Open Access. Powered by Scholars. Published by Universities.®

Digital Commons Network

Open Access. Powered by Scholars. Published by Universities.®

Cloud computing

2018

Discipline
Institution
Publication
Publication Type

Articles 1 - 30 of 43

Full-Text Articles in Entire DC Network

Storage Systems For Mobile-Cloud Applications, Nafize R. Paiker Dec 2018

Storage Systems For Mobile-Cloud Applications, Nafize R. Paiker

Dissertations

Mobile devices have become the major computing platform in todays world. However, some apps on mobile devices still suffer from insufficient computing and energy resources. A key solution is to offload resource-demanding computing tasks from mobile devices to the cloud. This leads to a scenario where computing tasks in the same application run concurrently on both the mobile device and the cloud.

This dissertation aims to ensure that the tasks in a mobile app that employs offloading can access and share files concurrently on the mobile and the cloud in a manner that is efficient, consistent, and transparent to locations. …


Authorized Function Homomorphic Signature, Qingwen Guo, Qiong Huang, Guomin Yang Dec 2018

Authorized Function Homomorphic Signature, Qingwen Guo, Qiong Huang, Guomin Yang

Research Collection School Of Computing and Information Systems

Homomorphic signature (HS) is a novel primitive that allows an agency to carry out arbitrary (polynomial time) computation f on the signed data (m) over right arrow and accordingly gain a signature sigma(h) for the computation result f ((m) over right arrow) with respect to f on behalf of the data owner (DO). However, since DO lacks control of the agency's behavior, receivers would believe that DO did authenticate the computation result even if the agency misbehaves and applies a function that the DO does not want. To address the problem above, in this paper we introduce a new primitive …


The Impacts Of Cloud Computing And Big Data Applications On Developing World-Based Smallholder Farmers, Nir Kshetri Nov 2018

The Impacts Of Cloud Computing And Big Data Applications On Developing World-Based Smallholder Farmers, Nir Kshetri

International Journal of Business and Technology

Cloud computing and big data applications are likely to have far-reaching and profound impacts on developing world-based smallholder farmers. Especially, the use of mobile devices to access cloudbased applications is a promising approach to deliver value to smallholder farmers in developing countries since according to the International Telecommunication Union, mobile-cellular penetration in developing countries is expected to reach 90% by the end of 2014. This article examines the contexts, mechanisms, processes and consequences associated with cloud computing and big data deployments in farming activities that could affect the lives of developing world-based smallholder farmers. We analyze the roles of big …


Vpsearch: Achieving Verifiability For Privacy-Preserving Multi-Keyword Search Over Encrypted Cloud Data, Zhiguo Wan, Robert H. Deng Nov 2018

Vpsearch: Achieving Verifiability For Privacy-Preserving Multi-Keyword Search Over Encrypted Cloud Data, Zhiguo Wan, Robert H. Deng

Research Collection School Of Computing and Information Systems

Although cloud computing offers elastic computation and storage resources, it poses challenges on verifiability of computations and data privacy. In this work we investigate verifiability for privacy-preserving multi-keyword search over outsourced documents. As the cloud server may return incorrect results due to system faults or incentive to reduce computation cost, it is critical to offer verifiability of search results and privacy protection for outsourced data at the same time. To fulfill these requirements, we design aVerifiablePrivacy-preserving keywordSearch scheme, called VPSearch, by integrating an adapted homomorphic MAC technique with a privacy-preserving multi-keyword search scheme. The proposed scheme enables the client to …


Leveraging Technology To Achieve Food Security In Nigeria, Femi Royal Nov 2018

Leveraging Technology To Achieve Food Security In Nigeria, Femi Royal

Young African Leaders Journal of Development

In Nigeria today, hunger prevalence is on the rise and in paying attention to the country's food production level, the difficulty experienced in meeting domestic food needs and the challenge in exporting our local products, it is easy to conclude that Nigeria Is food insecure. The petroleum based economic model of the Nigerian economy has made it lose its force as an export led economy and as the government makes effort to diversify the economy towards achieving food security, it is important to learn about how technology can help achieve this objective. This paper reviews recent attempts by some Nigerian …


System Support For Managing Risk In Cloud Computing Platforms, Supreeth Shastri Oct 2018

