Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Physical Sciences and Mathematics (248)
- Computer Sciences (235)
- Engineering (124)
- Computer Engineering (85)
- Information Security (67)
-
- Social and Behavioral Sciences (59)
- Law (57)
- Business (49)
- Databases and Information Systems (44)
- Electrical and Computer Engineering (34)
- Library and Information Science (31)
- Data Storage Systems (24)
- Management Information Systems (22)
- Computer Law (21)
- Medicine and Health Sciences (19)
- Operations Research, Systems Engineering and Industrial Engineering (19)
- Systems Architecture (19)
- Education (17)
- Internet Law (17)
- Artificial Intelligence and Robotics (16)
- Technology and Innovation (16)
- Computer and Systems Architecture (15)
- Digital Communications and Networking (15)
- Intellectual Property Law (15)
- Science and Technology Law (15)
- Numerical Analysis and Scientific Computing (14)
- Software Engineering (14)
- OS and Networks (13)
- Civil and Environmental Engineering (12)
- Health Information Technology (12)
- Institution
-
- Singapore Management University (59)
- Selected Works (31)
- Brigham Young University (20)
- City University of New York (CUNY) (18)
- University of Nebraska - Lincoln (18)
-
- Association of Arab Universities (14)
- Old Dominion University (14)
- SelectedWorks (13)
- Edith Cowan University (12)
- Zayed University (11)
- California State University, San Bernardino (10)
- Purdue University (10)
- University of Kentucky (10)
- Walden University (10)
- China Simulation Federation (9)
- Portland State University (9)
- Rochester Institute of Technology (9)
- Technological University Dublin (8)
- TÜBİTAK (8)
- Western University (8)
- Kennesaw State University (7)
- New Jersey Institute of Technology (7)
- University of Wollongong (7)
- Clemson University (6)
- University of Massachusetts Amherst (5)
- University of Nevada, Las Vegas (5)
- California Polytechnic State University, San Luis Obispo (4)
- Embry-Riddle Aeronautical University (4)
- Georgia State University (4)
- Loyola University Chicago (4)
- Publication Year
- Publication
-
- Research Collection School Of Computing and Information Systems (56)
- Library Philosophy and Practice (e-journal) (17)
- International Congress on Environmental Modelling and Software (13)
- All Works (11)
- Dissertations (11)
-
- Applied Mathematics & Information Sciences (10)
- Theses and Dissertations (10)
- Walden Dissertations and Doctoral Studies (10)
- Journal of System Simulation (9)
- Theses (9)
- Uwe Muegge (9)
- Faculty Publications (8)
- Open Educational Resources (8)
- Turkish Journal of Electrical Engineering and Computer Sciences (8)
- International Conference on Hydroinformatics (6)
- Computer Science Faculty Publications and Presentations (5)
- Electronic Thesis and Dissertation Repository (5)
- Information Technology & Decision Sciences Faculty Publications (5)
- Open Access Dissertations (5)
- University of Wollongong Thesis Collection 1954-2016 (5)
- All Faculty Scholarship (4)
- All Theses (4)
- Articles (4)
- Computer Science Theses & Dissertations (4)
- Computer Science: Faculty Publications and Other Works (4)
- Dissertations and Theses (4)
- Doctoral Dissertations (4)
- Faculty Scholarship (4)
- Journal of International Technology and Information Management (4)
- UNLV Theses, Dissertations, Professional Papers, and Capstones (4)
- Publication Type
- File Type
Articles 1 - 30 of 531
Full-Text Articles in Entire DC Network
Librarian' Understanding, Perception, And Attitudes Regarding Cloud Computing In Academic Libraries Punjab, Pakistan: A Survey, Shahid Mehmood, Prof.Dr.Rais Ahmed Samdani, Muhammad Wahid
Librarian' Understanding, Perception, And Attitudes Regarding Cloud Computing In Academic Libraries Punjab, Pakistan: A Survey, Shahid Mehmood, Prof.Dr.Rais Ahmed Samdani, Muhammad Wahid
Library Philosophy and Practice (e-journal)
People who used the University of Sargodha library were asked what they thought about Cloud Computing for the study. The goal of this study was to find out more about how people feel about cloud computing in general and how well they understand it. There were both descriptive and quantitative methods used in the study. Over sixty-nine people were asked to take part in the study, and 65 were randomly picked from the census. The study used SPSS version 21 to turn table data with numbers into percentages and rates. Most people know what Cloud Computing is and how it …
