Open Access. Powered by Scholars. Published by Universities.®

Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Cloud computing

Physical Sciences and Mathematics

Institution
Publication Year
Publication
Publication Type
File Type

Articles 1 - 30 of 51

Full-Text Articles in Engineering

Cyberattacks And Security Of Cloud Computing: A Complete Guideline, Muhammad Dawood, Shanshan Tu, Chuangbai Xiao, Hisham Alasmary, Muhammad Waqas, Sadaqat Ur Rehman Nov 2023

Cyberattacks And Security Of Cloud Computing: A Complete Guideline, Muhammad Dawood, Shanshan Tu, Chuangbai Xiao, Hisham Alasmary, Muhammad Waqas, Sadaqat Ur Rehman

Research outputs 2022 to 2026

Cloud computing is an innovative technique that offers shared resources for stock cache and server management. Cloud computing saves time and monitoring costs for any organization and turns technological solutions for large-scale systems into server-to-service frameworks. However, just like any other technology, cloud computing opens up many forms of security threats and problems. In this work, we focus on discussing different cloud models and cloud services, respectively. Next, we discuss the security trends in the cloud models. Taking these security trends into account, we move to security problems, including data breaches, data confidentiality, data access controllability, authentication, inadequate diligence, phishing, …


Calculation Of Optimal Vocs Emission Reduction Based On Improved Seirs Model In Cloud Environment, Guangqiu Huang, Xixuan Zhao, Qiuqin Lu Mar 2023

Calculation Of Optimal Vocs Emission Reduction Based On Improved Seirs Model In Cloud Environment, Guangqiu Huang, Xixuan Zhao, Qiuqin Lu

Journal of System Simulation

Abstract: Volatile organic compounds (VOCs) emissions in different regions are correlated and influenced. In order to minimize the impact of VOCs on the atmospheric environment and achieve synergistic governance of VOCs regions, an optimal emission reduction model is established with the maximum VOCs emission reduction as the primary goal. An improved SEIRS infectious disease dynamics optimization algorithm considering environmental pollution(SEIRS-CE) is proposed and the model is solved in cloud environment. Taking Xi'an city as an example, the SEIRS-CE algorithm is used in Ali cloud server to calculate the emission reduction of VOCs associated with 13 meteorological monitoring stations in Xi …


Development Opportunities And Application Prospects Of Aero-Engine Simulation Technology Under Digital Transformation, Jianguo Cao Jan 2023

Development Opportunities And Application Prospects Of Aero-Engine Simulation Technology Under Digital Transformation, Jianguo Cao

Journal of System Simulation

Abstract: The development of China's social economy and the improvement of its national defense capability in the new era put forward higher requirements for the development of aero-engines. It is urgent to promote the digital transformation of aero-engines in order to achieve coordinated, agile and efficient aero-engine development. Based on the current research and development of aero-engine in China, this paper clarifies the new connotation of "speediness and efficiency, accurate mapping, comprehensive coverage, and dynamic prediction" given by the development of emerging cutting-edge technologies to aero-engine simulation technology, as well as the new technical features of "spatio-temporal ubiquity, data driven, …


Blmdp: A New Bi-Level Markov Decision Process Approach To Joint Bidding Andtask-Scheduling In Cloud Spot Market, Mona Naghdehforoushha, Mehdi Dehghan Takht Fooladi, Mohammad Hossein Rezvani, Mohammad Mehdi Gilanian Sadeghi May 2022

Blmdp: A New Bi-Level Markov Decision Process Approach To Joint Bidding Andtask-Scheduling In Cloud Spot Market, Mona Naghdehforoushha, Mehdi Dehghan Takht Fooladi, Mohammad Hossein Rezvani, Mohammad Mehdi Gilanian Sadeghi

