SEMANTICS OF DATA MINING SERVICES IN CLOUD COMPUTING

 The recent incorporation of new Data Mining and Machine Learning services within Cloud Computing providers is empowering users with extremely comprehensive data analysis tools including all the advantages of this type of environment. Providers of Cloud Computing services for Data Mining publish the descriptions and definitions in many formats and o...

ONLINE E-LEARNING MANAGEMENT SYSTEM

 One of the main important resources for higher education is a Learning Management System (LMS), which has shown an enhancement of students’ progress with high quality learning outcomes worldwide. Many e-learning tools exist, each one has its own weaknesses and strongest points to the online learning process. This number increases continuously, and ...

JEWELLERY MANAGEMENT SYSTEM

 In this modern world, computer becomes more and more popular and important to our society. We can use computer everywhere and they are very useful and helpful to our daily life. Computerized systems can be used for scheduling the jobs, update the stock details, for complex calculations, and also used for preparing bills to customers. Here we devel...

IMAGE PIXEL BASED GRAPHICAL AUTHENTICATION SYSTEM

 In three level graphical, text and color file security system the authentication is done by image representation password. Data sharing is an important functionality in cloud storage. In this article, we show how to securely, efficiently, and flexibly share data with others in cloud storage. We describe new public-key cryptosystems which produce co...

Enhancing Remembrance of Password as an Image

 This paper focuses on changing the system of having ‘text’ as password as people tend to often forget their passwords and have to recover it. Proposing the system of having picture as a password which is kept encrypted in a database and decrypted and matched to check for authorization of user. It has been scientifically proven that it’s easier for ...

EMPLOYEE ATTENDANCE SYSTEM

 This study aims at establishing an attendance system which can facilitate the administration data collection related to employee attendance effectively and efficiently. The method used descriptive scheme, interview and document analysis related to employee attendance to create an effective and efficient attendance system. The results obtained from ...

COMPREHENSIVE ANALYSIS OF TWITTER TRENDING

 Twitter is among the most used microblogging and online social networking services. In Twitter, a name, phrase, or topic that is mentioned at a greater rate than others is called a "trending topic" or simply “trend”. Twitter trends has shown their powerful ability in many public events, elections and market changes. Nevertheless, there has been ver...

CLOUD FIREWALL UNDER BURSTY AND CORRELATED DATA TRAFFIC: A THEORETICAL ANALYSIS

 Cloud firewalls stand as one of the major building blocks of the cloud security framework protecting the Virtual Private Infrastructure against attacks such as the Distributed Denial of Service (DDoS). In order to fully characterize the cloud firewall operation and gain actionable insights on the design of cloud security, performance models for the...

BLOCK CHAIN BASED SECURED DATA TRANSFER IN MOBILE CLOUD COMPUTING

 Offloading computation-intensive tasks (e.g., block chain agreement cycles and information handling undertakings) to the edge/cloud is a promising answer for block chain-enabled versatile edge figuring. Nonetheless, the conventional offloading approaches (e.g., sell off based and game-hypothesis draws near) neglect to change the strategy as per the...

SMART TRAFFIC MANAGEMENT USING CLOUD COMPUTING

 Traffic big data has brought many opportunities for traffic management applications. However several challenges like heterogeneity, storage, management, processing and analysis of traffic big data may hinder their efficient and real-time applications. All these challenges call for well-adapted distributed framework for smart traffic management that...

RURAL BANKING USING CLOUD COMPUTING

 The Rural Banking introduced in villages to give good and better services to the people for the development of their agriculture sector or to help for their small-scale business. The banking sector in India has witnessed a complete transformation both in its functioning and delivery of services to their customers.The banking services in rural areas...

ONLINE PLANT SALES RECOMMENDER SYSTEM USING MACHINE LEARNING

 In today's technical era, every startup or a company attempt to establish a better sort of communication between their Plants and the users, and for that purpose, they require a type of mechanism which can promote their plant effectively, and here the recommender system serves this motive. It is basically a filtering system that tries to predict an...

DATA ANALYSIS OF CONSUMER COMPLAINTS IN BANKING INDUSTRY USING K-MEANS CLUSTERING AND SENTIMENTAL ANALYSIS

 This paper specialise in exploring and analyzing Consumer Finance Complaints data, to seek out what percentage similar complaints are there in reference to an equivalent bank or service or product. These datasets fall into the complaints of Credit reporting, Mortgage, Debt Collection, personal loan and Banking Accounting. By using data processing t...

Cyber Threat Predictive Analytics for Improving Cyber Supply Chain Security

 Cyber Supply Chain (CSC) system is complex which involves different sub-systems performing various tasks. Security in supply chain is challenging due to the inherent vulnerabilities and threats from any part of the system which can be exploited at any point within the supply chain. This can cause a severe disruption on the overall business continui...

BIKE RIDE SAFETY MANAGEMENT SYSTEM

 Motorcycle accidents have been rapidly growing through the years in many countries. In India more than 37 million people use two wheelers. Therefore, it is necessary to develop a system for automatic detection of helmet and triples wearing for road safety. Therefore, a custom object detection model is created using a Machine learning based algorith...

COLLEGE BUS MANAGEMENT SYSTEM

 Bus provides eco-friendly, cheap, convenient, time-effective means of transportation. Bus lack regularization and management, due to which they increased the burden on public transportation system. Unusual and unexpected conditions on the roads affect the smooth operation of the bus system and the movement of vehicles. Problems faced by passengers ...

RECOMMENDER BASED E-COMMERCE WEBSITE

 To overcome the product overload of online shoppers, a variety of recommendation methods have been developed. Recommender systems are being utilized by an ever increasing number of E-commerce sites to help consumers discover products to buy. The most of existing system gives the recommendation based on best selling product, on demographics of the c...

LOSSLESS DATA HIDING BASED ON HOMOMORPHIC CRYPTOSYSTEM

 With the development of cloud server, reversible data hiding in encrypted domain has received widespread attention for management of encrypted media. Most of existing reversible data hiding methods are based on stream ciphers, which are mainly concerned with data storage security. While homomorphic ciphers focus on data processing security, which i...

EFFICIENT DATA INTEGRITY AND AUDITING IN CLOUD BY USING SH256

  The primary point of this paper is to talk about the utilization of cloud storage administrations, empowering people to store their data in the cloud and avoid the nearby information stockpiling and upkeep cost. Various information respectability inspecting frameworks have been executed to ensure the nature of the information put awa...

Privacy Preserving Distributed Data Fusion Based On Attribute Protection

 Privacy-preserving distributed data fusion is a pretreatment process in data mining involving security models. In this paper, we present a method of implementing multiparty data fusion, wherein redundant attributes of a same set of individuals are stored by multiple parties. In particular, the merged data does not suffer from background attacks or ...

ONLINE PLANT SALES APPLICATION

 As getting the information from various research papers and other sources we analysis that many peoples want to buy a plants and they directly concerned to nursery but sometimes people doesn’t know specific information about particular plant items as well seller is not technically skilled. Customer doesn’t compare plants pricing with different shop...

