Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (217)
  • Open Access

    ARTICLE

    A Temporal Multi-Tenant RBAC Model for Collaborative Cloud Services

    Zhengtao Liu1, *, Yi Ying1, Yaqin Peng1, Jinyue Xia2

    CMC-Computers, Materials & Continua, Vol.63, No.2, pp. 861-871, 2020, DOI:10.32604/cmc.2020.07142

    Abstract Multi-tenant collaboration brings the challenge to access control in cloud computing environment. Based on the multi-tenant role-based access control (MTRBAC) model, a Temporal MT-RBAC (TMT-RBAC) model for collaborative cloud services is proposed. It adds the time constraint between trusted tenants, including usable role time constraint based on both calendar and interval time. Analysis shows that the new model strengthens the presentation ability of MT-RBAC model, achieves the finergrained access control, reduces the management costs and enhances the security of multitenant collaboration in cloud computing environment. More >

  • Open Access

    ARTICLE

    An Encrypted Image Retrieval Method Based on SimHash in Cloud Computing

    Jiaohua Qin1, Yusi Cao1, Xuyu Xiang1, *, Yun Tan1, Lingyun Xiang2, Jianjun Zhang3

    CMC-Computers, Materials & Continua, Vol.63, No.1, pp. 389-399, 2020, DOI:10.32604/cmc.2020.07819

    Abstract With the massive growth of images data and the rise of cloud computing that can provide cheap storage space and convenient access, more and more users store data in cloud server. However, how to quickly query the expected data with privacy-preserving is still a challenging in the encryption image data retrieval. Towards this goal, this paper proposes a ciphertext image retrieval method based on SimHash in cloud computing. Firstly, we extract local feature of images, and then cluster the features by K-means. Based on it, the visual word codebook is introduced to represent feature information of images, which hashes the… More >

  • Open Access

    ARTICLE

    A Mobile Cloud-Based eHealth Scheme

    Yihe Liu1, Aaqif Afzaal Abbasi2, Atefeh Aghaei3, Almas Abbasi4, Amir Mosavi5, 6, 7, Shahaboddin Shamshirband8, 9, *, Mohammed A. A. Al-qaness10

    CMC-Computers, Materials & Continua, Vol.63, No.1, pp. 31-39, 2020, DOI:10.32604/cmc.2020.07708

    Abstract Mobile cloud computing is an emerging field that is gaining popularity across borders at a rapid pace. Similarly, the field of health informatics is also considered as an extremely important field. This work observes the collaboration between these two fields to solve the traditional problem of extracting Electrocardiogram signals from trace reports and then performing analysis. The developed system has two front ends, the first dedicated for the user to perform the photographing of the trace report. Once the photographing is complete, mobile computing is used to extract the signal. Once the signal is extracted, it is uploaded into the… More >

  • Open Access

    ARTICLE

    Mobile Internet Mobile Agent System Dynamic Trust Model for Cloud Computing

    Weijin Jiang1, 2, 3, Yang Wang1,*, Yirong Jiang4,*, Yuhui Xu1, Jiahui Chen1, Lina Tan1, Guo Liang5

    CMC-Computers, Materials & Continua, Vol.62, No.1, pp. 123-136, 2020, DOI:10.32604/cmc.2020.05933

    Abstract In mobile cloud computing, trust is a very important parameter in mobile cloud computing security because data storage and data processing are performed remotely in the cloud. Aiming at the security and trust management of mobile agent system in mobile cloud computing environment, the Human Trust Mechanism (HTM) is used to study the subjective trust formation, trust propagation and trust evolution law, and the subjective trust dynamic management algorithm (MASTM) is proposed. Based on the interaction experience between the mobile agent and the execution host and the third-party recommendation information to collect the basic trust data, the public trust host… More >

  • Open Access

    ARTICLE

    Pipeline Defect Detection Cloud System Using Role Encryption and Hybrid Information

    Ce Li1,2,*, Xinyu Shang2, Liguo Zhang3,4, Feng Yang1,2, Jing Zheng1,5, Xianlei Xu1

    CMC-Computers, Materials & Continua, Vol.61, No.3, pp. 1245-1260, 2019, DOI:10.32604/cmc.2019.06159

    Abstract Pipeline defect detection systems collect the videos from cameras of pipeline robots, however the systems always analyzed these videos by offline systems or humans to detect the defects of potential security threats. The existing systems tend to reach the limit in terms of data access anywhere, access security and video processing on cloud. There is in need of studying on a pipeline defect detection cloud system for automatic pipeline inspection. In this paper, we deploy the framework of a cloud based pipeline defect detection system, including the user management module, pipeline robot control module, system service module, and defect detection… More >