Turkish Journal of Electrical Engineering and Computer Sciences

In the cloud computing market (CCM), computing services are traded between cloud providers and consumers in the form of the computing capacity of virtual machines (VMs). The Amazon spot market is one of the most well-known markets in which the surplus capacity of data centers is auctioned off in the form of VMs at relatively low prices. For each submitted task, the user can offer a price that is higher than the current price. However, uncertainty in the market environment confronts the user with challenges such as the variable price of VMs and the variable number of users. An appropriate …


Big Data With Cloud Computing: Discussions And Challenges, Amanpreet Kaur Sandhu Mar 2022

Big Data With Cloud Computing: Discussions And Challenges, Amanpreet Kaur Sandhu

Big Data Mining and Analytics

With the recent advancements in computer technologies, the amount of data available is increasing day by day. However, excessive amounts of data create great challenges for users. Meanwhile, cloud computing services provide a powerful environment to store large volumes of data. They eliminate various requirements, such as dedicated space and maintenance of expensive computer hardware and software. Handling big data is a time-consuming task that requires large computational clusters to ensure successful data storage and processing. In this work, the definition, classification, and characteristics of big data are discussed, along with various cloud services, such as Microsoft Azure, Google Cloud, …


Job Scheduling And Simulation In Cloud Based On Deep Reinforcement Learning, Qirui Li, Xinyi Peng Feb 2022

Job Scheduling And Simulation In Cloud Based On Deep Reinforcement Learning, Qirui Li, Xinyi Peng

Journal of System Simulation

Abstract: To solve the difficulty in job scheduling in the complex and transient multi-user, multi-queue, and multi-data-center cloud computing environment, this paper proposed a job scheduling method based on deep reinforcement learning. A system model of cloud job scheduling and its mathematical model were built, and an optimization goal consisting of transmission time, waiting time, and execution time was obtained. A job scheduling algorithm based on deep reinforcement learning was designed, and its state space, action space, and reward function were given. A simulated cloud job scheduler was designed and developed, and simulated scheduling experiments were conducted on it. The …


A Cloud Computing-Based Dashboard For The Visualization Of Motivational Interviewing Metrics, E Jinq Heng Jan 2022

A Cloud Computing-Based Dashboard For The Visualization Of Motivational Interviewing Metrics, E Jinq Heng

Browse all Theses and Dissertations

Motivational Interviewing (MI) is an evidence-based brief interventional technique that has been demonstrated to be effective in triggering behavior change in patients. To facilitate behavior change, healthcare practitioners adopt a nonconfrontational, empathetic dialogic style, a core component of MI. Despite its advantages, MI has been severely underutilized mainly due to the cognitive overload on the part of the MI dialogue evaluator, who has to assess MI dialogue in real-time and calculate MI characteristic metrics (number of open-ended questions, close-ended questions, reflection, and scale-based sentences) for immediate post-session evaluation both in MI training and clinical settings. To automate dialogue assessment and …


Generic Design Methodology For Smart Manufacturing Systems From A Practical Perspective, Part I—Digital Triad Concept And Its Application As A System Reference Model, Zhuming Bi, Wen-Jun Zhang, Chong Wu, Chaomin Luo, Lida Xu Jan 2021

Generic Design Methodology For Smart Manufacturing Systems From A Practical Perspective, Part I—Digital Triad Concept And Its Application As A System Reference Model, Zhuming Bi, Wen-Jun Zhang, Chong Wu, Chaomin Luo, Lida Xu

Information Technology & Decision Sciences Faculty Publications

Rapidly developed information technologies (IT) have continuously empowered manufacturing systems and accelerated the evolution of manufacturing system paradigms, and smart manufacturing (SM) has become one of the most promising paradigms. The study of SM has attracted a great deal of attention for researchers in academia and practitioners in industry. However, an obvious fact is that people with different backgrounds have different expectations for SM, and this has led to high diversity, ambiguity, and inconsistency in terms of definitions, reference models, performance matrices, and system design methodologies. It has been found that the state of the art SM research is limited …


