Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Computer Sciences (25)
- Physical Sciences and Mathematics (25)
- Information Security (14)
- Engineering (6)
- Social and Behavioral Sciences (5)
-
- Databases and Information Systems (4)
- Medicine and Health Sciences (4)
- Business (3)
- Communication (3)
- Health Information Technology (3)
- Management Information Systems (3)
- OS and Networks (3)
- Computer Engineering (2)
- Electrical and Computer Engineering (2)
- Life Sciences (2)
- African Studies (1)
- Bioinformatics (1)
- Categorical Data Analysis (1)
- Communication Technology and New Media (1)
- Computer and Systems Architecture (1)
- Critical and Cultural Studies (1)
- Data Storage Systems (1)
- E-Commerce (1)
- Economics (1)
- Education (1)
- Educational Administration and Supervision (1)
- Electrical and Electronics (1)
- Growth and Development (1)
- Human Resources Management (1)
- Industrial Engineering (1)
- Institution
-
- Singapore Management University (14)
- New Jersey Institute of Technology (3)
- Brigham Young University (2)
- Walden University (2)
- California State University, San Bernardino (1)
-
- Chinese Academy of Sciences (1)
- City University of New York (CUNY) (1)
- Harrisburg University of Science and Technology (1)
- Kennesaw State University (1)
- Kettering University (1)
- Ministry of Higher and Secondary Specialized Education of the Republic of Uzbekistan (1)
- Nova Southeastern University (1)
- Old Dominion University (1)
- Portland State University (1)
- Providence (1)
- St. Cloud State University (1)
- Syracuse University (1)
- Technological University Dublin (1)
- University for Business and Technology in Kosovo (1)
- University of Massachusetts Amherst (1)
- University of Miami Law School (1)
- University of Nevada, Las Vegas (1)
- University of Richmond (1)
- Utah State University (1)
- Western Michigan University (1)
- Zayed University (1)
- Publication
-
- Research Collection School Of Computing and Information Systems (14)
- Dissertations (3)
- International Congress on Environmental Modelling and Software (2)
- Walden Dissertations and Doctoral Studies (2)
- All Works (1)
-
- Articles (1)
- Articles, Abstracts, and Reports (1)
- Bulletin of Chinese Academy of Sciences (Chinese Version) (1)
- CCE Theses and Dissertations (1)
- Computer Science Faculty Research (1)
- Computer Science Theses & Dissertations (1)
- Culminating Projects in Information Assurance (1)
- Dissertations and Theses (1)
- Dissertations, Theses, and Capstone Projects (1)
- Doctoral Dissertations (1)
- Electronic Theses, Projects, and Dissertations (1)
- Engineering and Technology Management Faculty Publications and Presentations (1)
- Heroism Science (1)
- Industrial & Manufacturing Engineering Publications (1)
- International Finance and Accounting (1)
- International Journal of Business and Technology (1)
- Irish Communication Review (1)
- Masters Theses (1)
- Theses - ALL (1)
- University of Miami Inter-American Law Review (1)
- Young African Leaders Journal of Development (1)
- Publication Type
Articles 1 - 30 of 43
Full-Text Articles in Entire DC Network
Storage Systems For Mobile-Cloud Applications, Nafize R. Paiker
Storage Systems For Mobile-Cloud Applications, Nafize R. Paiker
Dissertations
Mobile devices have become the major computing platform in todays world. However, some apps on mobile devices still suffer from insufficient computing and energy resources. A key solution is to offload resource-demanding computing tasks from mobile devices to the cloud. This leads to a scenario where computing tasks in the same application run concurrently on both the mobile device and the cloud.