The Degree Of Using Cloud Computing Applications In The E-Learning Environment And Its Obstacles For Secondary School Students In The Capital Amman Governorate From The Point View Of Their Teachers, Rehab Ibrahim, Fawaz Shehadeh
The Degree Of Using Cloud Computing Applications In The E-Learning Environment And Its Obstacles For Secondary School Students In The Capital Amman Governorate From The Point View Of Their Teachers, Rehab Ibrahim, Fawaz Shehadeh
Jordan Journal of Applied Science-Humanities Series
This study aimed to reveal the degree of use of cloud computing applications in the e-learning environment and the obstacles facing secondary school students in the Capital Governorate of Amman from the point of view of their teachers. The study adopted the descriptive survey method, and to collect data, a questionnaire was developed in the form of a scale consisting of (30) items, consisting of two parts, the first to measure the degree of use of cloud computing applications in the e-learning environment for secondary school students in the Amman governorate, and the second to measure the obstacles of cloud …
Cyberattacks And Security Of Cloud Computing: A Complete Guideline, Muhammad Dawood, Shanshan Tu, Chuangbai Xiao, Hisham Alasmary, Muhammad Waqas, Sadaqat Ur Rehman
Cyberattacks And Security Of Cloud Computing: A Complete Guideline, Muhammad Dawood, Shanshan Tu, Chuangbai Xiao, Hisham Alasmary, Muhammad Waqas, Sadaqat Ur Rehman
Research outputs 2022 to 2026
Cloud computing is an innovative technique that offers shared resources for stock cache and server management. Cloud computing saves time and monitoring costs for any organization and turns technological solutions for large-scale systems into server-to-service frameworks. However, just like any other technology, cloud computing opens up many forms of security threats and problems. In this work, we focus on discussing different cloud models and cloud services, respectively. Next, we discuss the security trends in the cloud models. Taking these security trends into account, we move to security problems, including data breaches, data confidentiality, data access controllability, authentication, inadequate diligence, phishing, …
Privacy-Preserving Arbitrary Geometric Range Query In Mobile Internet Of Vehicles, Yinbin Miao, Lin Song, Xinghua Li, Hongwei Li, Kim-Kwang Raymond Choo, Robert H. Deng
Privacy-Preserving Arbitrary Geometric Range Query In Mobile Internet Of Vehicles, Yinbin Miao, Lin Song, Xinghua Li, Hongwei Li, Kim-Kwang Raymond Choo, Robert H. Deng
Research Collection School Of Computing and Information Systems
The mobile Internet of Vehicles (IoVs) has great potential for intelligent transportation, and creates spatial data query demands to realize the value of data. Outsourcing spatial data to a cloud server eliminates the need for local computation and storage, but it leads to data security and privacy threats caused by untrusted third-parties. Existing privacy-preserving spatial range query solutions based on Homomorphic Encryption (HE) have been developed to increase security. However, in the single server model, the private key is held by the query user, which incurs high computation and communication burdens on query users due to multiple rounds of interactions. …
Dbscan Inspired Task Scheduling Algorithm For Cloud Infrastructure, S. M.F.D.Syed Mustapha, Punit Gupta
Dbscan Inspired Task Scheduling Algorithm For Cloud Infrastructure, S. M.F.D.Syed Mustapha, Punit Gupta
All Works
Cloud computing in today's computing environment plays a vital role, by providing efficient and scalable computation based on pay per use model. To make computing more reliable and efficient, it must be efficient, and high resources utilized. To improve resource utilization and efficiency in cloud, task scheduling and resource allocation plays a critical role. Many researchers have proposed algorithms to maximize the throughput and resource utilization taking into consideration heterogeneous cloud environments. This work proposes an algorithm using DBSCAN (Density-based spatial clustering) for task scheduling to achieve high efficiency. The proposed DBScan-based task scheduling algorithm aims to improve user task …