Online Identification and Data Recovery for PMU Data Manipulation Attack

 Some of the modern smart grid infrastructures, phasor measurement units (PMUs) for instance, are vulnerable to cyber attacks due to their ever-increasing dependence on information and communications technologies. In general, existing solutions to cyber attacks focus on creating redundancy and/or enhancing security levels of sensing and communicatio...

Intrinsic Security and Self-Adaptive Cooperative Protection Enabling Cloud Native Network Slicing

 With the emergence of cloud native technology, the network slicing enables automatic service orchestration, flexible network scheduling and scalable network resource allocation, which profoundly affects the traditional security solution. Security is regarded as a technology independent of the cloud native architecture in the initial design, traditi...

Cloud Computing with PHP – Using Amazon S3 with the Zend Framework

 The purpose of this thesis was to show how to use Zend Framework to connect PHP applications to the cloud.To find out how easy it is for developers with basic knowledge of the Zend Framework, to incorporate cloud computing in their applications. In order to do this, a blog application was developed using the Zend Framework and the upload files func...

Privacy Preserving Distributed Data Fusion Based On Attribute Protection

  Privacy-preserving distributed data fusion is a pretreatment process in data mining involving security models. In this paper, we present a method of implementing multiparty data fusion, wherein redundant attributes of a same set of individuals are stored by multiple parties. In particular, the merged data does not suffer from background attacks...

Policy-based Broadcast Access Authorization for Flexible Data Sharing in Clouds

 Cloud storage services allow data owners to outsource their potentially sensitive data (e.g., private genome data) to remote cloud servers in a ciphertext form. To enable data owners to further share the data encrypted in ciphertexts, many proxy re-encryption (PRE) schemes are proposed. However, most schemes only support single-recipient or coarse-...

Energy-Aware Real-time Tasks Processing for FPGA Based Heterogeneous Cloud

 Cloud computing is becoming an popular model of computing. Due to the increasing complexity of the cloud service requests, it often exploits heterogeneous architecture. Moreover, some service requests (SRs)/tasks exhibit real-time features, which are required to be handled within a specified duration. Along with the stipulated temporal management, ...

Efficient Verification of Edge Data Integrity in Edge Computing Environment

 Edge computing, as a new computing paradigm that extends cloud computing, allows a service vendor to deploy its services on distributed edge servers to serve its service users in close geographic proximity to those edge servers. Caching edge data on edge servers can minimize service users data retrieval latency. However, such edge data are subject ...

Constrained App Data Caching over Edge Server Graphs in Edge Computing Environment

 In recent years, edge computing, as an extension of cloud computing, has emerged as a promising paradigm for powering a variety of applications demanding low latency, e.g., virtual or augmented reality, interactive gaming, real-time navigation, etc. In the edge computing environment, edge servers are deployed at base stations to offer highly-access...

Attribute-based pseudonymity for privacy-preserving authentication in cloud services

 Attribute-based authentication is considered a cornerstone component to achieve scalable fine-grained access control in the fast growing market of cloud-based services. Unfortunately, it also poses a privacy concern. Users attributes should not be linked to the users identity and spread across different organizations. To tackle this issue, several ...

An Online Framework for Joint Network Selection and Service Placement in Mobile Edge Computing

 With the rapid development of 5G, Mobile Edge Computing (MEC) paradigm has emerged to enable various devices or servers at the network edge to contribute their computing capacity for reducing communication delay. A fundamental problem is to preserve satisfactory quality-of-service (QoS) for mobile users in light of densely dispersed wireless commun...

Accurate and Efficient Monitoring for Virtualized SDN in Clouds

 This paper presents V-Sight, a network monitoring framework for programmable virtual networks in clouds. Network virtualization based on software-defined networking (SDN-NV) in clouds makes it possible to realize programmable virtual networks; consequently, this technology offers many benefits to cloud services for tenants. However, to the best of ...

A Cooperative Defense Framework against Application-level DDoS Attacks on Mobile Edge Computing Services

 Mobile edge computing (MEC), extending computing services from cloud to edge, is recognized as one of key pillars to facilitate real-time services and tackle backhaul bottleneck. However, it is not economically efficient to attach intensive security appliances to every MEC node to defend application-level DDoS attacks and ensure the availability of...

Online Performance Modeling and Prediction for Single-VM Applications in Multi-Tenant Clouds

 In this paper, we propose online learning methodologies for performance modeling and prediction of applications that run repetitively on multi-tenant clouds. Based on a few micro-benchmarks to probe in-situ perceivable performance of major components of the target VM, we proposed both periodic model retraining and progressive modeling approaches to...

Inspecting Edge Data Integrity with Aggregated Signature in Distributed Edge Computing Environment

 In the edge computing environment, app vendors can cache their data on a large number of geographically distributed edge servers to serve their users. However, those cached data are particularly vulnerable to both intentional and accidental corruption, which makes data security a major concern in the EC environment. Given limited computing resource...

Hierarchical Scheduling Mechanisms in Multi-Level Fog Computing

 Delivering cloud-like computing facilities at the network edge provides computing services with ultra-low-latency access, yielding highly responsive computing services to application requests. The concept of fog computing has emerged as a computing paradigm that adds layers of computing nodes between the edge and the cloud, also known as cloudlets,...

Edge-Assisted Short Video Sharing with Guaranteed Quality-of-Experience

 As a rising star of social apps, short video apps, e.g., TikTok, have attracted a large number of mobile users by providing fresh and short video contents that highly match their watching preferences. Meanwhile, the booming growth of short video apps imposes new technical challenges on the existing computation and communication infrastructure. Trad...

Autonomic Resource Management for Fog Computing

 Fog computing extends cloud computing capabilities to the edge of the network and reduces high latency and network congestion. This paradigm enables portions of a transaction to be executed at a fog server and other portions at the cloud. Fog servers are generally not as robust as cloud servers; at peak loads, the data that cannot be processed by f...

A Block chain-Based Multi-Cloud Storage Data Auditing Scheme to Locate Faults

 Network storage services have benefited countless users worldwide due to the notable features of convenience, economy and high availability. Since a single service provider is not always reliable enough, more complex multi-cloud storage systems are developed for mitigating the data corruption risk. While a data auditing scheme is still needed in mu...

Searchable Public-Key Encryption with Cryptographic Reverse Firewalls for Cloud Storage

 In order to protect data privacy in cloud storage, sensitive data is encrypted before being uploaded to a cloud server. How to retrieve ciphertext safely and effectively has become a problem. Public key encryption with keyword search (PEKS) realizes the retrieval of ciphertexts in clouds without disclosing secret information. However, most PEKS pro...

Scalable Fuzzy Keyword Ranked Search over Encrypted Data on Hybrid Clouds

 Searchable encryption (SE) is a powerful technology that enables keyword-based search over encrypted data becomes possible. However, most SE schemes focus on exact keyword search which can not tolerate misspellings and typos. Existing fuzzy keyword search schemes only support fuzzy search within a limited similarity threshold d, the storage cost wi...

Mobility and Dependence-aware QoS Monitoring in Mobile Edge Computing

 Mobile edge computing is a new computing paradigm that performs computing on the edge of a network. Services may be unavailable or do not satisfy the needs of users due to changing edge environments. Quality of service (QoS) is commonly employed as a critical means to indicate qualitative status of services. It is particularly important to monitor ...