A Novel Data Placement Strategy To Reduce Data Traffic During Run-Time, Sridevi Sridhar, Rhymend Uthariaraj Vaidyanathan Jan 2021

A Novel Data Placement Strategy To Reduce Data Traffic During Run-Time, Sridevi Sridhar, Rhymend Uthariaraj Vaidyanathan

Turkish Journal of Electrical Engineering and Computer Sciences

High impact scientific applications processed in distributed data centers often involve big data. To avoid the intolerable delays due to huge data movements across data centers during processing, the concept of moving tasks to data was introduced in the last decade. Even after the realization of this concept termed as data locality, the expected quality of service was not achieved. Later, data colocality was introduced where data groupings were identified and then data chunks were placed wisely. However, the aspect of the expected data traffic during run time is generally not considered while placing data. To identify the expected data …


Distributed Denial Of Service Attack Detection In Cloud Computing Using Hybridextreme Learning Machine, Gopal Singh Kushwah, Virender Ranga Jan 2021

Distributed Denial Of Service Attack Detection In Cloud Computing Using Hybridextreme Learning Machine, Gopal Singh Kushwah, Virender Ranga

Turkish Journal of Electrical Engineering and Computer Sciences

One of the major security challenges in cloud computing is distributed denial of service (DDoS) attacks. In these attacks, multiple nodes are used to attack the cloud by sending huge traffic. This results in the unavailability of cloud services to legitimate users. In this research paper, a hybrid machine learning-based technique has been proposed to detect these attacks. The proposed technique is implemented by combining the extreme learning machine (ELM) model and the blackhole optimization algorithm. Various experiments have been performed with the help of four benchmark datasets namely, NSL KDD, ISCX IDS 2012, CICIDS2017, and CICDDoS2019, to evaluate the …


Performance Optimization Of Big Data Computing Workflows For Batch And Stream Data Processing In Multi-Clouds, Huiyan Cao Dec 2020

Performance Optimization Of Big Data Computing Workflows For Batch And Stream Data Processing In Multi-Clouds, Huiyan Cao

Dissertations

Workflow techniques have been widely used as a major computing solution in many science domains. With the rapid deployment of cloud infrastructures around the globe and the economic benefits of cloud-based computing and storage services, an increasing number of scientific workflows have migrated or are in active transition to clouds. As the scale of scientific applications continues to grow, it is now common to deploy various data- and network-intensive computing workflows such as serial computing workflows, MapReduce/Spark-based workflows, and Storm-based stream data processing workflows in multi-cloud environments, where inter-cloud data transfer oftentimes plays a significant role in both workflow performance …


Efficient Fine-Grained Data Sharing Mechanism For Electronic Medical Record Systems With Mobile Devices, Hui Ma, Rui Zhang, Guomin Yang, Zishuai Zong, Kai He, Yuting Xiao Sep 2020

Efficient Fine-Grained Data Sharing Mechanism For Electronic Medical Record Systems With Mobile Devices, Hui Ma, Rui Zhang, Guomin Yang, Zishuai Zong, Kai He, Yuting Xiao

Research Collection School Of Computing and Information Systems

Sharing digital medical records on public cloud storage via mobile devices facilitates patients (doctors) to get (offer) medical treatment of high quality and efficiency. However, challenges such as data privacy protection, flexible data sharing, efficient authority delegation, computation efficiency optimization, are remaining toward achieving practical fine-grained access control in the Electronic Medical Record (EMR) system. In this work, we propose an innovative access control model and a fine-grained data sharing mechanism for EMR, which simultaneously achieves the above-mentioned features and is suitable for resource-constrained mobile devices. In the model, complex computation is outsourced to public cloud servers, leaving almost no …


Energy And Performance-Optimized Scheduling Of Tasks In Distributed Cloud And Edge Computing Systems, Haitao Yuan Aug 2020

Energy And Performance-Optimized Scheduling Of Tasks In Distributed Cloud And Edge Computing Systems, Haitao Yuan