How To Resuscitate A Sick Vm In The Cloud, Xuhua Ding
How To Resuscitate A Sick Vm In The Cloud, Xuhua Ding
Research Collection School Of Computing and Information Systems
A guest virtual machine in a cloud platform may fall “sick” when its kernel encounters a fatal low-level bug or is subverted by an adversary. The VM owner is hence likely to lose her control over it due to a kernel hang or being denied of remote accesses. While the VM can be rebooted with the assistance from the cloud server, the owner not only faces service disruption but also is left with no opportunity to make an in-depth diagnosis and forensics on the spot, not to mention a live rectification. Currently, the cloud service provider has neither incentive nor …
Determinants Of Cloud Computing Integration And Its Impact On Sustainable Performance In Smes: An Empirical Investigation Using The Sem-Ann Approach, Mohammed A. Al-Sharafi, Mohammad Iranmanesh, Mostafa Al-Emran, Ahmed I. Alzahrani, Fadi Herzallah, Norziana Jamil
Determinants Of Cloud Computing Integration And Its Impact On Sustainable Performance In Smes: An Empirical Investigation Using The Sem-Ann Approach, Mohammed A. Al-Sharafi, Mohammad Iranmanesh, Mostafa Al-Emran, Ahmed I. Alzahrani, Fadi Herzallah, Norziana Jamil
Research outputs 2022 to 2026
Although extant literature has thoroughly investigated the incorporation of cloud computing services, examining their influence on sustainable performance, particularly at the organizational level, is insufficient. Consequently, the present research aims to assess the factors that impact the integration of cloud computing within small and medium-sized enterprises (SMEs) and its subsequent effects on environmental, financial, and social performance. The data were collected from 415 SMEs and were analyzed using a hybrid SEM-ANN approach. PLS-SEM results indicate that relative advantage, complexity, compatibility, top management support, cost reduction, and government support significantly affect cloud computing integration. This study also empirically demonstrated that SMEs …
Are You Cloud-Certified? Preparing Computing Undergraduates For Cloud Certification With Experiential Learning, Eng Lieh Ouh, Benjamin Gan
Are You Cloud-Certified? Preparing Computing Undergraduates For Cloud Certification With Experiential Learning, Eng Lieh Ouh, Benjamin Gan
Research Collection School Of Computing and Information Systems
Cloud Computing skills have been increasing in demand. Many software engineers are learning these skills and taking cloud certification examinations to be job competitive. Preparing undergraduates to be cloud-certified remains challenging as cloud computing is a relatively new topic in the computing curriculum, and many of these certifications require working experience. In this paper, we report our experiences designing a course with experiential learning to prepare our computing undergraduates to take the cloud certification. We adopt a university project-based experiential learning framework to engage industry partners who provide project requirements for students to develop cloud solutions and an experiential risk …
Calculation Of Optimal Vocs Emission Reduction Based On Improved Seirs Model In Cloud Environment, Guangqiu Huang, Xixuan Zhao, Qiuqin Lu
Calculation Of Optimal Vocs Emission Reduction Based On Improved Seirs Model In Cloud Environment, Guangqiu Huang, Xixuan Zhao, Qiuqin Lu
Journal of System Simulation
Abstract: Volatile organic compounds (VOCs) emissions in different regions are correlated and influenced. In order to minimize the impact of VOCs on the atmospheric environment and achieve synergistic governance of VOCs regions, an optimal emission reduction model is established with the maximum VOCs emission reduction as the primary goal. An improved SEIRS infectious disease dynamics optimization algorithm considering environmental pollution(SEIRS-CE) is proposed and the model is solved in cloud environment. Taking Xi'an city as an example, the SEIRS-CE algorithm is used in Ali cloud server to calculate the emission reduction of VOCs associated with 13 meteorological monitoring stations in Xi …
Cognitive Software Defined Networking And Network Function Virtualization And Applications, Sachin Sharma, Avishek Nag
