Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 7 of 7

Full-Text Articles in Physical Sciences and Mathematics

Mobile Cloud Computing: A New Way Of Cloud Computing, Festim Halili, Verda Misimi, Rilinda Iseini, Mirije Salihi Oct 2017

Mobile Cloud Computing: A New Way Of Cloud Computing, Festim Halili, Verda Misimi, Rilinda Iseini, Mirije Salihi

UBT International Conference

Cloud Computing seems to be the most promising technology of the century we are living. It provides a new manner of sharing distributed resources and services that may be part of different organizations, geographically located in different places and different time zones. Mobile Cloud Computing offers partially the same functionality, with the only additional requirement that, at least, some of the devices are mobile. In this paper, we will try to provide a detailed explanation of Mobile Cloud Computing concept by providing different examples, figures and charts showing usage, accessibility, pros and cons and comparison of different cloud platforms.


Green Cloud - Load Balancing, Load Consolidation Using Vm Migration, Manh Duc Do Oct 2017

Green Cloud - Load Balancing, Load Consolidation Using Vm Migration, Manh Duc Do

Masters Theses & Specialist Projects

Recently, cloud computing is a new trend emerging in computer technology with a massive demand from the clients. To meet all requirements, a lot of cloud data centers have been constructed since 2008 when Amazon published their cloud service. The rapidly growing data center leads to the consumption of a tremendous amount of energy even cloud computing has better improved in the performance and energy consumption, but cloud data centers still absorb an immense amount of energy. To raise company’s income annually, the cloud providers start considering green cloud concepts which gives an idea about how to optimize CPU’s usage …


Minimal Coflow Routing And Scheduling In Openflow-Based Cloud Storage Area Networks, Chui Hui Chiu, Dipak Kumar Singh, Qingyang Wang, Kisung Lee, Seung Jong Park Sep 2017

Minimal Coflow Routing And Scheduling In Openflow-Based Cloud Storage Area Networks, Chui Hui Chiu, Dipak Kumar Singh, Qingyang Wang, Kisung Lee, Seung Jong Park

Computer Science Faculty Research & Creative Works

Researches affirm that coflow scheduling/routing substantially shortens the average application inner communication time in data center networks (DCNs). The commonly desirable critical features of existing coflow scheduling/routing framework includes (1) coflow scheduling, (2) coflow routing, and (3) per-flow rate-limiting. However, to provide the 3 features, existing frameworks require customized computing frameworks, customized operating systems, or specific external commercial monitoring frameworks on software-defined networking (SDN) switches. These requirements defer or even prohibit the deployment of coflow scheduling/routing in production DCNs. In this paper, we design a coflow scheduling and routing framework, MinCOF which has minimal requirements on hosts and switches for …


Coflourish: An Sdn-Assisted Coflow Scheduling Framework For Clouds, Chui Hui Chiu, Dipak Kumar Singh, Qingyang Wang, Seung Jong Park Sep 2017

Coflourish: An Sdn-Assisted Coflow Scheduling Framework For Clouds, Chui Hui Chiu, Dipak Kumar Singh, Qingyang Wang, Seung Jong Park

Computer Science Faculty Research & Creative Works

Existing coflow scheduling frameworks effectively shorten communication time and completion time of cluster applications. However, existing frameworks only consider available bandwidth on hosts and overlook congestion in the network when making scheduling decisions. Through extensive simulations using the realistic workload probability distribution from Facebook, we observe the performance degradation of the state-of-the-art coflow scheduling framework, Varys, in the cloud environment on a shared data center network (DCN) because of the lack of network congestion information. We propose Coflourish, the first coflow scheduling framework that exploits the congestion feedback assistances from the software-defined-networking (SDN)-enabled switches in the networks for available bandwidth …


Os2: Oblivious Similarity Based Searching For Encrypted Data Outsourced To An Untrusted Domain, Zeeshan Pervez, Mahmood Ahmad, Asad Masood Khattak, Naeem Ramzan, Wajahat Ali Khan Jul 2017

Os2: Oblivious Similarity Based Searching For Encrypted Data Outsourced To An Untrusted Domain, Zeeshan Pervez, Mahmood Ahmad, Asad Masood Khattak, Naeem Ramzan, Wajahat Ali Khan

All Works

© 2017 Pervez et al. This is an open access article distributed under the terms of the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited. Public cloud storage services are becoming prevalent and myriad data sharing, archiving and collaborative services have emerged which harness the pay-as-you-go business model of public cloud. To ensure privacy and confidentiality often encrypted data is outsourced to such services, which further complicates the process of accessing relevant data by using search queries. Search over encrypted data schemes solve this problem by …


Encrypted Data Processing With Homomorphic Re-Encryption, Wenxiu Ding, Zheng Yan, Robert H. Deng May 2017

Encrypted Data Processing With Homomorphic Re-Encryption, Wenxiu Ding, Zheng Yan, Robert H. Deng

Research Collection School Of Computing and Information Systems

Cloud computing offers various services to users by re-arranging storage and computing resources. In order to preserve data privacy, cloud users may choose to upload encrypted data rather than raw data to the cloud. However, processing and analyzing encrypted data are challenging problems, which have received increasing attention in recent years. Homomorphic Encryption (HE) was proposed to support computation on encrypted data and ensure data confidentiality simultaneously. However, a limitation of HE is it is a single user system, which means it only allows the party that owns a homomorphic decryption key to decrypt processed ciphertexts. Original HE cannot support …


Core Elements In Information Security Accountability In The Cloud, Zahir Al-Rashdi, Martin Dick, Ian Storey Jan 2017

Core Elements In Information Security Accountability In The Cloud, Zahir Al-Rashdi, Martin Dick, Ian Storey

Australian Information Security Management Conference

This paper proposes 9 core elements of information security accountability in the area of cloud computing. The core elements were determined via a series of 18 case studies with Omani government organisations that were actively using and/or providing cloud computing. 36 interviews were conducted and then analysed using a grounded theory methodology As a result of the analysis, responsibility, transparency, assurance, remediation, accountability support environment, flexible change process, collaboration, mechanisms and commitment to external criteria. The research also found that the emphasis on specific core elements is context-dependent and that there was considerable variation in emphasis amongst the case study …