Dissertations

Infrastructure resources in distributed cloud data centers (CDCs) are shared by heterogeneous applications in a high-performance and cost-effective way. Edge computing has emerged as a new paradigm to provide access to computing capacities in end devices. Yet it suffers from such problems as load imbalance, long scheduling time, and limited power of its edge nodes. Therefore, intelligent task scheduling in CDCs and edge nodes is critically important to construct energy-efficient cloud and edge computing systems. Current approaches cannot smartly minimize the total cost of CDCs, maximize their profit and improve quality of service (QoS) of tasks because of aperiodic arrival …


Towards Dynamic Vehicular Clouds, Aida Ghazizadeh Aug 2020

Towards Dynamic Vehicular Clouds, Aida Ghazizadeh

Computer Science Theses & Dissertations

Motivated by the success of the conventional cloud computing, Vehicular Clouds were introduced as a group of vehicles whose corporate computing, sensing, communication, and physical resources can be coordinated and dynamically allocated to authorized users. One of the attributes that set Vehicular Clouds apart from conventional clouds is resource volatility. As vehicles enter and leave the cloud, new computing resources become available while others depart, creating a volatile environment where the task of reasoning about fundamental performance metrics becomes very challenging. The goal of this thesis is to design an architecture and model for a dynamic Vehicular Cloud built on …


Qos-Aware Scheduling For Data Intensive Workflow, Wan Cong, Cuirong Wang, Wang Cong Jul 2020

Qos-Aware Scheduling For Data Intensive Workflow, Wan Cong, Cuirong Wang, Wang Cong

Journal of System Simulation

Abstract: The development of technology enables people to access resources from different data centers. Resource management and scheduling of applications, such as workflow, that are deployed on the cloud computing environment have already become a hot spot. A QoS-aware scheduling algorithm for data intensive workflow on multiple data center environment was proposed. Scheduling data intensive workflow on multiple data center environment has two characteristics: A large amount of data is distributed in different geographical locations, the process of data migration will consume a large amount of time and bandwidth; secondly, the data centers have different price and resources. Data migration …


Information Collaboration Model Of Cloud Computing Supply Chain Based On Multi-Agent, Wuxue Jiang, Xuanzi Hu, Minxia Liu, Yuqiang Chen Jul 2020

Information Collaboration Model Of Cloud Computing Supply Chain Based On Multi-Agent, Wuxue Jiang, Xuanzi Hu, Minxia Liu, Yuqiang Chen

Journal of System Simulation

Abstract: In order to improve the work efficiency of supply chain in cloud computing and avoid the risks of cloud computing, a cloud-based supply chain information coordination model was proposed. The model has two basic states which are online status and offline status, at online state the cloud computing center is responsible for coordination of the entire supply chain information, and at offline state each node continues to complete the transaction order through the history record and each node information in the cloud data center. Simulation based on Multi-agent shows that the order completion rate in offline status is …


Performance Modeling Of Cryptographic Service System Virtualization Based On Issm, Songhui Guo, Qingbao Li, Sun Lei, Xuerong Gong, Tianchi Yang Jun 2020

Performance Modeling Of Cryptographic Service System Virtualization Based On Issm, Songhui Guo, Qingbao Li, Sun Lei, Xuerong Gong, Tianchi Yang

Journal of System Simulation

Abstract: The complicated architecture of cryptographic service system virtualization raised the difficulty of performance modeling. A performance modeling approach based on ISSMs was proposed. The approach divided the execution process into two stages, host preprocessing and arithmetic-module calculating, and built two sub-models based on queuing theory. On this basis, the effectiveness of this approach was verified. The results show that this method can analyze the impacts on system performance caused by task arrival rates, host and cryptographic card configurations quantitatively, and also be helpful for providing reasonable solutions to deploy virtualized cryptographic service system on cloud computing platforms.