This dissertation aims to ensure that the tasks in a mobile app that employs offloading can access and share files concurrently on the mobile and the cloud in a manner that is efficient, consistent, and transparent to locations. …
Authorized Function Homomorphic Signature, Qingwen Guo, Qiong Huang, Guomin Yang
Authorized Function Homomorphic Signature, Qingwen Guo, Qiong Huang, Guomin Yang
Research Collection School Of Computing and Information Systems
Homomorphic signature (HS) is a novel primitive that allows an agency to carry out arbitrary (polynomial time) computation f on the signed data (m) over right arrow and accordingly gain a signature sigma(h) for the computation result f ((m) over right arrow) with respect to f on behalf of the data owner (DO). However, since DO lacks control of the agency's behavior, receivers would believe that DO did authenticate the computation result even if the agency misbehaves and applies a function that the DO does not want. To address the problem above, in this paper we introduce a new primitive …
The Impacts Of Cloud Computing And Big Data Applications On Developing World-Based Smallholder Farmers, Nir Kshetri
The Impacts Of Cloud Computing And Big Data Applications On Developing World-Based Smallholder Farmers, Nir Kshetri
International Journal of Business and Technology
Cloud computing and big data applications are likely to have far-reaching and profound impacts on developing world-based smallholder farmers. Especially, the use of mobile devices to access cloudbased applications is a promising approach to deliver value to smallholder farmers in developing countries since according to the International Telecommunication Union, mobile-cellular penetration in developing countries is expected to reach 90% by the end of 2014. This article examines the contexts, mechanisms, processes and consequences associated with cloud computing and big data deployments in farming activities that could affect the lives of developing world-based smallholder farmers. We analyze the roles of big …
Vpsearch: Achieving Verifiability For Privacy-Preserving Multi-Keyword Search Over Encrypted Cloud Data, Zhiguo Wan, Robert H. Deng
Vpsearch: Achieving Verifiability For Privacy-Preserving Multi-Keyword Search Over Encrypted Cloud Data, Zhiguo Wan, Robert H. Deng
Research Collection School Of Computing and Information Systems
Although cloud computing offers elastic computation and storage resources, it poses challenges on verifiability of computations and data privacy. In this work we investigate verifiability for privacy-preserving multi-keyword search over outsourced documents. As the cloud server may return incorrect results due to system faults or incentive to reduce computation cost, it is critical to offer verifiability of search results and privacy protection for outsourced data at the same time. To fulfill these requirements, we design aVerifiablePrivacy-preserving keywordSearch scheme, called VPSearch, by integrating an adapted homomorphic MAC technique with a privacy-preserving multi-keyword search scheme. The proposed scheme enables the client to …
Leveraging Technology To Achieve Food Security In Nigeria, Femi Royal
Leveraging Technology To Achieve Food Security In Nigeria, Femi Royal
Young African Leaders Journal of Development
In Nigeria today, hunger prevalence is on the rise and in paying attention to the country's food production level, the difficulty experienced in meeting domestic food needs and the challenge in exporting our local products, it is easy to conclude that Nigeria Is food insecure. The petroleum based economic model of the Nigerian economy has made it lose its force as an export led economy and as the government makes effort to diversify the economy towards achieving food security, it is important to learn about how technology can help achieve this objective. This paper reviews recent attempts by some Nigerian …
System Support For Managing Risk In Cloud Computing Platforms, Supreeth Shastri
System Support For Managing Risk In Cloud Computing Platforms, Supreeth Shastri
Doctoral Dissertations
Cloud platforms sell computing to applications for a price. However, by precisely defining and controlling the service-level characteristics of cloud servers, they expose applications to a number of implicit risks throughout the application’s lifecycle. For example, user’s request for a server may be denied, leading to rejection risk; an allocated resource may be withdrawn, resulting in revocation risk; an acquired cloud server’s price may rise relative to others, causing price risk; a cloud server’s performance may vary due to external factors, triggering valuation risk. Though these risks are implicit, the costs they bear on the applications are not. While some …
Service Innovation In The Cloud: Implications For Strategy Development, Robert R. Harmon, Enrique G. Castro-Leon