Cognitive Software Defined Networking And Network Function Virtualization And Applications, Sachin Sharma, Avishek Nag
Articles
The emergence of Software-Defined Networking (SDN) and Network Function Virtualization (NFV) has revolutionized the Internet. Using SDN, network devices can be controlled from a centralized, programmable control plane that is decoupled from their data plane, whereas with NFV, network functions (such as network address translation, firewall, and intrusion detection) can be virtualized instead of being implemented on proprietary hardware. In addition, Artificial Intelligence (AI) and Machine Learning (ML) techniques will be key to automating network operations and enhancing customer service. Many of the challenges behind SDN and NFV are currently being investigated in several projects all over the world using …
Development Opportunities And Application Prospects Of Aero-Engine Simulation Technology Under Digital Transformation, Jianguo Cao
Development Opportunities And Application Prospects Of Aero-Engine Simulation Technology Under Digital Transformation, Jianguo Cao
Journal of System Simulation
Abstract: The development of China's social economy and the improvement of its national defense capability in the new era put forward higher requirements for the development of aero-engines. It is urgent to promote the digital transformation of aero-engines in order to achieve coordinated, agile and efficient aero-engine development. Based on the current research and development of aero-engine in China, this paper clarifies the new connotation of "speediness and efficiency, accurate mapping, comprehensive coverage, and dynamic prediction" given by the development of emerging cutting-edge technologies to aero-engine simulation technology, as well as the new technical features of "spatio-temporal ubiquity, data driven, …
The Evolution Of The Chief Technology Officer And The Modernization Of Technology In Education, Brian Skibinski
The Evolution Of The Chief Technology Officer And The Modernization Of Technology In Education, Brian Skibinski
All Student Theses
The role of technology in education has changed dramatically over the past 20 years. From the advent of individual workstations to networked labs to one-to-one technologies, computers have transformed how teachers and students consume information. School districts today support hundreds if not thousands of devices and end users. Technology supports mission critical systems like financial, human resources, library, and student information systems and ensures they are integrating rostering information to numerous third-party programs like Clever, Classlink or textbook specific websites. They also support the district operations as well by assisting in or managing building automation controls which can include lighting, …
Geo-Distributed Multi-Tier Workload Migration Over Multi-Timescale Electricity Markets, Sourav Kanti Addya, Anurag Satpathy, Bishakh Chandra Ghosh, Sandip Chakraborty, Soumya K. Ghosh, Sajal K. Das
Geo-Distributed Multi-Tier Workload Migration Over Multi-Timescale Electricity Markets, Sourav Kanti Addya, Anurag Satpathy, Bishakh Chandra Ghosh, Sandip Chakraborty, Soumya K. Ghosh, Sajal K. Das
Computer Science Faculty Research & Creative Works
Virtual machine (VM) migration enables cloud service providers (CSPs) to balance workload, perform zero-downtime maintenance, and reduce applications' power consumption and response time. Migrating a VM consumes energy at the source, destination, and backbone networks, i.e., intermediate routers and switches, especially in a Geo-distributed setting. In this context, we propose a VM migration model called Low Energy Application Workload Migration (LEAWM) aimed at reducing the per-bit migration cost in migrating VMs over Geo-distributed clouds. With a Geo-distributed cloud connected through multiple Internet Service Providers (ISPs), we develop an approach to find out the migration path across ISPs leading to the …
Enhanced Load Balancing Based On Hybrid Artificial Bee Colony With Enhanced Β-Hill Climbing In Cloud, Maha Zeedan, Gamal Attiya, Nawal El-Fishawy
Enhanced Load Balancing Based On Hybrid Artificial Bee Colony With Enhanced Β-Hill Climbing In Cloud, Maha Zeedan, Gamal Attiya, Nawal El-Fishawy