Ml-Medic: A Preliminary Study Of An Interactive Visual Analysis Tool Facilitating Clinical Applications Of Machine Learning For Precision Medicine, Laura Stevens, David Kao, Jennifer Hall, Carsten Görg, Kaitlyn Abdo, Erik Linstead May 2020

Ml-Medic: A Preliminary Study Of An Interactive Visual Analysis Tool Facilitating Clinical Applications Of Machine Learning For Precision Medicine, Laura Stevens, David Kao, Jennifer Hall, Carsten Görg, Kaitlyn Abdo, Erik Linstead

Engineering Faculty Articles and Research

Accessible interactive tools that integrate machine learning methods with clinical research and reduce the programming experience required are needed to move science forward. Here, we present Machine Learning for Medical Exploration and Data-Inspired Care (ML-MEDIC), a point-and-click, interactive tool with a visual interface for facilitating machine learning and statistical analyses in clinical research. We deployed ML-MEDIC in the American Heart Association (AHA) Precision Medicine Platform to provide secure internet access and facilitate collaboration. ML-MEDIC’s efficacy for facilitating the adoption of machine learning was evaluated through two case studies in collaboration with clinical domain experts. A domain expert review was also …


A Probabilistic Machine Learning Framework For Cloud Resource Selection On The Cloud, Syeduzzaman Khan Jan 2020

A Probabilistic Machine Learning Framework For Cloud Resource Selection On The Cloud, Syeduzzaman Khan

University of the Pacific Theses and Dissertations

The execution of the scientific applications on the Cloud comes with great flexibility, scalability, cost-effectiveness, and substantial computing power. Market-leading Cloud service providers such as Amazon Web service (AWS), Azure, Google Cloud Platform (GCP) offer various general purposes, memory-intensive, and compute-intensive Cloud instances for the execution of scientific applications. The scientific community, especially small research institutions and undergraduate universities, face many hurdles while conducting high-performance computing research in the absence of large dedicated clusters. The Cloud provides a lucrative alternative to dedicated clusters, however a wide range of Cloud computing choices makes the instance selection for the end-users. This thesis …


Modeling And Simulation Of Complex Equipment Health Management System Based On Cloud Computing, Tianrui Zhang, Chuansheng Qu, Baoku Wu, Jianan Xu Dec 2019

Modeling And Simulation Of Complex Equipment Health Management System Based On Cloud Computing, Tianrui Zhang, Chuansheng Qu, Baoku Wu, Jianan Xu

Journal of System Simulation

Abstract: For complex equipment operation safely, the health management problems of complex equipment life cycle is analyzed. In order to realize remote service, complex equipment health management mode based on cloud computing is proposed. Aiming at the accuracy problem in the process of extracting and recognizing complex equipment characteristic data, the feature knowledge acquisition method based on ontology is researched, and the expression and acquisition algorithm of state characteristic knowledge is proposed. A task sequencing algorithm faults based on fuzzy comprehensive evaluation method is proposed, an appropriate task assignment model is selected for scheduling health management technicians. …


A Cloud Service Composition Optimization Based On Hnn, Huili Zhang, Zhihe Li Dec 2019

A Cloud Service Composition Optimization Based On Hnn, Huili Zhang, Zhihe Li

Journal of System Simulation

Abstract: With the rapid development of Cloud service application, how to effectively optimize the composition of Cloud services on cloud platform and improve the overall performance of cloud platform system have become an urgent research issue. In order to improve the efficiency of Cloud services, a combined optimization model based on Hopfield neural network is proposed. The problem of Cloud services is modeled. The problem is expressed as Hopfield Neural Network energy model for optimization, and a PSO group algorithm with Cauchy disturbance is designed to improve the Hopfield model. The experimental comparison shows that the method can improve …


Fog Computing Enabling Industrial Internet Of Things: State-Of-The-Art And Research Challenges, Rabeea Basir, Saad Qaisar, Mudassar Ali, Monther Aldwairi, Muhammad Ikram Ashraf, Aamir Mahmood, Mikael Gidlund Nov 2019