System Support For Managing Risk In Cloud Computing Platforms, Supreeth Shastri

Doctoral Dissertations

Cloud platforms sell computing to applications for a price. However, by precisely defining and controlling the service-level characteristics of cloud servers, they expose applications to a number of implicit risks throughout the application’s lifecycle. For example, user’s request for a server may be denied, leading to rejection risk; an allocated resource may be withdrawn, resulting in revocation risk; an acquired cloud server’s price may rise relative to others, causing price risk; a cloud server’s performance may vary due to external factors, triggering valuation risk. Though these risks are implicit, the costs they bear on the applications are not. While some …


Service Innovation In The Cloud: Implications For Strategy Development, Robert R. Harmon, Enrique G. Castro-Leon Oct 2018

Service Innovation In The Cloud: Implications For Strategy Development, Robert R. Harmon, Enrique G. Castro-Leon

Engineering and Technology Management Faculty Publications and Presentations

Cloud enterprises have shifted from linear to networked business models through a value transformation process centered on the development of multisided service platforms. These platforms facilitate service exchange and value cocreation by enabling three essential transitions: 1. from control to orchestration of enterprise resources, 2. from internal optimization to external interactions, and 3. from customer value to ecosystem value. Innovative service transformation is most in evidence with enterprises that are native cloud companies or companies that have more rapidly and effectively adopted ecosystem-based service platforms such as Netflix, Google, Facebook, Uber and Airbnb. Service ecosystems enable the critical processes for …


A Lightweight Cloud Sharing Phr System With Access Policy Updating, Zuobin Ying, Wenjie Jang, Shuanlong Cao, Ximeng Liu, Jie Cui Oct 2018

A Lightweight Cloud Sharing Phr System With Access Policy Updating, Zuobin Ying, Wenjie Jang, Shuanlong Cao, Ximeng Liu, Jie Cui

Research Collection School Of Computing and Information Systems

The rapid development of smart wearable devices makes personal health management feasible, which also stimulates the evolution of personal health records (PHRs). However, PHRs face many security challenges ever since it has been created. Besides, the complicated policy adjusting operation makes the PHRs stored in the cloud not so easy to use. In this paper, we propose a lightweight PHRs system on the basis of attribute-based encryption with policy updating. To update an outsourced ciphertext PHRs in the cloud, PHRs owners only need to generate an updating key, then upload it to the cloud server instead of retrieving the entire …


Innovation In Rangeland Monitoring: Annual, 30 M, Plant Functional Type Percent Cover Maps For U.S. Rangelands, 1984-2017, Matthew O. Jones, Brady W. Allred, David E. Naugle, Jeremy D. Maestas, Patrick Donnelly, Loretta J. Metz, Jason Karl, Rob Smith, Brandon Bestelmeyer, Chad Boyd, Jay D. Kerby, James D. Mciver Sep 2018

Innovation In Rangeland Monitoring: Annual, 30 M, Plant Functional Type Percent Cover Maps For U.S. Rangelands, 1984-2017, Matthew O. Jones, Brady W. Allred, David E. Naugle, Jeremy D. Maestas, Patrick Donnelly, Loretta J. Metz, Jason Karl, Rob Smith, Brandon Bestelmeyer, Chad Boyd, Jay D. Kerby, James D. Mciver

Articles

Innovations in machine learning and cloud‐based computing were merged with historical remote sensing and field data to provide the first moderate resolution, annual, percent cover maps of plant functional types across rangeland ecosystems to effectively and efficiently respond to pressing challenges facing conservation of biodiversity and ecosystem services. We utilized the historical Landsat satellite record, gridded meteorology, abiotic land surface data, and over 30,000 field plots within a Random Forests model to predict per‐pixel percent cover of annual forbs and grasses, perennial forbs and grasses, shrubs, and bare ground over the western United States from 1984 to 2017. Results were …


A Strategic Value Appropriation Path For Cloud Computing, Abhishek Kathuria, Arti Mann, Jiban Khuntia, Robert J. Kauffman Sep 2018

A Strategic Value Appropriation Path For Cloud Computing, Abhishek Kathuria, Arti Mann, Jiban Khuntia, Robert J. Kauffman

Research Collection School Of Computing and Information Systems

Cloud-based information management is one of the leading competitive differentiation strategies for firms. With the increasing criticality of information management in value creation and process support, establishing an integrated capability with cloud computing is vital for organizational success in the changing landscape of business competition. These issues have received scant attention, however. We draw on the resource-based view, dynamic capability hierarchy concepts, and the perspective of operand and operant resources to suggest a cloud value appropriation model for firms. We argue that, to appropriate business value from cloud computing, the firm needs to effectively deploy cloud computing and leverage cloud …