Mansoura Engineering Journal
This paper proposes enhanced load balancer based artificial bee colony and β-Hill climbing for improving the performance metrics such as response time, processing cost, and utilization to avoid overloaded or under loaded situations of virtual machines. In this study, the suggested load balancer is called enhanced load balancing based on hybrid artificial bee colony with enhanced β-Hill climbing (ELBABCEβHC) to improve the response time, processing cost and the resource utilization. Our proposed approach starts by ranking the task then the greedy randomized adaptive search procedure (GRASP) is used in initializing populations. Further, the binary artificial bee colony (BABC) enhanced with …
Large Scale Data Transfers In Cloud-Based Systems, Uday Kumar Bommala
Large Scale Data Transfers In Cloud-Based Systems, Uday Kumar Bommala
Theses
My dissertation focuses on developing a High-performance, Scalable, and Efficient Data Transfer Framework with Configurable and Extensible Features. The exponential growth of high-volume data poses collaboration challenges for big data providers, particularly in global-scale scientific research. The Earth’s scientific sector experiences an ongoing trend of increasing temporal and spatial data resolution, resulting in massive data archives at organizations like NASA, ESA, and JAXA. To facilitate efficient scientific study with partner agencies worldwide, data transfer solutions must handle this vast data volume across platforms at reasonable costs. The dissertation proposes a 3-phase approach (Analysis, Evaluation, and Implementation) to address the implementation …
The Future Of Enterprise Information Systems, Ali Sunyaev, Tobias Dehling, Susanne Strahringer, Li Da Xu, Martin Heinig, Michael Perscheid, Rainer Alt, Matti Rossi
The Future Of Enterprise Information Systems, Ali Sunyaev, Tobias Dehling, Susanne Strahringer, Li Da Xu, Martin Heinig, Michael Perscheid, Rainer Alt, Matti Rossi
Information Technology & Decision Sciences Faculty Publications
[First paragraph] Enterprise information systems (EIS) have been important enablers of crossfunctional processes within businesses since the 1990s. Often referred to as enterprise resource planning (ERP) systems, they were extended in line with electronic businesses to integrate with suppliers as well as customers. Today, EIS architectures comprise not only ERP, supply chain, and customer relationship management systems, but also business intelligence and analytics. Recently, the move towards decentralized technologies has created new perspectives for EIS. Information systems (IS) research has already addressed opportunities and challenges of these developments quite well, but what will be the pressing opportunities and challenges for …
Design Of Robust Blockchain-Envisioned Authenticated Key Management Mechanism For Smart Healthcare Applications, Siddhant Thapiyal, Mohammad Wazid, Devesh Pratap Singh, Ashok Kumar Das, Sachin Shetty
Design Of Robust Blockchain-Envisioned Authenticated Key Management Mechanism For Smart Healthcare Applications, Siddhant Thapiyal, Mohammad Wazid, Devesh Pratap Singh, Ashok Kumar Das, Sachin Shetty
VMASC Publications
The healthcare sector is a very crucial and important sector of any society, and with the evolution of the various deployed technologies, like the Internet of Things (IoT), machine learning and blockchain it has numerous advantages. However, in this section, the data is much more vulnerable than others, because the data is strictly private and confidential, and it requires a highly secured framework for the transmission of data between entities. In this article, we aim to design a blockchain-envisioned authentication and key management mechanism for the IoMT-based smart healthcare applications (in short, we call it SBAKM-HS). We compare the various …
Reks: Role-Based Encrypted Keyword Search With Enhanced Access Control For Outsourced Cloud Data, Yibin Miao, Feng Li, Xiaohua Jia, Huaxiong Wang, Ximeng Liu, Kim-Kwang Raymond Choo, Robert H. Deng
Reks: Role-Based Encrypted Keyword Search With Enhanced Access Control For Outsourced Cloud Data, Yibin Miao, Feng Li, Xiaohua Jia, Huaxiong Wang, Ximeng Liu, Kim-Kwang Raymond Choo, Robert H. Deng
Research Collection School Of Computing and Information Systems