Exploiting the Solar Energy Surplus for Edge Computing

 In the context of the global energy ecosystem transformation, we introduce a new approach to reduce the carbon emissions of the cloud-computing sector and, at the same time, foster the deployment of small-scale private photovoltaic plants. We consider the opportunity cost of moving some cloud services to private, distributed, solar-powered computin...

Adaptive Fog A Modelling and Optimization Framework for Fog Computing in Intelligent Transportation Systems

 Fog computing has been advocated as an enabling technology for computationally intensive services in smart connected vehicles. Most existing works focus on analyzing the queueing and workload processing latencies associated with fog computing, ignoring the fact that wireless access latency can sometimes dominate the overall latency. This motivates ...

A Novel Statistical and Neural Network Combined Approach for the Cloud Spot Market

 The instance price in the Amazon EC2 spot model is often much lower than in the on-demand counterpart. However, this price reduction comes with a decrease in the availability guarantees. To our knowledge, there is no work that accurately captures the short-term trade-off between spot price and availability, and does long-term analysis for spot pric...

Resource Management and Pricing for Cloud Computing based Mobile Blockchain with Pooling

 In a public blockchain system applying Proof of Work (PoW), the participants need to compete with their computing resources for reward, which is challenging for resource-limited devices. Mobile blockchain is proposed to facilitate the application of blockchain for mobile service, in which the lightweight devices can participate mining by renting re...

Optimal Algorithm Allocation for Single Robot Cloud Systems

 For a robot to perform a task, several algorithms must be executed, sometimes simultaneously. The algorithms can be executed either on the robot itself or, if desired, on a cloud infrastructure. The term cloud infrastructure refers to hardware, storage, abstracted resources, and network resources associated with cloud computing. Depending on the de...

Mock Fog 2.0 Automated Execution of Fog Application Experiments in the Cloud

 Fog computing is an emerging computing paradigm that uses processing and storage capabilities located at the edge, in the cloud, and possibly in between. Testing and benchmarking fog applications, however, is hard since runtime infrastructure will typically be in use or may not exist, yet. While approaches for the emulation of infrastructure testbe...

Dynamic Deployment and Scheduling Strategy for Dual-Service Pooling Based Hierarchical Cloud Service System in Intelligent Buildings

 Due to the excessive concentration of computing resources in the traditional centralized cloud service system, there will be three prominent problems of management confusion, construction cost and network delay. Therefore, we propose to virtualize regional edge computing resources in intelligent buildings as edge service pooling, then presents a hi...

DTC A Dynamic Transaction Chopping Technique for Geo-Replicated Storage Services

 Replicating data across geo-distributed datacenters is usually necessary for large scale cloud services to achieve high locality, durability and availability. One of the major challenges in such geo-replicated data services lies in consistency maintenance, which usually suffers from long latency due to costly coordination across datacenters. Among ...

A Knowledge-based Adaptive Discrete Water Wave Optimization for Solving Cloud Workflow Scheduling

 Workflow scheduling in cloud environments has become a significant topic in both commercial and industrial applications. However, it is still an extraordinarily challenge to generate effective and economical scheduling schemes under the deadline constraint especially for the large scale workflow applications. To address the issue, this paper invest...

Toward Secure Data Computation and Outsource for Multi-User Cloud-Based IoT

 Cloud computing has promoted the success of Internet of Things (IoT) with offering abundant storage and computation resources where the data from IoT sensors can be remotely outsourced to the cloud servers, whereas storing, exchanging and processing data collected through IoT sensors via centralised or decentralised cloud servers make cloud-based I...

SLA-based Scheduling of Spark Jobs in Hybrid Cloud Computing Environments

 Big data frameworks such as Apache Spark are becoming prominent to perform large-scale data analytics jobs. However, local or on-premise computing resources are often not sufficient to run these jobs. Therefore, public cloud resources can be hired on a pay-per-use basis from the cloud service providers to deploy a Spark cluster entirely on the clou...

Optimal Task Allocation and Coding Design for Secure Edge Computing with Heterogeneous Edge Devices

 In recent years, edge computing has attracted significant attention because it can effectively support many delay-sensitive applications. Despite such a salient feature, edge computing also faces many challenges, especially for efficiency and security, because edge devices are usually heterogeneous and may be untrustworthy. To address these challen...

Enabling Simultaneous Content Regulation and Privacy Protection for Cloud Storage Image

 The population of cloud computing greatly facilitates the sharing of explosively generated image today. While benefiting from the convenient of cloud, the privacy protection mechanism that commonly applied in cloud service makes the spreading of illegal and harmful data very hard to be detected or controlled. Such a realistic threat should be serio...

A Taxonomy and Survey of Edge Cloud Computing for Intelligent Transportation Systems and Connected Vehicles

 Recent advances in smart connected vehicles and Intelligent Transportation Systems (ITS) are based upon the capture and processing of large amounts of sensor data. Modern vehicles contain many internal sensors to monitor a wide range of mechanical and electrical systems and the move to semi-autonomous vehicles adds outward looking sensors such as c...

3D Analytical Modelling and Iterative Solution for High Performance Computing Clusters

 Mobile Cloud Computing enables the migration of services to the edge of Internet. Therefore, high performance computing clusters are widely deployed to improve computational capabilities of such environments. However, they are prone to failures and need analytical models to predict their behaviour in order to deliver desired quality-of-service and ...

Design of Distributed Network Mass Data Processing System based on Cloud Computing Technology

 In recent years, with the rapid development of cloud computing industry, big data processing technology is also constantly mature. At the same time, the scale of domestic mobile Internet market continues to expand, with more than 500 million users, bringing huge mobile Internet business data. In this context, the method of large-scale network data ...

Data Access Control in Cloud Computing Flexible and Receiver Extendable

 Broadcast encryption provides a promising technique of data access control for specified users in cloud computing. A data uploader can generate a ciphertext for a set of chosen users such that only the intended users are able to learn the data content. However, with the rapidly increasing of collaboration between users, it is desired to extend the ...

Unsupervised Domain Adaptation for Cloud Detection Based on Grouped Features Alignment and Entropy Minimization

 Most convolutional neural network (CNN)-based cloud detection methods are built upon the supervised learning framework that requires a large number of pixel-level labels. However, it is expensive and time-consuming to manually annotate pixelwise labels for massive remote sensing images. To reduce the labeling cost, we propose an unsupervised domain...

Resource Optimization and Delay Guarantee Virtual Network Function Placement for Mapping SFC Requests in Cloud Networks

 Since the advent of network function virtualization (NFV), cloud service providers (CSPs) can implement traditional dedicated network devices as software and flexibly instantiate network functions (NFs) on common off-the-shelf servers. NFV technology enables CSPs to deploy their NFs to a cloud data center in the form of virtual network functions (V...

ProSAS Proactive Security Auditing System for Clouds

 The multi-tenancy in a cloud along with its dynamic and self-service nature could cause severe security concerns. To mitigate such concerns and ensure the accountability and transparency of the cloud providers towards their tenants, security auditing is a promising solution. However, the existing security auditing solutions for clouds suffer from s...

