Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

2020

Cloud computing

Discipline
Institution
Publication
Publication Type

Articles 1 - 30 of 37

Full-Text Articles in Physical Sciences and Mathematics

Performance Optimization Of Big Data Computing Workflows For Batch And Stream Data Processing In Multi-Clouds, Huiyan Cao Dec 2020

Performance Optimization Of Big Data Computing Workflows For Batch And Stream Data Processing In Multi-Clouds, Huiyan Cao

Dissertations

Workflow techniques have been widely used as a major computing solution in many science domains. With the rapid deployment of cloud infrastructures around the globe and the economic benefits of cloud-based computing and storage services, an increasing number of scientific workflows have migrated or are in active transition to clouds. As the scale of scientific applications continues to grow, it is now common to deploy various data- and network-intensive computing workflows such as serial computing workflows, MapReduce/Spark-based workflows, and Storm-based stream data processing workflows in multi-cloud environments, where inter-cloud data transfer oftentimes plays a significant role in both workflow performance …


Caee: Communication-Aware, Energy-Efficient Vm Placement Model For Multi-Tier Applications In Large Scale Cloud Data Centers, Soha Rawas, Ahmed Zekri Dec 2020

Caee: Communication-Aware, Energy-Efficient Vm Placement Model For Multi-Tier Applications In Large Scale Cloud Data Centers, Soha Rawas, Ahmed Zekri

BAU Journal - Science and Technology

the increasing demand for cloud computing services has led to the adoption of large-scale cloud data centers (DCs) to meet the user’s requirements. Efficiency and managing of such DCs have become a challenging problem. Consequently, energy-efficient solutions to optimize the whole DC energy consumption, optimize the application’s performance and reduce the cloud provider operational cost are crucial and needed. This paper addressed the problem of Virtual Machines (VMs) placement of multi-tier applications to maximize the compute resources utilization, minimize energy consumption, and reduce network traffic inside modern large-scale cloud DCs. The VM placement problem with communication dependencies among the VMs …


Attribute-Based Fine-Grained Access Control For Outscored Private Set Intersection Computation, Mohammad Ali, Mohajeri Javad, Mohammad-Reza Sadeghi, Ximeng Liu Oct 2020

Attribute-Based Fine-Grained Access Control For Outscored Private Set Intersection Computation, Mohammad Ali, Mohajeri Javad, Mohammad-Reza Sadeghi, Ximeng Liu

Research Collection School Of Computing and Information Systems

Private set intersection (PSI) is a fundamental cryptographic protocol which has a wide range of applications. It enables two clients to compute the intersection of their private datasets without revealing non-matching elements. The advent of cloud computing drives the ambition to reduce computation and data management overhead by outsourcing such computations. However, since the cloud is not trustworthy, some cryptographic methods should be applied to maintain the confidentiality of datasets. But, in doing so, data owners may be excluded from access control on their outsourced datasets. Therefore, to control access rights and to interact with authorized users, they have to …


Efficient Fine-Grained Data Sharing Mechanism For Electronic Medical Record Systems With Mobile Devices, Hui Ma, Rui Zhang, Guomin Yang, Zishuai Zong, Kai He, Yuting Xiao Sep 2020

Efficient Fine-Grained Data Sharing Mechanism For Electronic Medical Record Systems With Mobile Devices, Hui Ma, Rui Zhang, Guomin Yang, Zishuai Zong, Kai He, Yuting Xiao

Research Collection School Of Computing and Information Systems

Sharing digital medical records on public cloud storage via mobile devices facilitates patients (doctors) to get (offer) medical treatment of high quality and efficiency. However, challenges such as data privacy protection, flexible data sharing, efficient authority delegation, computation efficiency optimization, are remaining toward achieving practical fine-grained access control in the Electronic Medical Record (EMR) system. In this work, we propose an innovative access control model and a fine-grained data sharing mechanism for EMR, which simultaneously achieves the above-mentioned features and is suitable for resource-constrained mobile devices. In the model, complex computation is outsourced to public cloud servers, leaving almost no …