Service Innovation In The Cloud: Implications For Strategy Development, Robert R. Harmon, Enrique G. Castro-Leon
Engineering and Technology Management Faculty Publications and Presentations
Cloud enterprises have shifted from linear to networked business models through a value transformation process centered on the development of multisided service platforms. These platforms facilitate service exchange and value cocreation by enabling three essential transitions: 1. from control to orchestration of enterprise resources, 2. from internal optimization to external interactions, and 3. from customer value to ecosystem value. Innovative service transformation is most in evidence with enterprises that are native cloud companies or companies that have more rapidly and effectively adopted ecosystem-based service platforms such as Netflix, Google, Facebook, Uber and Airbnb. Service ecosystems enable the critical processes for …
A Lightweight Cloud Sharing Phr System With Access Policy Updating, Zuobin Ying, Wenjie Jang, Shuanlong Cao, Ximeng Liu, Jie Cui
A Lightweight Cloud Sharing Phr System With Access Policy Updating, Zuobin Ying, Wenjie Jang, Shuanlong Cao, Ximeng Liu, Jie Cui
Research Collection School Of Computing and Information Systems
The rapid development of smart wearable devices makes personal health management feasible, which also stimulates the evolution of personal health records (PHRs). However, PHRs face many security challenges ever since it has been created. Besides, the complicated policy adjusting operation makes the PHRs stored in the cloud not so easy to use. In this paper, we propose a lightweight PHRs system on the basis of attribute-based encryption with policy updating. To update an outsourced ciphertext PHRs in the cloud, PHRs owners only need to generate an updating key, then upload it to the cloud server instead of retrieving the entire …
Innovation In Rangeland Monitoring: Annual, 30 M, Plant Functional Type Percent Cover Maps For U.S. Rangelands, 1984-2017, Matthew O. Jones, Brady W. Allred, David E. Naugle, Jeremy D. Maestas, Patrick Donnelly, Loretta J. Metz, Jason Karl, Rob Smith, Brandon Bestelmeyer, Chad Boyd, Jay D. Kerby, James D. Mciver
Innovation In Rangeland Monitoring: Annual, 30 M, Plant Functional Type Percent Cover Maps For U.S. Rangelands, 1984-2017, Matthew O. Jones, Brady W. Allred, David E. Naugle, Jeremy D. Maestas, Patrick Donnelly, Loretta J. Metz, Jason Karl, Rob Smith, Brandon Bestelmeyer, Chad Boyd, Jay D. Kerby, James D. Mciver
Articles
Innovations in machine learning and cloud‐based computing were merged with historical remote sensing and field data to provide the first moderate resolution, annual, percent cover maps of plant functional types across rangeland ecosystems to effectively and efficiently respond to pressing challenges facing conservation of biodiversity and ecosystem services. We utilized the historical Landsat satellite record, gridded meteorology, abiotic land surface data, and over 30,000 field plots within a Random Forests model to predict per‐pixel percent cover of annual forbs and grasses, perennial forbs and grasses, shrubs, and bare ground over the western United States from 1984 to 2017. Results were …
A Strategic Value Appropriation Path For Cloud Computing, Abhishek Kathuria, Arti Mann, Jiban Khuntia, Robert J. Kauffman
A Strategic Value Appropriation Path For Cloud Computing, Abhishek Kathuria, Arti Mann, Jiban Khuntia, Robert J. Kauffman
Research Collection School Of Computing and Information Systems
Cloud-based information management is one of the leading competitive differentiation strategies for firms. With the increasing criticality of information management in value creation and process support, establishing an integrated capability with cloud computing is vital for organizational success in the changing landscape of business competition. These issues have received scant attention, however. We draw on the resource-based view, dynamic capability hierarchy concepts, and the perspective of operand and operant resources to suggest a cloud value appropriation model for firms. We argue that, to appropriate business value from cloud computing, the firm needs to effectively deploy cloud computing and leverage cloud …
Rationality And Efficient Verifiable Computation, Matteo Campanelli
Rationality And Efficient Verifiable Computation, Matteo Campanelli
Dissertations, Theses, and Capstone Projects
In this thesis, we study protocols for delegating computation in a model where one of the parties is rational. In our model, a delegator outsources the computation of a function f on input x to a worker, who receives a (possibly monetary) reward. Our goal is to design very efficient delegation schemes where a worker is economically incentivized to provide the correct result f(x). In this work we strive for not relying on cryptographic assumptions, in particular our results do not require the existence of one-way functions.