Budget-aware Video Crowdsourcing at the Cloud-enhanced Mobile Edge

 With convenient Internet access and ubiquitous high-quality sensors in end-user devices, a growing number of content consumers are engaging in the content creation process. Meanwhile, mobile edge computing (MEC) can provision distributed computing resources for local data processing. The MEC-enhanced video crowdsourcing application will gather user...

Boundary Net Extraction and Completion of Road Boundaries With Deep Learning Using Mobile Laser Scanning Point Clouds and Satellite Imagery

 Robust road boundary extraction and completion play an important role in providing guidance to all road users and supporting high-definition (HD) maps. The significant challenges remain in remarkable and accurate road boundary recovery from poor road boundary conditions. This paper presents a novel deep learning framework, named BoundaryNet, to ext...

SG-GAN Adversarial Self-Attention GCN for Point Cloud Topological Parts Generation

 Point clouds are fundamental in the representation of 3D objects. However, they can also be highly unstructured and irregular. This makes it difficult to directly extend 2D generative models to three-dimensional space. In this paper, we cast the problem of point cloud generation as a topological representation learning problem. To infer the represe...

Resource-aware Collaborative Allocation for CPU-FPGA Cloud Environments

 Cloud Warehouses have been exploiting CPU-FPGA environments to accelerate multi-tenant applications to achieve scalability and maximize resource utilization. In this scenario, kernels are sent to CPU and FPGA concurrently, considering available resources and workload characteristics, which are highly variant. Therefore, we propose a multi-objective...

Optimal control of chilled water system with ensemble learning and cloud-edge-terminal implementation

 In modern large buildings, the chilled water system regulates the indoor temperature through a series of heat exchanges. This paper studies the optimal control problem of the chilled water system and, proposes an ensemble learning method for the cooling load prediction under different operation conditions with imbalance sample distribution. A new c...

HSGAN Hierarchical Graph Learning for Point Cloud Generation

 Point clouds are the most general data representations of real and abstract objects, and have a wide variety of applications in many science and engineering fields. Point clouds also provide the most scalable multi-resolution composition for geometric structures. Although point cloud learning has shown remarkable results in shape estimation and sem...

Ground-Based Remote Sensing Cloud Classification via Context Graph Attention Network

 Most ground-based remote sensing cloud classification methods focus on learning representation features for cloud images while ignoring the correlations among cloud images. Recently, graph convolutional network (GCN) is applied to provide the correlations for ground-based remote sensing cloud classification, in which the graph convolutional layer a...

AFED-EF An Energy-efficient VM Allocation Algorithm for IoT Applications in a Cloud Data Center

 Cloud Data Centers (CDCs) have become a vital computing infrastructure for enterprises. However, CDCs consume substantial energy due to the increased demand for computing power, especially for the Internet of Things (IoT) applications. Although a great deal of research in green resource allocation algorithms have been proposed to reduce the energy ...

SSUR An Approach to Optimizing Virtual Machine Allocation Strategy Based on User Requirements for Cloud Data Center

 Cloud data centers provide services for an increasing number of applications. The virtual machines (VMs) that perform the corresponding application tasks need to be allocated to physical machines (PMs). For VM allocation, cloud service centers consider both energy consumption and quality of service (QoS), while cloud users are primarily concerned w...

Sanitizable Access Control System for Secure Cloud Storage Against Malicious Data Publishers

 Cloud computing is considered as one of the most prominent paradigms in the information technology industry, since it can significantly reduce the costs of hardware and software resources in computing infrastructure. At the first sight, by merely storing the shared data as plaintext in the cloud storage and protect them using an appropriate access ...

Joint Resource Dimensioning and Placement for Dependable Virtualized Services in Mobile Edge Clouds

 Mobile edge computing (MEC) is an emerging architecture for accommodating latency sensitive virtualized services (VSs). Many of these VSs are expected to be safety critical, and will have some form of reliability requirements. In order to support provisioning reliability to such VSs in MEC in an efficient and confidentiality preserving manner, in t...

ECONOMY Point Clouds-based Energy-efficient Autonomous Navigation for UAVs

 Most UAVs depend on realtime 3D point clouds to navigate through unknown environments. However, both point clouds processing and trajectory planning are computationally expensive and will deplete UAV's battery quickly. There are also inevitable uncertainties in point clouds, which further makes collision-free trajectory planning a very challenging ...

Cloud versus Edge Deployment Strategies of Real-Time Face Recognition Inference

 In this paper, we present a real-world case study on deploying a face recognition application, using MTCNN detector and FaceNet recognizer. We report the challenges faced to decide on the best deployment strategy. We propose three inference architectures for the deployment, including cloud-based, edge-based, and hybrid. Furthermore, we evaluate the...

3D Multi-Object Tracking in Point Clouds Based on Prediction Confidence-Guided Data Association

 This paper proposes a new 3D multi-object tracker to more robustly track objects that are temporarily missed by detectors. Our tracker can better leverage object features for 3D Multi-Object Tracking (MOT) in point clouds. The proposed tracker is based on a novel data association scheme guided by prediction confidence, and it consists of two key pa...

Secure Data Sharing with Flexible User Access Privilege Update in Cloud-assisted IoMT

 Cloud-assisted Internet of Medical Things (IoMT) is becoming an emerging paradigm in the healthcare domain, which involves collection, storage and usage of the medical data. Considering the confidentiality and accessibility of the outsourced data, secure and fine-grained data sharing is a crucial requirement for the patients. Attribute-based encryp...

Resource Provisioning and Allocation in Function-as-a-Service Edge-Clouds

 Edge computing has emerged as a new paradigm to bring cloud applications closer to users for increased performance. Unlike back-end cloud systems which consolidate their resources in a centralized data center location with virtually unlimited capacity, edge-clouds comprise distributed resources at various computation spots, each with very limited c...

Intrinsic Security and Self-Adaptive Cooperative Protection Enabling Cloud Native Network Slicing

 With the emergence of cloud native technology, the network slicing enables automatic service orchestration, flexible network scheduling and scalable network resource allocation, which profoundly affects the traditional security solution. Security is regarded as a technology independent of the cloud native architecture in the initial design, traditi...

Evaluating an Application Aware Distributed Dijkstra Shortest Path Algorithm in Hybrid CloudEdge Environments

 To increase the flexibility and the dynamism of communication networks, Software Defined Networking (SDN) has emerged as the challenging approach to decouple control and data planes, using a logically centralized controller able to manage the underlying network resources. However, traditional network solutions can not be always used in SDN. In this...

Cooperative Service Placement and Scheduling in Edge Clouds A Deadline-Driven Approach

 Mobile edge computing enables resource-limited edge clouds (ECs) in federation to help each other with resource-hungry yet delay-sensitive service requests. Contrary to common practice, we acknowledge that mobile services are heterogeneous and the limited storage resources of ECs allow only a subset of services to be placed at the same time. This p...

Cloud-Edge Computing for Cyber-Physical Systems and Internet-of-Things

 This Special Section on ‘`Cloud-Edge Computing for Cyber-Physical Systems and Internet-of-Things’' is oriented to the dissemination of a few of those latest research and innovation results, covering many aspects of design, optimization, implementation, and evaluation of emerging cloud-edge solutions for CPS and IoT applications. The selected high-q...