Attribute-Based Encryption For Cloud Computing Access Control: A Survey, Yinghui Zhang, Robert H. Deng, Shengmin Xu, Jianfei Sun, Qi Li, Dong Zheng Sep 2020

Attribute-Based Encryption For Cloud Computing Access Control: A Survey, Yinghui Zhang, Robert H. Deng, Shengmin Xu, Jianfei Sun, Qi Li, Dong Zheng

Research Collection School Of Computing and Information Systems

Attribute-based encryption (ABE) for cloud computing access control is reviewed in this article. A taxonomy and comprehensive assessment criteria of ABE are first proposed. In the taxonomy, ABE schemes are assorted into key-policy ABE (KP-ABE) schemes, ciphertext-policy ABE (CP-ABE) schemes, anti-quantum ABE schemes, and generic constructions. In accordance with cryptographically functional features, CP-ABE is further divided into nine subcategories with regard to basic functionality, revocation, accountability, policy hiding, policy updating, multi-authority, hierarchy, offline computation, and outsourced computation. In addition, a systematical methodology for discussing and comparing existing ABE schemes is proposed. For KP-ABE and each type of CP-ABE, the corresponding …


Energy And Performance-Optimized Scheduling Of Tasks In Distributed Cloud And Edge Computing Systems, Haitao Yuan Aug 2020

Energy And Performance-Optimized Scheduling Of Tasks In Distributed Cloud And Edge Computing Systems, Haitao Yuan

Dissertations

Infrastructure resources in distributed cloud data centers (CDCs) are shared by heterogeneous applications in a high-performance and cost-effective way. Edge computing has emerged as a new paradigm to provide access to computing capacities in end devices. Yet it suffers from such problems as load imbalance, long scheduling time, and limited power of its edge nodes. Therefore, intelligent task scheduling in CDCs and edge nodes is critically important to construct energy-efficient cloud and edge computing systems. Current approaches cannot smartly minimize the total cost of CDCs, maximize their profit and improve quality of service (QoS) of tasks because of aperiodic arrival …


Towards Dynamic Vehicular Clouds, Aida Ghazizadeh Aug 2020

Towards Dynamic Vehicular Clouds, Aida Ghazizadeh

Computer Science Theses & Dissertations

Motivated by the success of the conventional cloud computing, Vehicular Clouds were introduced as a group of vehicles whose corporate computing, sensing, communication, and physical resources can be coordinated and dynamically allocated to authorized users. One of the attributes that set Vehicular Clouds apart from conventional clouds is resource volatility. As vehicles enter and leave the cloud, new computing resources become available while others depart, creating a volatile environment where the task of reasoning about fundamental performance metrics becomes very challenging. The goal of this thesis is to design an architecture and model for a dynamic Vehicular Cloud built on …


Qos-Aware Scheduling For Data Intensive Workflow, Wan Cong, Cuirong Wang, Wang Cong Jul 2020

Qos-Aware Scheduling For Data Intensive Workflow, Wan Cong, Cuirong Wang, Wang Cong

Journal of System Simulation

Abstract: The development of technology enables people to access resources from different data centers. Resource management and scheduling of applications, such as workflow, that are deployed on the cloud computing environment have already become a hot spot. A QoS-aware scheduling algorithm for data intensive workflow on multiple data center environment was proposed. Scheduling data intensive workflow on multiple data center environment has two characteristics: A large amount of data is distributed in different geographical locations, the process of data migration will consume a large amount of time and bandwidth; secondly, the data centers have different price and resources. Data migration …


Information Collaboration Model Of Cloud Computing Supply Chain Based On Multi-Agent, Wuxue Jiang, Xuanzi Hu, Minxia Liu, Yuqiang Chen Jul 2020

Information Collaboration Model Of Cloud Computing Supply Chain Based On Multi-Agent, Wuxue Jiang, Xuanzi Hu, Minxia Liu, Yuqiang Chen

Journal of System Simulation

Abstract: In order to improve the work efficiency of supply chain in cloud computing and avoid the risks of cloud computing, a cloud-based supply chain information coordination model was proposed. The model has two basic states which are online status and offline status, at online state the cloud computing center is responsible for coordination of the entire supply chain information, and at offline state each node continues to complete the transaction order through the history record and each node information in the cloud data center. Simulation based on Multi-agent shows that the order completion rate in offline status is …