  • Open Access

    ARTICLE

    XML-Based Information Fusion Architecture Based on Cloud Computing Ecosystem

    I-Ching Hsu1,*

    CMC-Computers, Materials & Continua, Vol.61, No.3, pp. 929-950, 2019, DOI:10.32604/cmc.2019.07876

    Abstract Considering cloud computing from an organizational and end user computing point of view, it is a new paradigm for deploying, managing and offering services through a shared infrastructure. Current development of cloud computing applications, however, are the lack of a uniformly approach to cope with the heterogeneous information fusion. This leads cloud computing to inefficient development and a low potential reuse. This study addresses these issues to propose a novel Web 2.0 Mashups as a Service, called WMaaS, which is a fundamental cloud service model. The WMaaS is developed based on a XML-based Mashups Architecture (XMA) that is composed of… More >

  • Open Access

    ARTICLE

    Efficient Computation Offloading in Mobile Cloud Computing for Video Streaming Over 5G

    Bokyun Jo1, Md. Jalil Piran2,*, Daeho Lee3, Doug Young Suh4,*

    CMC-Computers, Materials & Continua, Vol.61, No.2, pp. 439-463, 2019, DOI:10.32604/cmc.2019.08194

    Abstract In this paper, we investigate video quality enhancement using computation offloading to the mobile cloud computing (MCC) environment. Our objective is to reduce the computational complexity required to covert a low-resolution video to high-resolution video while minimizing computation at the mobile client and additional communication costs. To do so, we propose an energy-efficient computation offloading framework for video streaming services in a MCC over the fifth generation (5G) cellular networks. In the proposed framework, the mobile client offloads the computational burden for the video enhancement to the cloud, which renders the side information needed to enhance video without requiring much… More >

  • Open Access

    ARTICLE

    Underground Disease Detection Based on Cloud Computing and Attention Region Neural Network

    Pinjie Xu2, Ce Li1,2,*, Liguo Zhang3,4, Feng Yang1,2, Jing Zheng1,5, Jingwu Feng2

    Journal on Artificial Intelligence, Vol.1, No.1, pp. 9-18, 2019, DOI:10.32604/jai.2019.06157

    Abstract Detecting the underground disease is very crucial for the roadbed health monitoring and maintenance of transport facilities, since it is very closely related to the structural health and reliability with the rapid development of road traffic. Ground penetrating radar (GPR) is widely used to detect road and underground diseases. However, it is still a challenging task due to data access anywhere, transmission security and data processing on cloud. Cloud computing can provide scalable and powerful technologies for large-scale storage, processing and dissemination of GPR data. Combined with cloud computing and radar detection technology, it is possible to locate the underground… More >

  • Open Access

    ARTICLE

    Review of Access Control Model

    Zhengtao Liu1,*, Wen Gu1, Jinyue Xia2

    Journal of Cyber Security, Vol.1, No.1, pp. 43-50, 2019, DOI:10.32604/jcs.2019.06070

    Abstract Access control is one of the core problems in data management system. In this paper, the system requirements were described in three aspects: the traditional access control model, the access control model in the Internet era and the access control model in the cloud computing environment. Meanwhile, the corresponding major models were listed and their characteristics and problems were analyzed. Finally, the development trend of the corresponding model was proposed. More >

  • Open Access

    ARTICLE

    A Cross-Tenant RBAC Model for Collaborative Cloud Services

    Zhengtao Liu1,*, Jinyue Xia2

    CMC-Computers, Materials & Continua, Vol.60, No.1, pp. 395-408, 2019, DOI:10.32604/cmc.2019.05627

    Abstract Tenants in the cloud computing environment share various services, including storage, network, computing, and applications. For better use of services in the cloud computing environment, tenants collaborate in tasks, resulting in challenges to the traditional access control. This study proposes a cross-tenant role-based access control (CT-RBAC) model for collaborative cloud services. This model covers the CT-RBAC0, CT-RBAC1, CT-RBAC2, and CT-RBAC3 models. The model not only extends the RBAC model in the multi-tenant cloud computing mode but also includes four types of authorization modes among tenants. Consequently, the role inheritance constraint is increased, and fine-grained authorization access among trusted tenants is… More >

Displaying 201-210 on page 21 of 217. Per Page