P2GT Fine-Grained Genomic Data Access Control with Privacy-Preserving Testing in Cloud Computing

 With the rapid development of bioinformatics and the availability of genetic sequencing technologies, genomic data has been used to facilitate personalized medicine. Cloud computing, features as low cost, rich storage and rapid processing can precisely respond to the challenges brought by the emergence of massive genomic data. Considering the secur...

MODIS-Based AVHRR Cloud and Snow Separation Algorithm

 The long-term data record (LTDR) has the goal of developing a quality and consistent Advanced Very High Resolution Radiometer (AVHRR) surface reflectance and albedo products dating back to 1982 at 0.05° spatial resolution. Distinguishing between cloud and snow is of critical importance when analyzing global albedo trends, for they influence the Ear...

Efficient and Anonymous Authentication for Healthcare Service with Cloud based WBANs

 As a promising technology in the development of human healthcare services, the wireless body area networks (WBANs) technology has attracted widespread attention in recent years from both industry and academia. However, due to the sensitiveness of the medical system and the capability limitation of the wearable devices, security, privacy, and effici...

Computation Migration Oriented Resource Allocation in Mobile Social Clouds

 The rapid growth of mobile device (e.g., smart phone and bracelet) has spawned a lot of new applications, during which the requirements of applications are increasing, while the capacities of some mobile devices are still limited. Such contradiction drives the emergency of computation migration among mobile edge devices, which is a lack of research...

Blockchain-based Edge Computing Data Storage Protocol Under Simplified Group Signature

 In contrast to the traditional cloud-based IoT structure, which imposes high computation and storage demands on the central cloud server, edge computing can process data at the network edge. In this paper, we present an edge computing data storage protocol employing the blockchain and the group signature, where the blockchain works as the trusted t...

A Compressive Integrity Auditing Protocol for Secure Cloud Storage

 With the widespread application of cloud storage, ensuring the integrity of user outsourced data catches more and more attention. To remotely check the integrity of cloud storage, plenty of protocols have been proposed, implemented by checking the equation constructed by the aggregated blocks, tags, and indices. However, the verifier only has the k...

Scoring and Dynamic Hierarchy-Based NSGA-II for Multiobjective Workflow Scheduling in the Cloud

 Cloud computing becomes a promising technology to reduce computation cost by providing users with elastic resources and application-deploying environments as a pay-per-use model. More scientific workflow applications have been moved or are being migrated to the cloud. Scheduling workflows turns to the main bottleneck for increasing resource utiliza...

Fine Grained Security in Cloud with Cryptographic Access Control

 Fine-grained access control schemes are commonly used in cloud computing. In this type of schemes, each data item is given its own access control policy. The entity that wants to access the data item needs to provide its credentials to a policy enforcer. In a cloud environment, normally, the policy enforcer is not the owner of the data. The access ...

EIHDP Edge-Intelligent Hierarchical Dynamic Pricing Based on Cloud-Edge-Client Collaboration for IoT Systems

 Nowadays, IoT systems can better satisfy the service requirements of users with effectively utilizing edge computing resources. Designing an appropriate pricing scheme is critical for users to obtain the optimal computing resources at a reasonable price and for service providers to maximize profits. This problem is complicated with incomplete infor...

Comments on “Attribute-Based Data Sharing Scheme Revisited in Cloud Computing”

 In this letter, we discuss the security weakness of Wang et al.'s attribute-based data sharing scheme, in IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (TIFS) (DOI: 10.1109/TIFS.2016.2549004). Through designing two concrete attacks, we identify two serious security flaws in their scheme. 1) First, we show that their scheme is insecure bec...

A Utility Game Driven QoS Optimization for Cloud Services

 Cloud services request lower cost compared to traditional software of self-purchased infrastructure due to the characteristics of on-demand resource provisioning and pay-as-you-go mode.In the cloud services market, service providers attempt to make more profits from their services,while users hope to choose low-cost services with high-quality.The c...

A Survey on the Adoption of Patterns for Engineering Software for the Cloud

 This work takes as a starting point a collection of patterns for engineering software for the cloud and tries to find how they are regarded and adopted by professionals. Existing literature assessed the adoption of cloud computing with a focus on business and technological aspects and fall short in grasping a holistic view of the underlying approac...

Robust Optimization Model for Primary and Backup Resource Allocation in Cloud Providers

 This paper proposes a backup resource allocation model that provides a probabilistic protection for primary physical machines in a cloud provider to minimize the required total capacity. When any random failure occurs, workloads are transferred to preplanned and dedicated backup physical machines for prompt recovery. In the proposed model, a probab...

Revocable Attribute-Based Encryption with Data Integrity in Clouds

  Cloud computing enables enterprises and individuals to outsource and share their data. This way, cloud computing eliminates the heavy workload of local information infrastructure. Attribute-based encryption has become a promising solution for encrypted data access control in clouds due to the ability to achieve one-to-many encrypted data shari...

Data Access Control in Cloud Computing Flexible and Receiver Extendable

 Broadcast encryption provides a promising technique of data access control for specified users in cloud computing. A data uploader can generate a ciphertext for a set of chosen users such that only the intended users are able to learn the data content. However, with the rapidly increasing of collaboration between users, it is desired to extend the ...

Bidirectional and Malleable Proof-of-Ownership for Large File in Cloud Storage

 Cloud storage is a cost-effective platform to accommodate massive data at low cost. However, advances of cloud services propel data generation, which pushes storage servers to its limit. Deduplication is a popular technique enjoyed by most current cloud servers, which detects and deletes redundant data to save storage and bandwidth. For security co...

A Survey on Edge and Edge-Cloud Computing Assisted Cyber-Physical Systems

 In recent years, the investigations on Cyber-Physical Systems~(CPS) have become increasingly popular in both academia and industry. A primary obstruction against the booming deployment of CPS applications lies in how to process and manage large amounts of generated data for decision making. To tackle this predicament, researchers advocate the idea ...

A Privacy-Preserving and Untraceable Group Data Sharing Scheme in Cloud Computing

 With the development of cloud computing, the great amount of storage data requires safe and efficient data sharing. In multiparty storage data sharing, first, the confidentiality of shared data is ensured to achieve data privacy preservation. Second, the security of stored data is ensured. That is, when stored shared data are subject to frequent ac...

Reliability-Aware Cost-Efficient Scientific Workflows Scheduling Strategy on Multi-Cloud Systems

 Nowadays, more and more computation-intensive scientific applications with diverse needs are migrating to cloud computing systems. However, the cloud systems alone cannot meet applications' requirements at all times with the increasing demands from users. Therefore, the multi-cloud systems that can provide scalable storage and computing resources b...

OP-MLB An Online VM Prediction based Multi-objective Load Balancing Framework for Resource Management at Cloud Datacenter

 The elasticity of cloud resources allow cloud clients to expand and shrink their demand of resources dynamically over time. However, fluctuations in the resource demands and pre-defined size of virtual machines (VMs) lead to lack of resource utilization, load imbalance and excessive power consumption. To address these issues and to improve the perf...

