Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (217)
  • Open Access

    ARTICLE

    Building an Open Cloud Virtual Dataspace Model for Materials Scientific Data

    Yang Li1, Jianjiang Li1, Peng Shi2, Xiaoning Qin3

    Intelligent Automation & Soft Computing, Vol.25, No.3, pp. 615-624, 2019, DOI:10.31209/2019.100000116

    Abstract The applications to process large amounts of materials scientific data at different scales, have been placed the field of materials science on the verge of a revolution. This domain faces serious challenges, including diversity of format of scientific data, and missing unified platform for sharing. A Virtual DataSpace model and the evolution model is introduced to organize heterogeneous data according to the user requirements and track the variations of data. The open cloud model is embedded in a materials scientific data sharing platform in our experiments to verify its effectiveness. The results show the model has made efforts making more… More >

  • Open Access

    ARTICLE

    Virtual Machine Based on Genetic Algorithm Used in Time and Power Oriented Cloud Computing Task Scheduling

    Tongmao Ma1,2, Shanchen Pang1, Weiguang Zhang1, Shaohua Hao1

    Intelligent Automation & Soft Computing, Vol.25, No.3, pp. 605-613, 2019, DOI:10.31209/2019.100000115

    Abstract In cloud computing, task scheduling is a challenging problem in cloud data center, and there are many different kinds of task scheduling strategies. A good scheduling strategy can bring good effectiveness, where plenty of parameters should be regulated to achieve acceptable performance of cloud computing platform. In this work, combined elitist strategy, three parameters values oriented genetic algorithms are proposed. Specifically, a model built by Generalized Stochastic Petri Nets (GSPN) is introduced to describe the process of scheduling in cloud datacenter, and then the workflow of the algorithms is showed. After that, the effectiveness of the algorithms is found to… More >

  • Open Access

    ARTICLE

    Intelligent Cloud Based Heart Disease Prediction System Empowered with Supervised Machine Learning

    Muhammad Adnan Khan1, *, Sagheer Abbas2, Ayesha Atta2, 3, Allah Ditta4, Hani Alquhayz5, Muhammad Farhan Khan6, Atta-ur-Rahman7, Rizwan Ali Naqvi8

    CMC-Computers, Materials & Continua, Vol.65, No.1, pp. 139-151, 2020, DOI:10.32604/cmc.2020.011416

    Abstract The innovation in technologies related to health facilities today is increasingly helping to manage patients with different diseases. The most fatal of these is the issue of heart disease that cannot be detected from a naked eye, and attacks as soon as the human exceeds the allowed range of vital signs like pulse rate, body temperature, and blood pressure. The real challenge is to diagnose patients with more diagnostic accuracy and in a timely manner, followed by prescribing appropriate treatments and keeping prescription errors to a minimum. In developing countries, the domain of healthcare is progressing day by day using… More >

  • Open Access

    ARTICLE

    Privacy-Preserving Genetic Algorithm Outsourcing in Cloud Computing

    Leqi Jiang1, 2, Zhangjie Fu1, 2, *

    Journal of Cyber Security, Vol.2, No.1, pp. 49-61, 2020, DOI:10.32604/jcs.2020.09308

    Abstract Genetic Algorithm (GA) has been widely used to solve various optimization problems. As the solving process of GA requires large storage and computing resources, it is well motivated to outsource the solving process of GA to the cloud server. However, the algorithm user would never want his data to be disclosed to cloud server. Thus, it is necessary for the user to encrypt the data before transmitting them to the server. But the user will encounter a new problem. The arithmetic operations we are familiar with cannot work directly in the ciphertext domain. In this paper, a privacy-preserving outsourced genetic… More >

  • Open Access

    ARTICLE

    Searchable Encryption with Access Control on Keywords in Multi-User Setting

    Lei Li1, Chungen Xu1, *, Xiaoling Yu1, Bennian Dou1, Cong Zuo2

    Journal of Cyber Security, Vol.2, No.1, pp. 9-23, 2020, DOI:10.32604/jcs.2020.06313

    Abstract Searchable encryption technology makes it convenient to search encrypted data with keywords for people. A data owner shared his data with other users on the cloud server. For security, it is necessary for him to build a fine-grained and flexible access control mechanism. The main idea of this paper is to let the owner classify his data and then authorizes others according to categories. The cloud server maintains a permission matrix, which will be used to verify whether a trapdoor is valid or not. In this way we can achieve access control and narrow the search range at the same… More >