We provide several results within the framework of rational proofs introduced by Azar …
Big Data Methods For Environmental Data, Wu Bingfang, Zhang Xin, Zeng Hongwei, Zhang Miao, Tian Fuyou
Big Data Methods For Environmental Data, Wu Bingfang, Zhang Xin, Zeng Hongwei, Zhang Miao, Tian Fuyou
Bulletin of Chinese Academy of Sciences (Chinese Version)
Resource and environmental monitoring have always been an important part of land sustainable management which ground survey and remote sensing monitoring are two fundamental ways. The crowd sourcing geographic data (CSGD) brought by smart phones provides new opportunity for the ground investigation of resources and environment. Meanwhile, the rapid development of cloud computing makes it possible to allow people to process massive remote sensing data much more efficient and accurate. Compared with traditional data acquisition methods, data in the cloud is easier to acquire and process. Based on this, a big data method for environment monitoring is introduced based on …
Collaborative Heroism: An Empirical Investigation, Dana Klisanin
Collaborative Heroism: An Empirical Investigation, Dana Klisanin
Heroism Science
Interactive technologies have come to define our culture, and as such, they influence and shape our modes of perception and behavior. This empirical investigation explored the public’s perception of the impact of the Internet on heroism via assessment of a sample population through a process of item generation, sampling, and principal component analysis. A robust 5-component structure emerged with consensus among participants including: 1) Collaboration expands heroic potential; 2) Internet technology expands heroic potential; 3) Heroes are motivated to protect and serve; 4) Heroes are responsive to injustice; 5) Concern for others is a required ingredient. The results extend research …
Recurrent Tumor-Specific Regulation Of Alternative Polyadenylation Of Cancer-Related Genes., Zhuyi Xue, René L Warren, Ewan A Gibb, Daniel Macmillan, Johnathan Wong, Readman Chiu, S Austin Hammond, Chen Yang, Ka Ming Nip, Catherine A Ennis, Abigail Hahn, Sheila Reynolds, Inanc Birol
Recurrent Tumor-Specific Regulation Of Alternative Polyadenylation Of Cancer-Related Genes., Zhuyi Xue, René L Warren, Ewan A Gibb, Daniel Macmillan, Johnathan Wong, Readman Chiu, S Austin Hammond, Chen Yang, Ka Ming Nip, Catherine A Ennis, Abigail Hahn, Sheila Reynolds, Inanc Birol
Articles, Abstracts, and Reports
BACKGROUND: Alternative polyadenylation (APA) results in messenger RNA molecules with different 3' untranslated regions (3' UTRs), affecting the molecules' stability, localization, and translation. APA is pervasive and implicated in cancer. Earlier reports on APA focused on 3' UTR length modifications and commonly characterized APA events as 3' UTR shortening or lengthening. However, such characterization oversimplifies the processing of 3' ends of transcripts and fails to adequately describe the various scenarios we observe.
RESULTS: We built a cloud-based targeted de novo transcript assembly and analysis pipeline that incorporates our previously developed cleavage site prediction tool, KLEAT. We applied this pipeline to …
Privacy-Preserving Mining Of Association Rule On Outsourced Cloud Data From Multiple Parties, Lin Liu, Jinshu Su, Rongmao Chen, Ximeng Liu, Xiaofeng Wang, Shuhui Chen, Ho-Fung Fung Leung
Privacy-Preserving Mining Of Association Rule On Outsourced Cloud Data From Multiple Parties, Lin Liu, Jinshu Su, Rongmao Chen, Ximeng Liu, Xiaofeng Wang, Shuhui Chen, Ho-Fung Fung Leung
Research Collection School Of Computing and Information Systems
It has been widely recognized as a challenge to carry out data analysis and meanwhile preserve its privacy in the cloud. In this work, we mainly focus on a well-known data analysis approach namely association rule mining. We found that the data privacy in this mining approach have not been well considered so far. To address this problem, we propose a scheme for privacy-preserving association rule mining on outsourced cloud data which are uploaded from multiple parties in a twin-cloud architecture. In particular, we mainly consider the scenario where the data owners and miners have different encryption keys that are …
Going Serverless: Evaluating The Potential Of Serverless Computing For Environmental Modeling Application Hosting, Baojia Zhang, Wes J. Lloyd, Olaf David, George Leavesley
Going Serverless: Evaluating The Potential Of Serverless Computing For Environmental Modeling Application Hosting, Baojia Zhang, Wes J. Lloyd, Olaf David, George Leavesley