Evaluation of the performance of tightly coupled parallel solvers and MPI communications in IaaS from the public cloud

 IaaS from the public cloud is becoming a new option for organizations in need of HPC capabilities. IaaS offers greater flexibility in hardware choices and operational costs. Furthermore, IaaS enables small organizations to access resources previously reserved for organizations with larger capitals. This study uses the HPCG benchmark to assess the p...

Computational Cost Analysis and Data-Driven Predictive Modeling of Cloud-based Online NILM Algorithm

 Online non-intrusive load monitoring methods have captivated academia and industries as parsimonious solutions for household energy efficiency monitoring as well as safety control, anomaly detection, and demand-side management. However, despite the promised energy efficiency by providing appliance specific consumption information feed-backs, the co...

Blockchain-Based Decentralized Public Auditing for Cloud Storage

 Public auditing schemes for cloud storage systems have been extensively explored with the increasing importance of data integrity. A third-party auditor (TPA) is introduced in public auditing schemes to verify the integrity of outsourced data on behalf of users. To resist malicious TPAs, many blockchain-based public verification schemes have been p...

Application-Aware Migration Algorithm with Prefetching in Heterogeneous Cloud Environments

 Inappropriate service migrations can lead to undesirable situations, such as high traffic overhead, long service latency, and service disruption. In this paper, we propose an application-aware migration algorithm (AMA) with prefetching. In AMA, a mobile device sends a service offloading request to the controller. After receiving this request, the c...

Spark Cloud-Based Parallel Computing for Traffic Network Flow Predictive Control Using Non-Analytical Predictive Model

 When dealing with traffic big data under the background of Internet of Things (IoT), traffic control under the single-machine computing environment is difficult to adapt to the massive and rapid analysis and decision-making. To tackle this problem, we propose a parallel computing approach of traffic network flow control based on the mechanism of mo...

Enabling (End-to-End) Encrypted Cloud Emails With Practical Forward Secrecy

 With the widespread use of cloud emails and frequent reports on large-scale email leakage events, a security property so-called forward secrecy becomes desirable and indispensable for both individuals and cloud email service providers to strengthen the security of cloud email systems. However, due to the failure to meet the security and practicalit...

Distributed Group Coordination of Multiagent Systems in Cloud Computing Systems Using a Model-Free Adaptive Predictive Control Strategy

 This article studies the group coordinated control problem for distributed nonlinear multiagent systems (MASs) with unknown dynamics. Cloud computing systems are employed to divide agents into groups and establish networked distributed multigroup-agent systems (ND-MGASs). To achieve the coordination of all agents and actively compensate for communi...

A Blockchain-Based Multi-Cloud Storage Data Auditing Scheme to Locate Fault

 Network storage services have benefited countless users worldwide due to the notable features of convenience, economy and high availability. Since a single service provider is not always reliable enough, more complex multi-cloud storage systems are developed for mitigating the data corruption risk. While a data auditing scheme is still needed in mu...

Optimal Distribution of Workloads in Cloud-Fog Architecture in Intelligent Vehicular Networks

 With the fast growth in network-connected vehicular devices, the Internet of Vehicles (IoV) has many advances in terms of size and speed for Intelligent Transportation System (ITS) applications. As a result, the amount of produced data and computational loads has increased intensely. A solution to handle the vast volume of workload has been traditi...

Mobility Aware Blockchain Enabled Offloading and Scheduling in Vehicular Fog Cloud Computing

 The development of vehicular Internet of Things (IoT) applications, such as E-Transport, Augmented Reality, and Virtual Reality are growing progressively. The mobility aware services and network-based security are fundamental requirements of these applications. However, multiside offloading enabling blockchain and cost-efficient scheduling in heter...

Collaborative Cloud and Edge Mobile Computing in C-RAN Systems with Minimal End-to-End Latency

  Mobile cloud and edge computing protocols make it possible to offer computationally heavy applications to mobile devices via computational offloading from devices to nearby edge servers or more powerful, but remote, cloud servers. Previous work assumed that computational tasks can be fractionally offloaded at both cloud processor (CP) and at a l...

BoundaryNet Extraction and Completion of Road Boundaries With Deep Learning Using Mobile Laser Scanning Point Clouds and Satellite Imagery

  Robust road boundary extraction and completion play an important role in providing guidance to all road users and supporting high-definition (HD) maps. The significant challenges remain in remarkable and accurate road boundary recovery from poor road boundary conditions. This paper presents a novel deep learning framework, named BoundaryNet, to...

A Comparative Study on the Impact of One-way and Two-way Matching Strategies on the Evolution of Cloud Manufacturing Ecosystems

 The supply-demand matching (SDM) strategy is an important part of the transaction mechanism design of cloud manufacturing (CMfg) platforms, which has a significant impact on the evolution trend of cloud manufacturing ecosystems (CMEs). To help CMfg platform operators choose the appropriate SDM strategy, first, the evolution process of the CME was q...

Partitioning Stateful Data Stream Applications in Dynamic Edge Cloud Environments

  Computation partitioning is an important technique to improve the application performance by selectively offloading some computations from the mobile devices to the nearby edge cloud. In a dynamic environment in which the network bandwidth to the edge cloud may change frequently, the partitioning of the computation needs to be updated according...

LYRIC Deadline and Budget Aware Spatio-Temporal Query Processing in Cloud

 With the enormous growth of wireless technology, and location acquisition techniques, a huge amount of spatio-temporal traces are being accumulated. This dataset facilitates varied location-aware services and helps to take real-life decisions. Efficiently handling and processing spatio-temporal queries are necessary to respond in real-time. Process...

Attribute-Based Data Sharing Scheme Revisited in Cloud Computing

 Ciphertext-policy attribute-based encryption (CPABE) is a promising encryption technology for secure data sharing in cloud computing, in which data owner can fully control access structure associated with a ciphertext. However, it brings a major drawback which is known as key escrow problem, since the decryption users’ secret keys are issued by an ...

Aggregated Capability Assessment (AgCA) for CAIQ enabled Cross-cloud Federation

  Cross-Cloud Federation (CCF) enables resource exchange among multiple, heterogeneous Cloud Service Providers (CSPs) to support the composition of services (workflow) hosted by different providers. CCF participation can either be fixed, or the types of services that can be used are limited to reduce the potential risk of service failure or secur...

A Truthful Auction for Graph Job Allocation in Vehicular Cloud-assisted Networks

 Vehicular cloud computing has emerged as a promising solution to fulfill users’ demands on processing computation-intensive applications in modern driving environments. Such applications are commonly represented by graphs consisting of components and edges. However, encouraging vehicles to share resources poses significant challenges owing to users...

Private Graph: Privacy-Preserving Spectral Analysis of Encrypted Graphs in the Cloud

 With the wide deployment of public clouds, owners of big graphs want to use the cloud to handle the scalability issues. However, the privacy and ownership of the graphs in the cloud has become a major concern. In this paper, we study privacy-preserving algorithms for graph spectral analysis of outsourced encrypted graph in the cloud. We consider a ...

Digital Media Marketing using Trend Analysis On Social Media

 Social Media has quickly gained prominence as it provides people with the opportunity to communicate and share posts and topics. Tremendous value lies in automated analysing and reasoning about such data in order to derive meaningful insights, which carries potential opportunities for businesses, users, and consumers. Many events in the world are a...