Keyword-based search over encrypted data is an important technique to achieve both data confidentiality and utilization in cloud outsourcing services. While commonly used access control mechanisms, such as identity-based encryption and attribute-based encryption, do not generally scale well for hierarchical access permissions. To solve this problem, we propose a Role-based Encrypted Keyword Search (REKS) scheme by using the role-based access control and broadcast encryption. Specifically, REKS allows owners to deploy hierarchical access control by allowing users with parent roles to have access permissions from child roles. Using REKS, we further facilitate token generation preprocessing and efficient user management, thereby significantly …
The Impact Of The Adoption Of Cloud Computing On Improving The Efficiency Of Accounting Information Systems During The Covid-19 Pandemic (A Field Study On The Service Companies Listed On The Palestine Stock Exchange), Abd El Rahman Rashwan, Etidal Alhelo
The Impact Of The Adoption Of Cloud Computing On Improving The Efficiency Of Accounting Information Systems During The Covid-19 Pandemic (A Field Study On The Service Companies Listed On The Palestine Stock Exchange), Abd El Rahman Rashwan, Etidal Alhelo
Journal of the Arab American University مجلة الجامعة العربية الامريكية للبحوث
This study mainly aimed to know the effect of using cloud computing on improving the efficiency of the performance of accounting information systems in the service companies listed on the Palestine Stock Exchange during the COVID-19 pandemic.
To achieve the objective of the study, the researchers adopted the descriptive analytical method, and the questionnaire tool to collect data from its sources, analyze it through the SPSS program, and extract the results.
The results of the study showed that cloud computing had an impact on improving the efficiency of accounting information systems, their safety and reliability in addition to achieving the …
Arcana Capstone Report, Jae Won Park, Suzi Ryu, Caitlin Rush
Arcana Capstone Report, Jae Won Park, Suzi Ryu, Caitlin Rush
Student Capstones
Our project, Arcana, is an augmented reality based mobile game. This application will promote outdoor activities for both children and adults and provide them with fun and engaging challenges. A user can grow their unique character and progress through puzzles and encounters. This solution will use many advanced areas of computer science, such as augmented reality and cognitive computing, and have many different components like cloud-computing and multiplayer functionality.
A Proposed Instructional Model Based On The Constructivist Theory For Using Cloud Computing Technology At The University Of Jordan And The Degree Of Appropriateness From The Experts' Point Of View أُنموذج تدريسي مقترح يستند الى النظرية البنائية لاستخدام الحوسبة السحابية في الجامعة الأردنية ودرجة ملاءمته من وجهة نظر الخبراء, Sana Y. Banat, Abdelmuhdi A. Aljarrah
A Proposed Instructional Model Based On The Constructivist Theory For Using Cloud Computing Technology At The University Of Jordan And The Degree Of Appropriateness From The Experts' Point Of View أُنموذج تدريسي مقترح يستند الى النظرية البنائية لاستخدام الحوسبة السحابية في الجامعة الأردنية ودرجة ملاءمته من وجهة نظر الخبراء, Sana Y. Banat, Abdelmuhdi A. Aljarrah
Jordanian Educational Journal
Abstract:
The study aimed to develop a proposed instructional model based on constructivist theory for using cloud computing technology at the University of Jordan, and to reveal the degree of its relevance from the experts' point of view. The study followed a descriptive analytical methodology to achieve the study goals. The study sample consisted of (100) experts at the University of Jordan. A questionnaire consisting of (72) items distributed over (7) dimensions after its validity and reliability has been verified and ensured. The results of the study showed that the degree of suitability of the model from the experts' point …
Comparative Analysis Of Cloud-Based Server And Conventional Server Of Simulators For Marine Engineering, Jose Maria Razon Nalus
Comparative Analysis Of Cloud-Based Server And Conventional Server Of Simulators For Marine Engineering, Jose Maria Razon Nalus
World Maritime University Dissertations
No abstract provided.
