Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (5)
  • Open Access

    ARTICLE

    Privacy-Preserving Genetic Algorithm Outsourcing in Cloud Computing

    Leqi Jiang1, 2, Zhangjie Fu1, 2, *

    Journal of Cyber Security, Vol.2, No.1, pp. 49-61, 2020, DOI:10.32604/jcs.2020.09308

    Abstract Genetic Algorithm (GA) has been widely used to solve various optimization problems. As the solving process of GA requires large storage and computing resources, it is well motivated to outsource the solving process of GA to the cloud server. However, the algorithm user would never want his data to be disclosed to cloud server. Thus, it is necessary for the user to encrypt the data before transmitting them to the server. But the user will encounter a new problem. The arithmetic operations we are familiar with cannot work directly in the ciphertext domain. In this paper, a privacy-preserving outsourced genetic… More >

  • Open Access

    ARTICLE

    A Multi-Tenant Usage Access Model for Cloud Computing

    Zhengtao Liu1, *, Yun Yang1, Wen Gu1, Jinyue Xia2

    CMC-Computers, Materials & Continua, Vol.64, No.2, pp. 1233-1245, 2020, DOI:10.32604/cmc.2020.010846

    Abstract Most cloud services are built with multi-tenancy which enables data and configuration segregation upon shared infrastructures. It offers tremendous advantages for enterprises and service providers. It is anticipated that this situation will evolve to foster cross-tenant collaboration supported by Authorization as a service. To realize access control in a multi-tenant cloud computing environment, this study proposes a multi-tenant cloud computing access control model based on the traditional usage access control model by building trust relations among tenants. The model consists of three submodels, which achieve trust relationships between tenants with different granularities and satisfy the requirements of different application scenarios.… More >

  • Open Access

    ARTICLE

    Efficient Hierarchical Multi-Server Authentication Protocol for Mobile Cloud Computing

    Jiangheng Kou1, Mingxing He1, *, Ling Xiong1, Zihang Ge2, Guangmin Xie1

    CMC-Computers, Materials & Continua, Vol.64, No.1, pp. 297-312, 2020, DOI:10.32604/cmc.2020.09758

    Abstract With the development of communication technologies, various mobile devices and different types of mobile services became available. The emergence of these services has brought great convenience to our lives. The multi-server architecture authentication protocols for mobile cloud computing were proposed to ensure the security and availability between mobile devices and mobile services. However, most of the protocols did not consider the case of hierarchical authentication. In the existing protocol, when a mobile user once registered at the registration center, he/she can successfully authenticate with all mobile service providers that are registered at the registration center, but real application scenarios are… More >

  • Open Access

    ARTICLE

    An Efficient Ciphertext-Policy Attribute-Based Encryption Scheme with Policy Update

    Changji Wang1, *, Yuan Yuan2

    CMC-Computers, Materials & Continua, Vol.63, No.2, pp. 1031-1041, 2020, DOI:10.32604/cmc.2020.06278

    Abstract Ciphertext-policy attribute-based encryption (CP-ABE) is a promising cryptographic solution to the problem for enforcing fine-grained access control over encrypted data in the cloud. However, when applying CP-ABE to data outsourcing scenarios, we have to address the challenging issue of policy updates because access control elements, such as users, attributes, and access rules may change frequently. In this paper, we propose a notion of access policy updatable ciphertext-policy attribute-based encryption (APU-CP-ABE) by combining the idea of ciphertext-policy attribute-based key encapsulation and symmetric proxy re-encryption. When an access policy update occurs, data owner is no longer required to download any data for… More >

  • Open Access

    ARTICLE

    XML-Based Information Fusion Architecture Based on Cloud Computing Ecosystem

    I-Ching Hsu1,*

    CMC-Computers, Materials & Continua, Vol.61, No.3, pp. 929-950, 2019, DOI:10.32604/cmc.2019.07876

    Abstract Considering cloud computing from an organizational and end user computing point of view, it is a new paradigm for deploying, managing and offering services through a shared infrastructure. Current development of cloud computing applications, however, are the lack of a uniformly approach to cope with the heterogeneous information fusion. This leads cloud computing to inefficient development and a low potential reuse. This study addresses these issues to propose a novel Web 2.0 Mashups as a Service, called WMaaS, which is a fundamental cloud service model. The WMaaS is developed based on a XML-based Mashups Architecture (XMA) that is composed of… More >

Displaying 1-10 on page 1 of 5. Per Page