Rationality And Efficient Verifiable Computation, Matteo Campanelli Sep 2018

Rationality And Efficient Verifiable Computation, Matteo Campanelli

Dissertations, Theses, and Capstone Projects

In this thesis, we study protocols for delegating computation in a model where one of the parties is rational. In our model, a delegator outsources the computation of a function f on input x to a worker, who receives a (possibly monetary) reward. Our goal is to design very efficient delegation schemes where a worker is economically incentivized to provide the correct result f(x). In this work we strive for not relying on cryptographic assumptions, in particular our results do not require the existence of one-way functions.

We provide several results within the framework of rational proofs introduced by Azar …


Big Data Methods For Environmental Data, Wu Bingfang, Zhang Xin, Zeng Hongwei, Zhang Miao, Tian Fuyou Aug 2018

Big Data Methods For Environmental Data, Wu Bingfang, Zhang Xin, Zeng Hongwei, Zhang Miao, Tian Fuyou

Bulletin of Chinese Academy of Sciences (Chinese Version)

Resource and environmental monitoring have always been an important part of land sustainable management which ground survey and remote sensing monitoring are two fundamental ways. The crowd sourcing geographic data (CSGD) brought by smart phones provides new opportunity for the ground investigation of resources and environment. Meanwhile, the rapid development of cloud computing makes it possible to allow people to process massive remote sensing data much more efficient and accurate. Compared with traditional data acquisition methods, data in the cloud is easier to acquire and process. Based on this, a big data method for environment monitoring is introduced based on …


Collaborative Heroism: An Empirical Investigation, Dana Klisanin Jul 2018

Collaborative Heroism: An Empirical Investigation, Dana Klisanin

Heroism Science

Interactive technologies have come to define our culture, and as such, they influence and shape our modes of perception and behavior. This empirical investigation explored the public’s perception of the impact of the Internet on heroism via assessment of a sample population through a process of item generation, sampling, and principal component analysis. A robust 5-component structure emerged with consensus among participants including: 1) Collaboration expands heroic potential; 2) Internet technology expands heroic potential; 3) Heroes are motivated to protect and serve; 4) Heroes are responsive to injustice; 5) Concern for others is a required ingredient. The results extend research …


Recurrent Tumor-Specific Regulation Of Alternative Polyadenylation Of Cancer-Related Genes., Zhuyi Xue, René L Warren, Ewan A Gibb, Daniel Macmillan, Johnathan Wong, Readman Chiu, S Austin Hammond, Chen Yang, Ka Ming Nip, Catherine A Ennis, Abigail Hahn, Sheila Reynolds, Inanc Birol Jul 2018

Recurrent Tumor-Specific Regulation Of Alternative Polyadenylation Of Cancer-Related Genes., Zhuyi Xue, René L Warren, Ewan A Gibb, Daniel Macmillan, Johnathan Wong, Readman Chiu, S Austin Hammond, Chen Yang, Ka Ming Nip, Catherine A Ennis, Abigail Hahn, Sheila Reynolds, Inanc Birol

Articles, Abstracts, and Reports

BACKGROUND: Alternative polyadenylation (APA) results in messenger RNA molecules with different 3' untranslated regions (3' UTRs), affecting the molecules' stability, localization, and translation. APA is pervasive and implicated in cancer. Earlier reports on APA focused on 3' UTR length modifications and commonly characterized APA events as 3' UTR shortening or lengthening. However, such characterization oversimplifies the processing of 3' ends of transcripts and fails to adequately describe the various scenarios we observe.