Fog Computing Enabling Industrial Internet Of Things: State-Of-The-Art And Research Challenges, Rabeea Basir, Saad Qaisar, Mudassar Ali, Monther Aldwairi, Muhammad Ikram Ashraf, Aamir Mahmood, Mikael Gidlund

All Works

© 2019 by the authors. Licensee MDPI, Basel, Switzerland. Industry is going through a transformation phase, enabling automation and data exchange in manufacturing technologies and processes, and this transformation is called Industry 4.0. Industrial Internet-of-Things (IIoT) applications require real-time processing, near-by storage, ultra-low latency, reliability and high data rate, all of which can be satisfied by fog computing architecture. With smart devices expected to grow exponentially, the need for an optimized fog computing architecture and protocols is crucial. Therein, efficient, intelligent and decentralized solutions are required to ensure real-time connectivity, reliability and green communication. In this paper, we provide a …


Cloud Job Scheduling Model Based On Improved Plant Growth Algorithm, Li Qiang, Xiaofeng Liu Jan 2019

Cloud Job Scheduling Model Based On Improved Plant Growth Algorithm, Li Qiang, Xiaofeng Liu

Journal of System Simulation

Abstract: The performance of cloud job scheduling algorithm has a great importance to the whole cloud system. The key factors that affect cloud operation scheduling are found out, and a resource constraint model is established. The existing simulation plant growth algorithm is improved based on the Logistic model of plant growth law, so that the plant growth way was made to change according to the energy power. The comparison of four different plant models was carried out and their different features were analyzed. Compared with 6 typical cloud job scheduling algorithms, it is concluded that the improved simulation plant growth …


Cloud-Supported Machine Learning System For Context-Aware Adaptive M-Learning, Muhammad Adnan, Asad Habib, Jawad Ashraf, Shafaq Mussadiq Jan 2019

Cloud-Supported Machine Learning System For Context-Aware Adaptive M-Learning, Muhammad Adnan, Asad Habib, Jawad Ashraf, Shafaq Mussadiq

Turkish Journal of Electrical Engineering and Computer Sciences

It is a knotty task to amicably identify the sporadically changing real-world context information of a learner during M-learning processes. Contextual information varies greatly during the learning process. Contextual information that affects the learner during a learning process includes background knowledge, learning time, learning location, and environmental situation. The computer programming skills of learners improve rapidly if they are encouraged to solve real-world programming problems. It is important to guide learners based on their contextual information in order to maximize their learning performance. In this paper, we proposed a cloud-supported machine learning system (CSMLS), which assists learners in learning practical …


A Novel Resource Clustering Model To Develop An Efficient Wireless Personal Cloud Environment, Kowsigan Mohan, Balasubramanie Palanisamy Jan 2019

A Novel Resource Clustering Model To Develop An Efficient Wireless Personal Cloud Environment, Kowsigan Mohan, Balasubramanie Palanisamy

Turkish Journal of Electrical Engineering and Computer Sciences

In the current era, cloud computing is the major focus of distributed computing and it helps in satisfying the requirements of the business world. It provides facilities on demand under all the parameters of the computing, such as infrastructure, platform, and software, across the globe. One of the major challenges in the cloud environment is to cluster the resources and schedule the jobs among the resource clusters. Many existing approaches failed to provide an optimal solution for job scheduling due to inefficient clustering of resources. In the proposed system, a novel algorithm called resource differentiation based on equivalence node potential …


Storage Systems For Mobile-Cloud Applications, Nafize R. Paiker Dec 2018

Storage Systems For Mobile-Cloud Applications, Nafize R. Paiker

Dissertations

Mobile devices have become the major computing platform in todays world. However, some apps on mobile devices still suffer from insufficient computing and energy resources. A key solution is to offload resource-demanding computing tasks from mobile devices to the cloud. This leads to a scenario where computing tasks in the same application run concurrently on both the mobile device and the cloud.