An Analysis Of The Microsoft 365 Cloud Migration Process, Its Alternatives, And Results, Curtis Barnes, Robert Houghton
An Analysis Of The Microsoft 365 Cloud Migration Process, Its Alternatives, And Results, Curtis Barnes, Robert Houghton
Mountain Plains Journal of Business and Technology
This study follows the decision making process of comparing a traditional business software stack to cloud alternatives, comparing different cloud platforms, and planning a migration. It addresses specific workloads of an example company in the financial services industry and how the tools in a Microsoft 365 subscription support that work. The process of transferring an existing Exchange server and its users to Azure is thoroughly detailed, as is the logic behind certain crucial decisions that are part of that procedure. A calculation of real-world savings is also provided. The resulting paper is usable as both a reference and guide for …
Vpsl: Verifiable Privacy-Preserving Data Search For Cloud-Assisted Internet Of Things, Qiuyun Tong, Yinbin Miao, Ximeng Liu, Kim-Kwang Raymond Choo, Robert H. Deng
Vpsl: Verifiable Privacy-Preserving Data Search For Cloud-Assisted Internet Of Things, Qiuyun Tong, Yinbin Miao, Ximeng Liu, Kim-Kwang Raymond Choo, Robert H. Deng
Research Collection School Of Computing and Information Systems
Cloud-assisted Internet of Things (IoT) is increasingly prevalent used in various fields, such as the healthcare system. While in such a scenario, sensitive data (e.g., personal electronic medical records) can be easily revealed, which incurs potential security challenges. Thus, Symmetric Searchable Encryption (SSE) has been extensively studied due to its capability of supporting efficient search on encrypted data. However, most SSE schemes require the data owner to share the complete key with query users and take malicious cloud servers out of consideration. Seeking to address these limitations, in this paper we propose a Verifiable Privacy-preserving data Search scheme with Limited …
Soci: A Toolkit For Secure Outsourced Computation On Integers, Bowen Zhao, Jiaming Yuan, Ximeng Liu, Yongdong Wu, Hwee Hwa Pang, Robert H. Deng
Soci: A Toolkit For Secure Outsourced Computation On Integers, Bowen Zhao, Jiaming Yuan, Ximeng Liu, Yongdong Wu, Hwee Hwa Pang, Robert H. Deng
Research Collection School Of Computing and Information Systems
Secure outsourced computation is a key technique for protecting data security and privacy in the cloud. Although fully homomorphic encryption (FHE) enables computations over encrypted data, it suffers from high computation costs in order to support an unlimited number of arithmetic operations. Recently, secure computations based on interactions of multiple computation servers and partially homomorphic encryption (PHE) were proposed in the literature, which enable an unbound number of addition and multiplication operations on encrypted data more efficiently than FHE and do not add any noise to encrypted data; however, these existing solutions are either limited in functionalities (e.g., computation on …
Evaluation Of Geo-Spebh Algorithm Based On Bandwidth For Big Data Retrieval In Cloud Computing, Abubakar Usman Othman, Moses Timothy, Aisha Yahaya Umar, Abdullahi Salihu Audu, Boukari Souley, Abdulsalam Ya’U Gital
Evaluation Of Geo-Spebh Algorithm Based On Bandwidth For Big Data Retrieval In Cloud Computing, Abubakar Usman Othman, Moses Timothy, Aisha Yahaya Umar, Abdullahi Salihu Audu, Boukari Souley, Abdulsalam Ya’U Gital
Al-Bahir Journal for Engineering and Pure Sciences
The fast increase in volume and speed of information created by mobile devices, along with the availability of web-based applications, has considerably contributed to the massive collection of data. Approximate Nearest Neighbor (ANN) is essential in big size databases for comparison search to offer the nearest neighbor of a given query in the field of computer vision and pattern recognition. Many hashing algorithms have been developed to improve data management and retrieval accuracy in huge databases. However, none of these algorithms took bandwidth into consideration, which is a significant aspect in information retrieval and pattern recognition. As a result, our …