RESULTS: We built a cloud-based targeted de novo transcript assembly and analysis pipeline that incorporates our previously developed cleavage site prediction tool, KLEAT. We applied this pipeline to …


Privacy-Preserving Mining Of Association Rule On Outsourced Cloud Data From Multiple Parties, Lin Liu, Jinshu Su, Rongmao Chen, Ximeng Liu, Xiaofeng Wang, Shuhui Chen, Ho-Fung Fung Leung Jul 2018

Privacy-Preserving Mining Of Association Rule On Outsourced Cloud Data From Multiple Parties, Lin Liu, Jinshu Su, Rongmao Chen, Ximeng Liu, Xiaofeng Wang, Shuhui Chen, Ho-Fung Fung Leung

Research Collection School Of Computing and Information Systems

It has been widely recognized as a challenge to carry out data analysis and meanwhile preserve its privacy in the cloud. In this work, we mainly focus on a well-known data analysis approach namely association rule mining. We found that the data privacy in this mining approach have not been well considered so far. To address this problem, we propose a scheme for privacy-preserving association rule mining on outsourced cloud data which are uploaded from multiple parties in a twin-cloud architecture. In particular, we mainly consider the scenario where the data owners and miners have different encryption keys that are …


Going Serverless: Evaluating The Potential Of Serverless Computing For Environmental Modeling Application Hosting, Baojia Zhang, Wes J. Lloyd, Olaf David, George Leavesley Jun 2018

Going Serverless: Evaluating The Potential Of Serverless Computing For Environmental Modeling Application Hosting, Baojia Zhang, Wes J. Lloyd, Olaf David, George Leavesley

International Congress on Environmental Modelling and Software

Recently serverless computing platforms have emerged that provide automatic web service hosting in the cloud. These platforms are promoted for their ability to host “micro” services to end users while seamlessly integrating key features including 24/7 high availability, fault tolerance, and automatic scaling of resources to meet user demand. Serverless Computing environments abstract the majority of infrastructure management tasks including VM/container creation, and load balancer configuration. A key benefit of serverless computing is FREE access to cloud computing resources. Many platforms provide free access for up to 1,000,000 service requests/month with 1 GB of memory for 400,000 seconds/month. Additionally, serverless …


The Agricultural Ecosystems Services (Ages) Watershed Model Integrated Into The Environmental Resources Assessment And Management System (Erams) And Cloud Services Integration Platform (Csip), Nathan Lighthart, Olaf David, Timothy R. Green, Gregory S. Mcmaster, David Arden Patterson, Mazdak Arabi, Holm Kipka Jun 2018

The Agricultural Ecosystems Services (Ages) Watershed Model Integrated Into The Environmental Resources Assessment And Management System (Erams) And Cloud Services Integration Platform (Csip), Nathan Lighthart, Olaf David, Timothy R. Green, Gregory S. Mcmaster, David Arden Patterson, Mazdak Arabi, Holm Kipka

International Congress on Environmental Modelling and Software

Distributing models to various users can be difficult and prone to error, and therefore may negatively reflect on the program. Model distribution typically involves users downloading and installing the model following setup instructions. However, if this step is not handled correctly, the model is not able to be used correctly. Deploying a model through a web interface allows the user to focus on running the model rather than ensuring the model is setup correctly. The eRAMS/CSIP platform is designed to provide visual tools for models to be parameterized and connected to input data (eRAMS), and run using a remote web …


Is Google Self-Aware?, Gerry Heapes Jun 2018

Is Google Self-Aware?, Gerry Heapes

Irish Communication Review

The field of artificial intelligence evolves incrementally with gradual improvement over time and has relied on the Turing Test as a measure of progress. However human standards of intelligence measurement may not be appropriate to current developments. The platform of cloud computing now provides a means of implementing a kind of ubiquitous awareness unknown to humans before now and a means of augmenting human intelligence. The level of awareness held by Google is explored and some recent developments in the uses of AI programmes for social media are covered. The misinterpretation of these developments is explored and a solution proposed. …


Tkse: Trustworthy Keyword Search Over Encrypted Data With Two-Side Verifiability Via Blockchain, Yinghui Zhang, Robert H. Deng, Jiangang Shu, Kan Yang, Dong Zheng Jun 2018

Tkse: Trustworthy Keyword Search Over Encrypted Data With Two-Side Verifiability Via Blockchain, Yinghui Zhang, Robert H. Deng, Jiangang Shu, Kan Yang, Dong Zheng

Research Collection School Of Computing and Information Systems

As a very attractive computing paradigm, cloud computing makes it possible for resource-constrained users to enjoy cost-effective and flexible resources of diversity. Considering the untrustworthiness of cloud servers and the data privacy of users, it is necessary to encrypt the data before outsourcing it to the cloud. However, the form of encrypted storage also poses a series of problems, such as: How can users search over the outsourced data? How to realize user-side verifiability of search results to resist malicious cloud servers? How to enable server-side verifiability of outsourced data to check malicious data owners? How to achieve payment fairness …


Directions And Problems Of Development Of Cloudy Technologies, A. Ruziev, M. Ishankhodjayev Jun 2018

Directions And Problems Of Development Of Cloudy Technologies, A. Ruziev, M. Ishankhodjayev

International Finance and Accounting

The article reviyews the technology of cloud computing, which is considered a revolutionary change in the fiyeld of information and communication technologiyes. The main models of cloud computing services and development trends are considered. The analysis of the development of cloud technologiyes in Uzbekistan and providers of services in this fiyeld was carriyed out.