International Congress on Environmental Modelling and Software
Recently serverless computing platforms have emerged that provide automatic web service hosting in the cloud. These platforms are promoted for their ability to host “micro” services to end users while seamlessly integrating key features including 24/7 high availability, fault tolerance, and automatic scaling of resources to meet user demand. Serverless Computing environments abstract the majority of infrastructure management tasks including VM/container creation, and load balancer configuration. A key benefit of serverless computing is FREE access to cloud computing resources. Many platforms provide free access for up to 1,000,000 service requests/month with 1 GB of memory for 400,000 seconds/month. Additionally, serverless …
The Agricultural Ecosystems Services (Ages) Watershed Model Integrated Into The Environmental Resources Assessment And Management System (Erams) And Cloud Services Integration Platform (Csip), Nathan Lighthart, Olaf David, Timothy R. Green, Gregory S. Mcmaster, David Arden Patterson, Mazdak Arabi, Holm Kipka
The Agricultural Ecosystems Services (Ages) Watershed Model Integrated Into The Environmental Resources Assessment And Management System (Erams) And Cloud Services Integration Platform (Csip), Nathan Lighthart, Olaf David, Timothy R. Green, Gregory S. Mcmaster, David Arden Patterson, Mazdak Arabi, Holm Kipka
International Congress on Environmental Modelling and Software
Distributing models to various users can be difficult and prone to error, and therefore may negatively reflect on the program. Model distribution typically involves users downloading and installing the model following setup instructions. However, if this step is not handled correctly, the model is not able to be used correctly. Deploying a model through a web interface allows the user to focus on running the model rather than ensuring the model is setup correctly. The eRAMS/CSIP platform is designed to provide visual tools for models to be parameterized and connected to input data (eRAMS), and run using a remote web …
Is Google Self-Aware?, Gerry Heapes
Is Google Self-Aware?, Gerry Heapes
Irish Communication Review
The field of artificial intelligence evolves incrementally with gradual improvement over time and has relied on the Turing Test as a measure of progress. However human standards of intelligence measurement may not be appropriate to current developments. The platform of cloud computing now provides a means of implementing a kind of ubiquitous awareness unknown to humans before now and a means of augmenting human intelligence. The level of awareness held by Google is explored and some recent developments in the uses of AI programmes for social media are covered. The misinterpretation of these developments is explored and a solution proposed. …
Tkse: Trustworthy Keyword Search Over Encrypted Data With Two-Side Verifiability Via Blockchain, Yinghui Zhang, Robert H. Deng, Jiangang Shu, Kan Yang, Dong Zheng
Tkse: Trustworthy Keyword Search Over Encrypted Data With Two-Side Verifiability Via Blockchain, Yinghui Zhang, Robert H. Deng, Jiangang Shu, Kan Yang, Dong Zheng
Research Collection School Of Computing and Information Systems
As a very attractive computing paradigm, cloud computing makes it possible for resource-constrained users to enjoy cost-effective and flexible resources of diversity. Considering the untrustworthiness of cloud servers and the data privacy of users, it is necessary to encrypt the data before outsourcing it to the cloud. However, the form of encrypted storage also poses a series of problems, such as: How can users search over the outsourced data? How to realize user-side verifiability of search results to resist malicious cloud servers? How to enable server-side verifiability of outsourced data to check malicious data owners? How to achieve payment fairness …
Directions And Problems Of Development Of Cloudy Technologies, A. Ruziev, M. Ishankhodjayev
Directions And Problems Of Development Of Cloudy Technologies, A. Ruziev, M. Ishankhodjayev
International Finance and Accounting
The article reviyews the technology of cloud computing, which is considered a revolutionary change in the fiyeld of information and communication technologiyes. The main models of cloud computing services and development trends are considered. The analysis of the development of cloud technologiyes in Uzbekistan and providers of services in this fiyeld was carriyed out.