Performance Modeling Of Cryptographic Service System Virtualization Based On Issm, Songhui Guo, Qingbao Li, Sun Lei, Xuerong Gong, Tianchi Yang Jun 2020

Performance Modeling Of Cryptographic Service System Virtualization Based On Issm, Songhui Guo, Qingbao Li, Sun Lei, Xuerong Gong, Tianchi Yang

Journal of System Simulation

Abstract: The complicated architecture of cryptographic service system virtualization raised the difficulty of performance modeling. A performance modeling approach based on ISSMs was proposed. The approach divided the execution process into two stages, host preprocessing and arithmetic-module calculating, and built two sub-models based on queuing theory. On this basis, the effectiveness of this approach was verified. The results show that this method can analyze the impacts on system performance caused by task arrival rates, host and cryptographic card configurations quantitatively, and also be helpful for providing reasonable solutions to deploy virtualized cryptographic service system on cloud computing platforms.


An Extended Framework Of Privacy-Preserving Computation With Flexible Access Control, Wenxiu Ding, Rui Hu, Zheng Yan, Xinren Qian, Robert H. Deng, Laurence T. Yang, Mianxiong Dong Jun 2020

An Extended Framework Of Privacy-Preserving Computation With Flexible Access Control, Wenxiu Ding, Rui Hu, Zheng Yan, Xinren Qian, Robert H. Deng, Laurence T. Yang, Mianxiong Dong

Research Collection School Of Computing and Information Systems

Cloud computing offers various services based on outsourced data by utilizing its huge volume of resources and great computation capability. However, it also makes users lose full control over their data. To avoid the leakage of user data privacy, encrypted data are preferred to be uploaded and stored in the cloud, which unfortunately complicates data analysis and access control. In particular, few existing works consider the fine-grained access control over the computational results from ciphertexts. Though our previous work proposed a framework to support several basic computations (such as addition, multiplication and comparison) with flexible access control, privacy-preserving division calculations …


Editing-Enabled Signatures: A New Tool For Editing Authenticated Data, Binanda Sengupta, Yingjiu Li, Yangguang Tian, Robert H. Deng Jun 2020

Editing-Enabled Signatures: A New Tool For Editing Authenticated Data, Binanda Sengupta, Yingjiu Li, Yangguang Tian, Robert H. Deng

Research Collection School Of Computing and Information Systems

Data authentication primarily serves as a tool to achieve data integrity and source authentication. However, traditional data authentication does not fit well where an intermediate entity (editor) is required to modify the authenticated data provided by the source/data owner before sending the data to other recipients. To ask the data owner for authenticating each modified data can lead to higher communication overhead. In this article, we introduce the notion of editing-enabled signatures where the data owner can choose any set of modification operations applicable on the data and still can restrict any possibly untrusted editor to authenticate the data modified …


Load Balancing In Cloud Computing, Snehal Dhumal May 2020

Load Balancing In Cloud Computing, Snehal Dhumal

Master's Projects

Cloud computing is one of the top trending technologies which primarily focuses on the end user’s use cases. The service provider needs to provide services to many clients. These increasing number of requests from the clients are giving rise to the new inventions in the load scheduling algorithms. There are different scheduling algorithms which are already present in the cloud computing, and some of them includes the Shortest Job First (SJF), First Come First Serve (FCFS), Round Robin (RR) etc. Though there are different parameters to consider when load balancing in cloud computing, makespan (time difference between start time of …


Ml-Medic: A Preliminary Study Of An Interactive Visual Analysis Tool Facilitating Clinical Applications Of Machine Learning For Precision Medicine, Laura Stevens, David Kao, Jennifer Hall, Carsten Görg, Kaitlyn Abdo, Erik Linstead May 2020

Ml-Medic: A Preliminary Study Of An Interactive Visual Analysis Tool Facilitating Clinical Applications Of Machine Learning For Precision Medicine, Laura Stevens, David Kao, Jennifer Hall, Carsten Görg, Kaitlyn Abdo, Erik Linstead