ONLINE PRICE COMPARISON FOR E-COMMERCE

 Price comparison sites and comparison –shopping engines gives ecommerce traders a good opportunity to boost their sales, attract new customers and go ahead against their competitors. Even Shoppers often look for best deals and offers for a particular product which they are looking for. It is difficult to visit each and every website for comparing t...

Semantics of Data Mining Services in Cloud Computing

 The recent incorporation of new Data Mining and Machine Learning services within Cloud Computing providers is empowering users with extremely comprehensive data analysis tools including all the advantages of this type of environment. Providers of Cloud Computing services for Data Mining publish the descriptions and definitions in many formats and o...

Complying with Data Handling Requirements in Cloud Storage Systems

 In past years, cloud storage systems saw an enormous rise in usage. However, despite their popularity and importance as underlying infrastructure for more complex cloud services, today’s cloud storage systems do not account for compliance with regulatory, organizational, or contractual data handling requirements by design. Since legislation increas...

Secure Data Group Sharing and Conditional Dissemination with Multi-Owner in Cloud Computing

 With the rapid development of cloud services, huge volume of data is shared via cloud computing. Although cryptographic techniques have been utilized to provide data confidentiality in cloud computing, current mechanisms cannot enforce privacy concerns over cipher text associated with multiple owners, which makes co-owners unable to appropriately c...

Improving Failure Tolerance in Large-Scale Cloud Computing Systems

 Fault tolerance is a major concern to guarantee availability and reliability of critical services as well as application execution. In order to minimize failure impact on the system and application execution, failures should be anticipated and proactively handled. Fault tolerance techniques are used to predict these failures and take an appropriate...

AN EMPIRICAL INVESTIGATION OF INVENTORY MANAGEMENT PRACTICES OF PAPER MILLS

 Inventory measured in terms of money, constitutes an important element in the working capital of most business firms except financial ones. Their size and rate of turnover, therefore, influences greatly the size and rate of turnover of working capital and through them, the income and profit of a business. Thus, inventory management is having consid...

SECURE DATA SHARING FOR MOBILE CLOUD COMPUTING USING BLOWFISH ALGORITHM

 Cloud computing is a great innovation in the world of computing, there also exist downsides of cloud computing. These most important challenges are security and privacy of data on the cloud, check availability of data on the cloud. For these problems, data storage security refers to the security of data on the storage media. Security is an importan...

Orphanage management system

 Orphanage is the name to describe a residential place dedicated for orphans whose parents are dead. Parent and grandparent are legally responsible for taking up the responsibility of taking care of their grandchildren, but in case both parents and grandparents, or other relations willing to take up the responsibility of the children, they lose all ...

Online Identification and Data Recovery for PMU Data Manipulation Attack

 Some of the modern smart grid infrastructures, phasor measurement units (PMUs) for instance, are vulnerable to cyber attacks due to their ever-increasing dependence on information and communications technologies. In general, existing solutions to cyber attacks focus on creating redundancy and/or enhancing security levels of sensing and communicatio...

Dual Access Control for Cloud-Based Data Storage and Sharing

 Cloud-based data storage service has drawn increasing interests from both academic and industry in the recent years due to its efficient and low cost management. Since it provides services in an open network, it is urgent for service providers to make use of secure data storage and sharing mechanism to ensure data confidentiality and service user p...

Organ Donation Management System in Cloud

 The organ donation is currently increasing in our country. Organ donation leads to control death rate due to organ malfunction. The organ donor and recipient data bases are to be organized with our application. The lists of donors and required patients will be updated in the database with their necessary data like blood group, age, gender, etc from...

Agro Bidding A Smart Dynamic System for Enhancement of Farmers Lifestyle

 This is an online auction web site aimed at taking the auction to the fingertips of aspiring bidders there by opening up the doors of the "OPEN Auction House' to a wider cross section of Art Lovers and Antique Collectors. This site also acts as an open forum where buyers and sellers can come together and exchange their products. The site makes sure...

AUTOMATIC RENT AND BILL PAYMENT SYSTEM

 The main aim of our project is to make the rental charges and monthly bills to pay automatically without any fail. The user management system will be deployed and it will be shown as a banking interface. The digital money will be taken and the deduction for House Rent, Corporation Tax, Telephone Bill and Gas Bill. The virtual money will tend to ded...

Authentication and key agreement based on anonymous identity for peer-to-peer cloud

 Cross-cloud data migration is one of the prevailing challenges faced by mobile users, which is an essential process when users change their mobile phones to a different provider. However, due to the insufficient local storage and computational capabilities of the smart phones, it is often very difficult for users to backup all data from the origina...

PKE-MET Public-Key Encryption with Multi-Ciphertext Equality Test in Cloud Computing

 Cloud computing enables users to remove the necessity of the need of local hardware architecture, which removes the burden of the users from high computation costs. Therefore, it has attracted much attention and research has been conducted heavily on it. To protect users’ privacy, data is usually encrypted prior to being sent to the cloud server. A...

Performance Analysis of a Delay Constrained Data Offloading Scheme in an Integrated Cloud-Fog-Edge Computing System

 The recent growth in intensive services and applications demand has triggered the functional integration of cloud computing with edge computing capabilities. One of the main goals is to allow a fast processing to tasks with strict real time constraints in order to lower the task dropping probabi...

Less is more: Service Profit Maximization in Geo-Distributed Clouds

 Nowadays cloud providers purchase a good deal of bandwidth from Internet service providers to satisfy the growing requests from corporate customers for the exclusive use of inter-datacenter bandwidth. For exclusive bandwidth services, neither maximizing the revenue nor minimizing the cost can bring the maximal profit to cloud providers. The diversi...

LayerChain: A Hierarchical Edge-Cloud Block chain for Large-Scale Low-Delay IIoT Applications

 The combination of pervasive edge computing and block chain technologies opens up significant possibilities for Industrial Internet of Things (IIoT) applications, but there are several critical limitations regarding efficient storage and rapid response for large-scale low-delay IIoT scenarios. To address these limitations, we propose a hierarchical...

HyCloud Tweaking Hybrid Cloud Storage Services for Cost-Efficient File system Hosting

 Today’s cloud storage infrastructures typically pro-vide two distinct types of services for hosting files:object storage like Amazon S3 and file system storage like Amazon EFS. The former supports simple, flat object operations with a low unit storage price, while the latter supports complex, hierarchicalfilesystem operations...

Forecasting Cloud Application Workloads with Cloud Insightfor Predictive Resource Management

 Predictive cloud resource management has been widely adopted to overcome the limitations of reactive cloud auto scaling. The predictive resource management is highly relying on workload predictors, which estimate short-/long-term fluctuations of cloud application workloads. These predictors tend to be pre-optimized for specific workload patterns. H...

Forecasting Cloud Application Workloads with Cloud Insightfor Predictive Resource Management

 Predictive cloud resource management has been widely adopted to overcome the limitations of reactive cloud auto scaling. The predictive resource management is highly relying on workload predictors, which estimate short-/long-term fluctuations of cloud application workloads. These predictors tend to be pre-optimized for specific workload patterns. H...