Security And Privacy In Smart Health: Efficient Policy-Hiding Attribute-Based Access Control, Yinghui Zhang, Dong Zheng, Robert H. Deng
Security And Privacy In Smart Health: Efficient Policy-Hiding Attribute-Based Access Control, Yinghui Zhang, Dong Zheng, Robert H. Deng
Research Collection School Of Computing and Information Systems
With the rapid development of the Internet of Things (IoT) and cloud computing technologies, smart health (s-health) is expected to significantly improve the quality of health care. However, data security and user privacy concerns in s-health have not been adequately addressed. As a well-received solution to realize fine-grained access control, ciphertext-policy attribute-based encryption (CP-ABE) has the potential to ensure data security in s-health. Nevertheless, direct adoption of the traditional CP-ABE in s-health suffers two flaws. For one thing, access policies are in cleartext form and reveal sensitive health-related information in the encrypted s-health records (SHRs). For another, it usually supports …
Survey Of Randomization Defenses On Cloud Computing, Jianming Fu, Yan Lin, Xiuwen Liu, Xu Zhang
Survey Of Randomization Defenses On Cloud Computing, Jianming Fu, Yan Lin, Xiuwen Liu, Xu Zhang
Research Collection School Of Computing and Information Systems
Cloud computing has changed the processing mode on resources of individuals and industries by providing computing and storage services to users. However, existing defenses on cloud, such as virtual machine monitoring and integrity detection, cannot counter against attacks result from the homogeneity and vulnerability of services effectively. In this paper, we have investigated the threats on cloud computing platform from the perspective of cloud service, service interface and network interface, such as code reuse attack, side channel attack and SQL injection. Code reuse attack chains code snippets (gadgets) located in binaries to bypass Data Execution Prevention (DEP). Side channel attack …
Neural Network On Virtualization System, As A Way To Manage Failure Events Occurrence On Cloud Computing, Khoi Minh Pham
Neural Network On Virtualization System, As A Way To Manage Failure Events Occurrence On Cloud Computing, Khoi Minh Pham
Electronic Theses, Projects, and Dissertations
Cloud computing is one important direction of current advanced technology trends, which is dominating the industry in many aspects. These days Cloud computing has become an intense battlefield of many big technology companies, whoever can win this war can have a very high potential to rule the next generation of technologies. From a technical point of view, Cloud computing is classified into three different categories, each can provide different crucial services to users: Infrastructure (Hardware) as a Service (IaaS), Software as a Service (SaaS), and Platform as a Service (PaaS). Normally, the standard measurements for cloud computing reliability level is …
From Geographically Dispersed Data Centers Towards Hierarchical Edge Computing, Abbas Kiani
From Geographically Dispersed Data Centers Towards Hierarchical Edge Computing, Abbas Kiani
Dissertations
Internet scale data centers are generally dispersed in different geographical regions. While the main goal of deploying the geographically dispersed data centers is to provide redundancy, scalability and high availability, the geographic dispersity provides another opportunity for efficient employment of global resources, e.g., utilizing price-diversity in electricity markets or utilizing locational diversity in renewable power generation. In other words, an efficient approach for geographical load balancing (GLB) across geo-dispersed data centers not only can maximize the utilization of green energy but also can minimize the cost of electricity. However, due to the different costs and disparate environmental impacts of the …
High Performance Cloud Computing On Multicore Computers, Jianchen Shan
High Performance Cloud Computing On Multicore Computers, Jianchen Shan
Dissertations
The cloud has become a major computing platform, with virtualization being a key to allow applications to run and share the resources in the cloud. A wide spectrum of applications need to process large amounts of data at high speeds in the cloud, e.g., analyzing customer data to find out purchase behavior, processing location data to determine geographical trends, or mining social media data to assess brand sentiment. To achieve high performance, these applications create and use multiple threads running on multicore processors. However, existing virtualization technology cannot support the efficient execution of such applications on virtual machines, making them …