Security And Privacy In Smart Health: Efficient Policy-Hiding Attribute-Based Access Control, Yinghui Zhang, Dong Zheng, Robert H. Deng Jun 2018

Security And Privacy In Smart Health: Efficient Policy-Hiding Attribute-Based Access Control, Yinghui Zhang, Dong Zheng, Robert H. Deng

Research Collection School Of Computing and Information Systems

With the rapid development of the Internet of Things (IoT) and cloud computing technologies, smart health (s-health) is expected to significantly improve the quality of health care. However, data security and user privacy concerns in s-health have not been adequately addressed. As a well-received solution to realize fine-grained access control, ciphertext-policy attribute-based encryption (CP-ABE) has the potential to ensure data security in s-health. Nevertheless, direct adoption of the traditional CP-ABE in s-health suffers two flaws. For one thing, access policies are in cleartext form and reveal sensitive health-related information in the encrypted s-health records (SHRs). For another, it usually supports …


Survey Of Randomization Defenses On Cloud Computing, Jianming Fu, Yan Lin, Xiuwen Liu, Xu Zhang Jun 2018

Survey Of Randomization Defenses On Cloud Computing, Jianming Fu, Yan Lin, Xiuwen Liu, Xu Zhang

Research Collection School Of Computing and Information Systems

Cloud computing has changed the processing mode on resources of individuals and industries by providing computing and storage services to users. However, existing defenses on cloud, such as virtual machine monitoring and integrity detection, cannot counter against attacks result from the homogeneity and vulnerability of services effectively. In this paper, we have investigated the threats on cloud computing platform from the perspective of cloud service, service interface and network interface, such as code reuse attack, side channel attack and SQL injection. Code reuse attack chains code snippets (gadgets) located in binaries to bypass Data Execution Prevention (DEP). Side channel attack …


Neural Network On Virtualization System, As A Way To Manage Failure Events Occurrence On Cloud Computing, Khoi Minh Pham Jun 2018

Neural Network On Virtualization System, As A Way To Manage Failure Events Occurrence On Cloud Computing, Khoi Minh Pham

Electronic Theses, Projects, and Dissertations

Cloud computing is one important direction of current advanced technology trends, which is dominating the industry in many aspects. These days Cloud computing has become an intense battlefield of many big technology companies, whoever can win this war can have a very high potential to rule the next generation of technologies. From a technical point of view, Cloud computing is classified into three different categories, each can provide different crucial services to users: Infrastructure (Hardware) as a Service (IaaS), Software as a Service (SaaS), and Platform as a Service (PaaS). Normally, the standard measurements for cloud computing reliability level is …


From Geographically Dispersed Data Centers Towards Hierarchical Edge Computing, Abbas Kiani May 2018

From Geographically Dispersed Data Centers Towards Hierarchical Edge Computing, Abbas Kiani

Dissertations

Internet scale data centers are generally dispersed in different geographical regions. While the main goal of deploying the geographically dispersed data centers is to provide redundancy, scalability and high availability, the geographic dispersity provides another opportunity for efficient employment of global resources, e.g., utilizing price-diversity in electricity markets or utilizing locational diversity in renewable power generation. In other words, an efficient approach for geographical load balancing (GLB) across geo-dispersed data centers not only can maximize the utilization of green energy but also can minimize the cost of electricity. However, due to the different costs and disparate environmental impacts of the …


High Performance Cloud Computing On Multicore Computers, Jianchen Shan May 2018

High Performance Cloud Computing On Multicore Computers, Jianchen Shan

Dissertations

The cloud has become a major computing platform, with virtualization being a key to allow applications to run and share the resources in the cloud. A wide spectrum of applications need to process large amounts of data at high speeds in the cloud, e.g., analyzing customer data to find out purchase behavior, processing location data to determine geographical trends, or mining social media data to assess brand sentiment. To achieve high performance, these applications create and use multiple threads running on multicore processors. However, existing virtualization technology cannot support the efficient execution of such applications on virtual machines, making them …