Engineering Faculty Articles and Research

Accessible interactive tools that integrate machine learning methods with clinical research and reduce the programming experience required are needed to move science forward. Here, we present Machine Learning for Medical Exploration and Data-Inspired Care (ML-MEDIC), a point-and-click, interactive tool with a visual interface for facilitating machine learning and statistical analyses in clinical research. We deployed ML-MEDIC in the American Heart Association (AHA) Precision Medicine Platform to provide secure internet access and facilitate collaboration. ML-MEDIC’s efficacy for facilitating the adoption of machine learning was evaluated through two case studies in collaboration with clinical domain experts. A domain expert review was also …


A Fully Distributed Hierarchical Attribute-Based Encryption Scheme, Ali Mohammad, Javad Mohajeri, Ximeng Liu, Ximeng Liu May 2020

A Fully Distributed Hierarchical Attribute-Based Encryption Scheme, Ali Mohammad, Javad Mohajeri, Ximeng Liu, Ximeng Liu

Research Collection School Of Computing and Information Systems

With the development of cloud computing, many enterprises have been interested in outsourcing their data to cloud servers to decrease IT costs and rise capabilities of provided services. To afford confidentiality and fine-grained data access control, attribute-based encryption (ABE) was proposed and used in several cloud storage systems. However, scalability and flexibility in key delegation and user revocation mechanisms are primary issues in ABE systems. In this paper, we introduce the concept of a fully distributed revocable ciphertext-policy hierarchical ABE (FDR-CP-HABE) and design the first FDR-CP-HABE scheme. Our scheme offers a high level of flexibility and scalability in the key …


A 2020 Perspective On "Client Risk Informedness In Brokered Cloud Services: An Experimental Pricing Study", Di Shang, Robert J. Kauffman May 2020

A 2020 Perspective On "Client Risk Informedness In Brokered Cloud Services: An Experimental Pricing Study", Di Shang, Robert J. Kauffman

Research Collection School Of Computing and Information Systems

Cloud computing and the cloud services market have advanced in the past ten years. Cloud services now include most information technology (IT) services from fundamental computing services to more cutting- edge artificial intelligence (AI) services. Accordingly, opportunities have emerged for research on the design of new market features to improve the cloud services market to benefit providers and users. Based on our observation of the recent development of cloud services, in this short research commentary, we share our agenda for future studies of this important sector of IT services.


Csci 49378: Final Project Assignment: Distributed Systems And Cloud Computing, Bonan Liu, Nyc Tech-In-Residence Corps Apr 2020

Csci 49378: Final Project Assignment: Distributed Systems And Cloud Computing, Bonan Liu, Nyc Tech-In-Residence Corps

Open Educational Resources

Final Project Assignment for the course: "CSCI 49378: Intro to Distributed Systems and Cloud Computing" delivered at Hunter College in Spring 2020 by Bonan Liu as part of the Tech-in-Residence Corps program.


Csci 49378: Lecture 10: Cloud Storage And Databases Ii, Bonan Liu, Nyc Tech-In-Residence Corps Apr 2020

Csci 49378: Lecture 10: Cloud Storage And Databases Ii, Bonan Liu, Nyc Tech-In-Residence Corps

Open Educational Resources

Lecture for the course: CSCI 49378: Intro to Distributed Systems and Cloud Computing - "Cloud Storage and Databases II" (Week Ten) delivered at Hunter College in Spring 2020 by Bonan Liu as part of the Tech-in-Residence Corps program.


Csci 49378: Lecture 7: Cloud Systems And Infrastructures I, Bonan Liu, Nyc Tech-In-Residence Corps Apr 2020

Csci 49378: Lecture 7: Cloud Systems And Infrastructures I, Bonan Liu, Nyc Tech-In-Residence Corps

Open Educational Resources

Lecture for the course: CSCI 49378: Intro to Distributed Systems and Cloud Computing - "Cloud Systems and Infrastructures I" (Week Seven) delivered at Hunter College in Spring 2020 by Bonan Liu as part of the Tech-in-Residence Corps program.


