue, we propose a middleware to abstract and make the database services as cloud-agnostic. The middleware supports several SQL and NoSQL data stores that can be hosted and ported among disparate PaaS providers. It facilitates the developers… More >

  • Open Access

    ARTICLE

    Recent Advances in Mobile Grid and Cloud Computing

    Sayed Chhattan Shah

    Intelligent Automation & Soft Computing, Vol.24, No.2, pp. 285-298, 2018, DOI:10.1080/10798587.2017.1280995

    Abstract Grid and cloud computing systems have been extensively used to solve large and complex problems in science and engineering fields. These systems include powerful computing resources that are connected through high-speed networks. Due to the recent advances in mobile computing and networking technologies, it has become feasible to integrate various mobile devices, such as robots, aerial vehicles, sensors, and smart phones, with grid and cloud computing systems. This integration enables the design and development of the next generation of applications by sharing of resources in mobile environments and introduces several challenges due to a dynamic and unpredictable network. This paper… More >

Displaying 181-190 on page 19 of 217. Per Page