Catching The Cloud And Pinning It Down: The Social And Environmental Impacts Of Data Centers, Heather Ipsen May 2018

Catching The Cloud And Pinning It Down: The Social And Environmental Impacts Of Data Centers, Heather Ipsen

Theses - ALL

As reliance on social media, mobile devices, and computers has grown in developed nations worldwide, data centers have become an important, but poorly understood, part of this digital age. These massive structures, which are increasingly built in rural areas, store digital files and images. Despite the clear importance of cloud computing, geographers have not studied this infrastructure or its effect on nearby communities and the physical environment. This project examines the social and environmental impacts of the development and operation of data centers, using a Facebook data center in Prineville, Oregon as a case study. It explores what impact the …


Efficient And Expressive Keyword Search Over Encrypted Data In The Cloud, Hui Cui, Zhiguo Wan, Deng, Robert H., Guilin Wang, Yingjiu Li May 2018

Efficient And Expressive Keyword Search Over Encrypted Data In The Cloud, Hui Cui, Zhiguo Wan, Deng, Robert H., Guilin Wang, Yingjiu Li

Research Collection School Of Computing and Information Systems

Searchable encryption allows a cloud server to conduct keyword search over encrypted data on behalf of the data users without learning the underlying plaintexts. However, most existing searchable encryption schemes only support single or conjunctive keyword search, while a few other schemes that are able to perform expressive keyword search are computationally inefficient since they are built from bilinear pairings over the composite-order groups. In this paper, we propose an expressive public-key searchable encryption scheme in the prime-order groups, which allows keyword search policies (i.e., predicates, access structures) to be expressed in conjunctive, disjunctive or any monotonic Boolean formulas and …


Doas: Efficient Data Owner Authorized Search Over Encrypted Cloud Data, Yibin Miao, Jianfeng Ma, Ximeng Liu, Zhiquan Liu, Junwei Zhang, Fushan Wei May 2018

Doas: Efficient Data Owner Authorized Search Over Encrypted Cloud Data, Yibin Miao, Jianfeng Ma, Ximeng Liu, Zhiquan Liu, Junwei Zhang, Fushan Wei

Research Collection School Of Computing and Information Systems

Data outsourcing service can shift the local data storage and maintenance to cloud service provider (CSP) to ease the burden from data owner, but it brings the data security threats as CSP is always considered to honest-but-curious. Therefore, searchable encryption (SE) technique which allows cloud clients (including data owner and data user) to securely search over ciphertext through keywords and selectively retrieve files of interest is of prime importance. However, in practice, data user’s access permission always dynamically varies with data owner’s preferences. Moreover, existing SE schemes which are based on attribute-based encryption (ABE) incur heavy computational burden through attribution …


A Survey Of Security And Privacy In Mobile Cloud Computing, Bhuvaneswari Rayapuri Apr 2018

A Survey Of Security And Privacy In Mobile Cloud Computing, Bhuvaneswari Rayapuri

Masters Theses

Cloud Computing is an emerging technology that provides shared processing resources and data to computers and other devices on demand. On the other hand, Mobile Computing allows transmission of data, voice and video. From these two there emerges a new concept Mobile Cloud Computing which not only overcomes the problems of Mobile Computing but also integrates Cloud Computing into Mobile Environments to overcome obstacles related to Performance, Security and Environment. This paper also provides a decent description on Security and Privacy, its related problems, threats and challenges. This paper first provides details on survey of Mobile Cloud Computing, then it …


Leveraging Resources On Anonymous Mobile Edge Nodes, Ahmed Salem Apr 2018

Leveraging Resources On Anonymous Mobile Edge Nodes, Ahmed Salem

Computer Science Theses & Dissertations

Smart devices have become an essential component in the life of mankind. The quick rise of smartphones, IoTs, and wearable devices enabled applications that were not possible few years ago, e.g., health monitoring and online banking. Meanwhile, smart sensing laid the infrastructure for smart homes and smart cities. The intrusive nature of smart devices granted access to huge amounts of raw data. Researchers seized the moment with complex algorithms and data models to process the data over the cloud and extract as much information as possible. However, the pace and amount of data generation, in addition to, networking protocols transmitting …