The Internet Of Citizens: A Lawyer’S View On Some Technological Developments In The United Kingdom And India*, Guido Noto La Diega
The Internet Of Citizens: A Lawyer’S View On Some Technological Developments In The United Kingdom And India*, Guido Noto La Diega
Indian Journal of Law and Technology
This article aspires to constitute a useful tool for both Asian and European readers as regards some of the state-of-the-art technologies revolving around the Internet of Things (‘IoT’) and their intersection with cloud computing (the Clouds of Things, ‘CoT’) in both the continents. The main emerging legal issues will be presented, with a focus on intellectual property, consumer protection, and privacy. The cases chosen are from India and the United Kingdom, two countries that are conspicuously active on this front. I will give an account only of (what I consider to be) the highlights of the IoT in India and …
Cloud Gaming Demystified: An Introduction To The Legal Implications Of Cloud-Based Videogames, Mitchell Longan, Gaetano Dimita, Johan David Michels, Christopher Millard
Cloud Gaming Demystified: An Introduction To The Legal Implications Of Cloud-Based Videogames, Mitchell Longan, Gaetano Dimita, Johan David Michels, Christopher Millard
Michigan Technology Law Review
In this paper, we “demystify” cloud-based videogaming and its legal implications, in two stages. First, we describe the videogame sector; explain the basics of cloud computing and traditional videogame technologies and set out how the two converge in cloud-based videogame systems. Based on this analysis, we distinguish three separate models for cloud gaming services: (i) the “layered” model of Gaming-as-a-Service (‘GaaS’); (ii) the ‘integrated’ model of GaaS; and (iii) the ‘consumer infrastructure-as-a-service’ model. We argue that these three models are key to analyzing how intellectual property rights, contractual rights, and regulatory issues will develop in this novel environment for videogame …
Frameworks For Secure Collaborative And Concurrent Editing, Shashank Arora
Frameworks For Secure Collaborative And Concurrent Editing, Shashank Arora
Legacy Theses & Dissertations (2009 - 2024)
Cloud-based online document editing services, such as Google Docs and Office 365, provide an inexpensive and efficient means of managing documents. However, storing data on the cloud also raises certain security and privacy concerns, especially when the data is of confidential and sensitive nature. Storing data on third-party servers can potentially be compromising as it gives an opportunity to the third-party cloud service providers to turn semi-honest and become curious about user data. User data stored on third-party servers is also prone to attacks like virtual machine-based side-channel along with natural language processing and machine learning-based content search and retrieval …
Scheduling Many-Task Computing Applications For A Hybrid Cloud, Shifat Perveen Mithila
Scheduling Many-Task Computing Applications For A Hybrid Cloud, Shifat Perveen Mithila
LSU Doctoral Dissertations
A centralized scheduler can become a bottleneck for placing the tasks of a many-task application on heterogeneous cloud resources. Previously, it was demonstrated that a decentralized vector scheduling approach based on performance measurements can be used successfully for this task placement scenario. In this dissertation, we extend this approach to task placement based on latency measurements. Each node collects performance metrics from its neighbors on an overlay graph, measures the communication latency, and then makes local decisions on where to move tasks. We present a decentralized and a centralized algorithm for configuring the overlay graph based on latency measurements and …