Csci 49378: Lecture 11: Logging, Monitoring, And Advanced Topics, Bonan Liu, Nyc Tech-In-Residence Corps Apr 2020

Csci 49378: Lecture 11: Logging, Monitoring, And Advanced Topics, Bonan Liu, Nyc Tech-In-Residence Corps

Open Educational Resources

Lecture for the course: CSCI 49378: Intro to Distributed Systems and Cloud Computing - "Logging, Monitoring, and Advanced Topics" (Week Eleven) delivered at Hunter College in Spring 2020 by Bonan Liu as part of the Tech-in-Residence Corps program.


Csci 49378: Lecture 8: Cloud Systems And Infrastructures Ii, Bonan Liu, Nyc Tech-In-Residence Corps Apr 2020

Csci 49378: Lecture 8: Cloud Systems And Infrastructures Ii, Bonan Liu, Nyc Tech-In-Residence Corps

Open Educational Resources

Lecture for the course: CSCI 49378: Intro to Distributed Systems and Cloud Computing - "Cloud Systems and Infrastructures II" (Week Eight) delivered at Hunter College in Spring 2020 by Bonan Liu as part of the Tech-in-Residence Corps program.


Csci 49378: Lecture 6: Cloud Computing Concepts, Bonan Liu, Nyc Tech-In-Residence Corps Apr 2020

Csci 49378: Lecture 6: Cloud Computing Concepts, Bonan Liu, Nyc Tech-In-Residence Corps

Open Educational Resources

Lecture for the course: CSCI 49378: Intro to Distributed Systems and Cloud Computing - "Cloud Computing Concepts" (Week Six) delivered at Hunter College in Spring 2020 by Bonan Liu as part of the Tech-in-Residence Corps program.


Csci 49378: Lecture 9: Cloud Storage And Databases I, Bonan Liu, Nyc Tech-In-Residence Corps Apr 2020

Csci 49378: Lecture 9: Cloud Storage And Databases I, Bonan Liu, Nyc Tech-In-Residence Corps

Open Educational Resources

Lecture for the course: CSCI 49378: Intro to Distributed Systems and Cloud Computing - "Cloud Storage and Databases I" (Week Nine) delivered at Hunter College in Spring 2020 by Bonan Liu as part of the Tech-in-Residence Corps program.


Identity-Based Encryption Transformation For Flexible Sharing Of Encrypted Data In Public Cloud, Robert H. Deng, Zheng Qin, Qianhong Wu, Zhenyu Guan, Robert H. Deng, Yujue Wang, Yunya Zhou Apr 2020

Identity-Based Encryption Transformation For Flexible Sharing Of Encrypted Data In Public Cloud, Robert H. Deng, Zheng Qin, Qianhong Wu, Zhenyu Guan, Robert H. Deng, Yujue Wang, Yunya Zhou

Research Collection School Of Computing and Information Systems

With the rapid development of cloud computing, an increasing number of individuals and organizations are sharing data in the public cloud. To protect the privacy of data stored in the cloud, a data owner usually encrypts his data in such a way that certain designated data users can decrypt the data. This raises a serious problem when the encrypted data needs to be shared to more people beyond those initially designated by the data owner. To address this problem, we introduce and formalize an identity-based encryption transformation (IBET) model by seamlessly integrating two well-established encryption mechanisms, namely identity-basedencryption (IBE) and …


Workflow Critical Path: A Data-Oriented Path Metric For Holistic Hpc Workflows, Daniel D. Nguyen Mar 2020

Workflow Critical Path: A Data-Oriented Path Metric For Holistic Hpc Workflows, Daniel D. Nguyen

Dissertations and Theses

Optimizing scientific application performance in HPC environments is a complicated task which has motivated the development of many performance analysis tools over the past decades. These tools were designed to analyze the performance of a single parallel code using common approaches such as message passing (MPI), multithreading (OpenMP), acceleration (CUDA), or a hybrid approach. However, current trends in HPC such as the push to exascale, convergence with Big Data, and growing complexity of HPC applications and scientific workflows, have created gaps that these performance tools do not cover, particularly involving end-to-end data movement through an end-to-end HPC workflow comprising multiple …


Balancing Security, Performance And Deployability In Encrypted Search, David Joel Pouliot Mar 2020

Balancing Security, Performance And Deployability In Encrypted Search, David Joel Pouliot

Dissertations and Theses

Encryption is an important tool for protecting data, especially data stored in the cloud. However, standard encryption techniques prevent efficient search. Searchable encryption attempts to solve this issue, protecting the data while still providing search functionality. Retaining the ability to search comes at a cost of security, performance and/or utility.