Fault Injection Analytics A Novel Approach to Discover Failure Modes in Cloud Computing Systems

 Cloud computing systems fail in complex and unexpected ways, due to unexpected combinations of events and interactions between hardware and software components. Fault injection is an effective means to bring out these failures in a controlled environment. However, fault injection experiments produce massive amounts of data, and manually analyzing t...

Fairness Efficiency Scheduling for Cloud Computing with Soft Fairness Guarantees

 Fairness and efficiency are two important metrics for users in modern data center computing system. Due to the heterogeneous resource demands of CPU, memory, and network I/O for users’ tasks, it cannot achieve the strict100%fairness and the maximum efficiency at the same time. Existing fairness-efficiency schedulers (e.g., Tetris) can balance such ...

Enabling Cost-Effective, SLO-Aware Machine Learning Inference Serving on Public Cloud

 The remarkable advances of Machine Learning (ML) have spurred an increasing demand for ML-as-a-Service on public cloud: developers train and publish ML models as online services to provide low-latency inference for dynamic queries. The primary challenge of ML model serving is to meet the response-time Service-Level Objectives (SLOs) of inference wo...

Edgence: A Block chain-Enabled Edge Computing Platform for Intelligent IoT-Based dApps

 Nowadays scalable IoT management is a bottleneck of IoT development due to the geographically dispersed distribution, fragmented ownerships, and ever growing population of IoT devices. To intelligently manage massive decentralized applications (dApps) in IoT use cases, Edgence (EDGe + intelligence) is proposed to use edge clouds to access IoT devic...

Edge-Cloud Computing for IoT Data Analytics: Embedding Intelligence in the Edge with Deep Learning

 Rapid growth in numbers of connected devices including sensors, mobile, wearable, and other Internet of Things (IoT) devices, is creating an explosion of data that are moving across the network. To carry out machine learning (ML), IoT data are typically transferred to the cloud or another centralized system for storage and processing; however, this...

Dynamic Scheduling for Stochastic Edge Cloud Computing Environments using A3C learning and Residual Recurrent Neural Networks

 The ubiquitous adoption of Internet-of-Things (IoT) based applications has resulted in the emergence of the Fog computing paradigm, which allows seamlessly harnessing both mobile-edge and cloud resources. Efficient scheduling of application tasks in such environments is challenging due to constrained resource capabilities, mobility factors in IoT, ...

Co-Residence Data Theft Attacks on N-Version Programming Based Cloud Services with Task Cancelation

 Powered by virtualization, the cloud computing has brought good merits of cost effective and on-demand resource sharing among many users. On the other hand, cloud users face security risks from co-residence attacks when using this virtualized platform. Particularly, a malicious attacker may create side channels to steal data from a target user’s vi...

Contract Based Resource Sharing for Time Effective Task Scheduling in Fog Cloud Environment

 Fog computing as an extension of the cloud based infrastructure, provides a better computing platform than cloud computing for mobile computing, Internet of Things, etc. One of the problems is how to make full use of the resources of the fog so that more requests of applications can be executed on the edge, reducing the pressure on the network and ...

Concurrent Healthcare Data Processing and Storage Framework using Deep Learning in Distributed Cloud Computing Environment

 Distributed cloud computing environments rely on sophisticated communication and sharing paradigms for ease of access, information processing, and analysis. The challenging characteristic of such cloud computing environments is the concurrency and access as both the service provider and end-user rely on the common sharing platform. In this manuscri...

Computation Offloading with Instantaneous Load Billing for Mobile Edge Computing

 Mobile edge computing (MEC) is a promising approach that can reduce the latency of task processing by offloading tasks from user equipments (UEs) to MEC servers. Existing works always assume that the MEC server is capable of executing the offloaded tasks, without considering the impact of improper load on task processing efficiency. In this paper, ...

Cloud Intrusion Detection Method Based on Stacked Contractive Auto-Encoder and Support Vector Machine

 Security issues have resulted in severe damage to the cloud computing environment, adversely affecting the healthy and sustainable development of cloud computing. Intrusion detection is one of the technologies for protecting the cloud computing environment from malicious attacks. However, network traffic in the cloud computing environment is charac...

Cloud Firewall Under Bursty and Correlated Data Traffic: A Theoretical Analysis

 Cloud firewalls stand as one of the major building blocks of the cloud security framework protecting the Virtual Private Infrastructure against attacks such as the Distributed Denial of Service (DDoS). In order to fully characterize the cloud firewall operation and gain actionable insights on the design of cloud security, performance models for the...

Architectural Design of Cloud Applications: a Performance-aware Cost Minimization Approach

 Cloud Computing has assumed a relevant role in the ICT, profoundly influencing the life-cycle of modern applications in the manner they are designed, developed, deployed and operated. In this paper, we tackle the problem of supporting the design-time analysis of Cloud applications to identify a cost-optimized strategy for allocating components onto...

An Edge Computing Matching Framework with Guaranteed Quality of Service

 Edge computing is a new computing paradigm, which aims at enhancing user experience by bringing computing resources closer to where data is produced by Internet of Things (IoT). Edge services are provided by small data centers located at the edge of the network, called cloudlets. However, IoT users often face strict Quality of Service (QoS) constra...

An Anonymous Authentication System for Pay-As-You-Go Cloud Computing

 Cloud computing offers on-demand availability of computing resources over the Internet. To attract users, cloud providers offer their resources as services at reasonable prices and provide various price models to reflect higher level of quality of service (QoS), which are referred as pricing schemes. k-times anonymous authentication (k-TAA) is an a...

A Review on Computational Intelligence Techniques in Cloud and Edge Computing

 Cloud computing (CC) is a centralized computing paradigm that accumulates resources centrally and provides these resources to users through Internet. Although CC holds a large number of resources, it may not be acceptable by real-time mobile applications, as it is usually far away from users geographically. On the other hand, edge computing (EC), w...

A Dynamic Deep-learning-based Virtual Edge Node Placement Scheme for Edge Cloud Systems in Mobile Environment

 Edge node placement is a key topic to edge cloud systems for that it affects their service performances significantly. Previous solutions based on the existing information are not suitable for the mobile environment due to the mobility and random Internet access of end users. In this paper, we propose a dynamic virtual edge node placement scheme, i...

A Cooperative Coevolution Genetic Programming Hyper-Heuristic Approach for On-line resource Allocation in Container based Clouds

 Containers are lightweight and provide the potential to reduce more energy consumption of data centers than Virtual Machines (VMs) in container-based clouds. The on-line resource allocation is the most common operation in clouds. However, the on-line Resource Allocation in Container-based clouds (RAC) is new and challenging because of its two-level...

A Cloud-Edge Collaboration Framework for Cognitive Service

 Cloud computing has significantly enhanced the growth of the Internet of Things (IoT) by ensuring and supporting the Quality of Service (QoS) of IoT applications. However, cloud services are still far from IoT devices. Notably, the transmission of IoT data experiences network issues, such as high latency. In this case, the cloud platforms cannot sa...

We have more than 145000 Documents , PPT and Research Papers

Have a question ?

Mail us : info@nibode.com