This dissertation aims to ensure that the tasks in a mobile app that employs offloading can access and share files concurrently on the mobile and the cloud in a manner that is efficient, consistent, and transparent to locations. …


Privacy-Preserving Mining Of Association Rule On Outsourced Cloud Data From Multiple Parties, Lin Liu, Jinshu Su, Rongmao Chen, Ximeng Liu, Xiaofeng Wang, Shuhui Chen, Ho-Fung Fung Leung Jul 2018

Privacy-Preserving Mining Of Association Rule On Outsourced Cloud Data From Multiple Parties, Lin Liu, Jinshu Su, Rongmao Chen, Ximeng Liu, Xiaofeng Wang, Shuhui Chen, Ho-Fung Fung Leung

Research Collection School Of Computing and Information Systems

It has been widely recognized as a challenge to carry out data analysis and meanwhile preserve its privacy in the cloud. In this work, we mainly focus on a well-known data analysis approach namely association rule mining. We found that the data privacy in this mining approach have not been well considered so far. To address this problem, we propose a scheme for privacy-preserving association rule mining on outsourced cloud data which are uploaded from multiple parties in a twin-cloud architecture. In particular, we mainly consider the scenario where the data owners and miners have different encryption keys that are …


Machs: Mitigating The Achilles Heel Of The Cloud Through High Availability And Performance-Aware Solutions, Manar Jammal Apr 2017

Machs: Mitigating The Achilles Heel Of The Cloud Through High Availability And Performance-Aware Solutions, Manar Jammal

Electronic Thesis and Dissertation Repository

Cloud computing is continuously growing as a business model for hosting information and communication technology applications. However, many concerns arise regarding the quality of service (QoS) offered by the cloud. One major challenge is the high availability (HA) of cloud-based applications. The key to achieving availability requirements is to develop an approach that is immune to cloud failures while minimizing the service level agreement (SLA) violations. To this end, this thesis addresses the HA of cloud-based applications from different perspectives. First, the thesis proposes a component’s HA-ware scheduler (CHASE) to manage the deployments of carrier-grade cloud applications while maximizing their …


Efficient Revocable Id-Based Signature With Cloud Revocation Server, Xiaoying Jia, Debiao He, Sherali Zeadally, Li Li Mar 2017

Efficient Revocable Id-Based Signature With Cloud Revocation Server, Xiaoying Jia, Debiao He, Sherali Zeadally, Li Li

Information Science Faculty Publications

Over the last few years, identity-based cryptosystem (IBC) has attracted widespread attention because it avoids the high overheads associated with public key certificate management. However, an unsolved but critical issue about IBC is how to revoke a misbehaving user. There are some revocable identity-based encryption schemes that have been proposed recently, but little work on the revocation problem of identity-based signature has been undertaken so far. One approach for revocation in identity-based settings is to update users' private keys periodically, which is usually done by the key generation center (KGC). But with this approach, the load on the KGC will …


Hadoop Framework Implementation And Performance Analysis On A Cloud, Göksu Zeki̇ye Özen, Mehmet Tekerek, Rayi̇mbek Sultanov Jan 2017

Hadoop Framework Implementation And Performance Analysis On A Cloud, Göksu Zeki̇ye Özen, Mehmet Tekerek, Rayi̇mbek Sultanov

Turkish Journal of Electrical Engineering and Computer Sciences

The Hadoop framework uses the MapReduce programming paradigm to process big data by distributing data across a cluster and aggregating. MapReduce is one of the methods used to process big data hosted on large clusters. In this method, jobs are processed by dividing into small pieces and distributing over nodes. Parameters such as distributing method over nodes, the number of jobs held in a parallel fashion, and the number of nodes in the cluster affect the execution time of jobs. The aim of this paper is to determine how the numbers of nodes, maps, and reduces affect the performance of …