Catching The Cloud And Pinning It Down: The Social And Environmental Impacts Of Data Centers, Heather Ipsen
Catching The Cloud And Pinning It Down: The Social And Environmental Impacts Of Data Centers, Heather Ipsen
Theses - ALL
As reliance on social media, mobile devices, and computers has grown in developed nations worldwide, data centers have become an important, but poorly understood, part of this digital age. These massive structures, which are increasingly built in rural areas, store digital files and images. Despite the clear importance of cloud computing, geographers have not studied this infrastructure or its effect on nearby communities and the physical environment. This project examines the social and environmental impacts of the development and operation of data centers, using a Facebook data center in Prineville, Oregon as a case study. It explores what impact the …
Efficient And Expressive Keyword Search Over Encrypted Data In The Cloud, Hui Cui, Zhiguo Wan, Deng, Robert H., Guilin Wang, Yingjiu Li
Efficient And Expressive Keyword Search Over Encrypted Data In The Cloud, Hui Cui, Zhiguo Wan, Deng, Robert H., Guilin Wang, Yingjiu Li
Research Collection School Of Computing and Information Systems
Searchable encryption allows a cloud server to conduct keyword search over encrypted data on behalf of the data users without learning the underlying plaintexts. However, most existing searchable encryption schemes only support single or conjunctive keyword search, while a few other schemes that are able to perform expressive keyword search are computationally inefficient since they are built from bilinear pairings over the composite-order groups. In this paper, we propose an expressive public-key searchable encryption scheme in the prime-order groups, which allows keyword search policies (i.e., predicates, access structures) to be expressed in conjunctive, disjunctive or any monotonic Boolean formulas and …
Doas: Efficient Data Owner Authorized Search Over Encrypted Cloud Data, Yibin Miao, Jianfeng Ma, Ximeng Liu, Zhiquan Liu, Junwei Zhang, Fushan Wei
Doas: Efficient Data Owner Authorized Search Over Encrypted Cloud Data, Yibin Miao, Jianfeng Ma, Ximeng Liu, Zhiquan Liu, Junwei Zhang, Fushan Wei
Research Collection School Of Computing and Information Systems
Data outsourcing service can shift the local data storage and maintenance to cloud service provider (CSP) to ease the burden from data owner, but it brings the data security threats as CSP is always considered to honest-but-curious. Therefore, searchable encryption (SE) technique which allows cloud clients (including data owner and data user) to securely search over ciphertext through keywords and selectively retrieve files of interest is of prime importance. However, in practice, data user’s access permission always dynamically varies with data owner’s preferences. Moreover, existing SE schemes which are based on attribute-based encryption (ABE) incur heavy computational burden through attribution …
A Survey Of Security And Privacy In Mobile Cloud Computing, Bhuvaneswari Rayapuri
A Survey Of Security And Privacy In Mobile Cloud Computing, Bhuvaneswari Rayapuri
Masters Theses
Cloud Computing is an emerging technology that provides shared processing resources and data to computers and other devices on demand. On the other hand, Mobile Computing allows transmission of data, voice and video. From these two there emerges a new concept Mobile Cloud Computing which not only overcomes the problems of Mobile Computing but also integrates Cloud Computing into Mobile Environments to overcome obstacles related to Performance, Security and Environment. This paper also provides a decent description on Security and Privacy, its related problems, threats and challenges. This paper first provides details on survey of Mobile Cloud Computing, then it …
Leveraging Resources On Anonymous Mobile Edge Nodes, Ahmed Salem
Leveraging Resources On Anonymous Mobile Edge Nodes, Ahmed Salem
Computer Science Theses & Dissertations
Smart devices have become an essential component in the life of mankind. The quick rise of smartphones, IoTs, and wearable devices enabled applications that were not possible few years ago, e.g., health monitoring and online banking. Meanwhile, smart sensing laid the infrastructure for smart homes and smart cities. The intrusive nature of smart devices granted access to huge amounts of raw data. Researchers seized the moment with complex algorithms and data models to process the data over the cloud and extract as much information as possible. However, the pace and amount of data generation, in addition to, networking protocols transmitting …