An important practical aspect of utility is compatibility with legacy systems. Unfortunately, the efficient searchable encryption constructions that are compatible with these systems have been proven vulnerable to attack, even against weaker adversary models.

The goal of this work is to address this security problem inherent with efficient, legacy compatible …


Privacy-Preserving Data Processing With Flexible Access Control, Wenxiu Ding, Zheng Yan, Robert H. Deng Mar 2020

Privacy-Preserving Data Processing With Flexible Access Control, Wenxiu Ding, Zheng Yan, Robert H. Deng

Research Collection School Of Computing and Information Systems

Cloud computing provides an efficient and convenient platform for cloud users to store, process and control their data. Cloud overcomes the bottlenecks of resource-constrained user devices and greatly releases their storage and computing burdens. However, due to the lack of full trust in cloud service providers, the cloud users generally prefer to outsource their sensitive data in an encrypted form, which, however, seriously complicates data processing, analysis, as well as access control. Homomorphic encryption (HE) as a single key system cannot flexibly control data sharing and access after encrypted data processing. How to realize various computations over encrypted data in …


Iot Based Virtual Reality Game For Physio-Therapeutic Patients, K. Martin Sagayam, Shibin D, Helen Dang, Mohd Helmy Abd Wahab, Radzi Ambar Jan 2020

Iot Based Virtual Reality Game For Physio-Therapeutic Patients, K. Martin Sagayam, Shibin D, Helen Dang, Mohd Helmy Abd Wahab, Radzi Ambar

Faculty Works: MCS (1984-2023)

Biofeedback therapy trains the patient to control voluntarily the involuntary process of their body. This non-invasive and non-drug treatment is also used as a means to rehabilitate the physical impairments that may follow a stroke, a traumatic brain injury or even in neurological aspects within occupational therapy. The idea behind this study is based on using immersive gaming as a tool for physical rehabilitation that combines the idea of biofeedback and physical computing to get a patient emotionally involved in a game that requires them to do the exercises in order to interact with the game. This game is aimed …


Ai Techniques For Covid-19, Adedoyin Ahmed Hussain, Ouns Bouachir, Fadi Al-Turjman, Moayad Aloqaily Jan 2020

Ai Techniques For Covid-19, Adedoyin Ahmed Hussain, Ouns Bouachir, Fadi Al-Turjman, Moayad Aloqaily

All Works

© 2013 IEEE. Artificial Intelligence (AI) intent is to facilitate human limits. It is getting a standpoint on human administrations, filled by the growing availability of restorative clinical data and quick progression of insightful strategies. Motivated by the need to highlight the need for employing AI in battling the COVID-19 Crisis, this survey summarizes the current state of AI applications in clinical administrations while battling COVID-19. Furthermore, we highlight the application of Big Data while understanding this virus. We also overview various intelligence techniques and methods that can be applied to various types of medical information-based pandemic. We classify the …


Small-To-Medium-Size Enterprise Managers’ Experiences With Cloud Computing, Anthony Effiong Jan 2020

Small-To-Medium-Size Enterprise Managers’ Experiences With Cloud Computing, Anthony Effiong

Walden Dissertations and Doctoral Studies

Historically, managers of small- and medium-sized enterprises (SMEs) have had concerns regarding cloud computing and cybersecurity. Their resistance to using cloud computing has influenced their ability to do business effectively and to compete with businesses that use cloud computing. The purposes of this descriptive phenomenological study were to explore the lived experiences and perceptions of SME managers that might influence their decisions to adopt cloud computing. Watson’s concept of resistance to change and Davis, Bagozzi, and Warhaw’s technology acceptance model were the conceptual frameworks that guided this qualitative study. Data collection consisted of conducting 16 semi-structured interviews with open-ended questions …