  • Open Access

    ARTICLE

    A Multi-Tenant Usage Access Model for Cloud Computing

    Zhengtao Liu1, *, Yun Yang1, Wen Gu1, Jinyue Xia2

    CMC-Computers, Materials & Continua, Vol.64, No.2, pp. 1233-1245, 2020, DOI:10.32604/cmc.2020.010846

    Abstract Most cloud services are built with multi-tenancy which enables data and configuration segregation upon shared infrastructures. It offers tremendous advantages for enterprises and service providers. It is anticipated that this situation will evolve to foster cross-tenant collaboration supported by Authorization as a service. To realize access control in a multi-tenant cloud computing environment, this study proposes a multi-tenant cloud computing access control model based on the traditional usage access control model by building trust relations among tenants. The model consists of three submodels, which achieve trust relationships between tenants with different granularities and satisfy the requirements of different application scenarios.… More >

  • Open Access

    ARTICLE

    Cipherchain: A Secure and Efficient Ciphertext Blockchain via mPECK

    Hailin Chen1, Gang Xu3, Yuling Chen2, Xiubo Chen1, 2, *, Yixian Yang1, 2, Ruibin Fan4, Kaixiang Zhang4, Huizhong Li4

    Journal of Quantum Computing, Vol.2, No.1, pp. 57-83, 2020, DOI:10.32604/jqc.2020.09291

    Abstract Most existing blockchain schemes are based on the design concept “openness and transparency” to realize data security, which usually require transaction data to be presented in the form of plaintext. However, it inevitably brings the issues with respect to data privacy and operating performance. In this paper, we proposed a novel blockchain scheme called Cipherchain, which can process and maintain transaction data in the form of ciphertext while the characteristics of immutability and auditability are guaranteed. Specifically in our scheme, transactions can be encrypted locally based on a searchable encryption scheme called multi-user public key encryption with conjunctive keyword search… More >

  • Open Access

    ARTICLE

    Efficient Hierarchical Multi-Server Authentication Protocol for Mobile Cloud Computing

    Jiangheng Kou1, Mingxing He1, *, Ling Xiong1, Zihang Ge2, Guangmin Xie1

    CMC-Computers, Materials & Continua, Vol.64, No.1, pp. 297-312, 2020, DOI:10.32604/cmc.2020.09758

    Abstract With the development of communication technologies, various mobile devices and different types of mobile services became available. The emergence of these services has brought great convenience to our lives. The multi-server architecture authentication protocols for mobile cloud computing were proposed to ensure the security and availability between mobile devices and mobile services. However, most of the protocols did not consider the case of hierarchical authentication. In the existing protocol, when a mobile user once registered at the registration center, he/she can successfully authenticate with all mobile service providers that are registered at the registration center, but real application scenarios are… More >

  • Open Access

    ARTICLE

    Toward a More Accurate Web Service Selection Using Modified Interval DEA Models with Undesirable Outputs

    Alireza Poordavoodi1, Mohammad Reza Moazami Goudarzi2,*, Hamid Haj Seyyed Javadi3, Amir Masoud Rahmani4, Mohammad Izadikhah5

    CMES-Computer Modeling in Engineering & Sciences, Vol.123, No.2, pp. 525-570, 2020, DOI:10.32604/cmes.2020.08854

    Abstract With the growing number of Web services on the internet, there is a challenge to select the best Web service which can offer more quality-of-service (QoS) values at the lowest price. Another challenge is the uncertainty of QoS values over time due to the unpredictable nature of the internet. In this paper, we modify the interval data envelopment analysis (DEA) models [Wang, Greatbanks and Yang (2005)] for QoS-aware Web service selection considering the uncertainty of QoS attributes in the presence of desirable and undesirable factors. We conduct a set of experiments using a synthesized dataset to show the capabilities of… More >

  • Open Access

    ARTICLE

    An Efficient Ciphertext-Policy Attribute-Based Encryption Scheme with Policy Update

    Changji Wang1, *, Yuan Yuan2

    CMC-Computers, Materials & Continua, Vol.63, No.2, pp. 1031-1041, 2020, DOI:10.32604/cmc.2020.06278

    Abstract Ciphertext-policy attribute-based encryption (CP-ABE) is a promising cryptographic solution to the problem for enforcing fine-grained access control over encrypted data in the cloud. However, when applying CP-ABE to data outsourcing scenarios, we have to address the challenging issue of policy updates because access control elements, such as users, attributes, and access rules may change frequently. In this paper, we propose a notion of access policy updatable ciphertext-policy attribute-based encryption (APU-CP-ABE) by combining the idea of ciphertext-policy attribute-based key encapsulation and symmetric proxy re-encryption. When an access policy update occurs, data owner is no longer required to download any data for… More >

Displaying 191-200 on page 20 of 217. Per Page