Browsing by Subject "Cloud computing"
Now showing items 1-20 of 64
-
A blockchain-based fog computing framework for activity recognition as an application to e-Healthcare services
( Elsevier B.V. , 2019 , Article)In modern e-Healthcare systems, human activity recognition (HAR) is one of the most challenging tasks in remote monitoring of patients suffering from mental illness or disabilities for necessary assistance. One of the major ... -
A Computation Offloading Incentive Mechanism with Delay and Cost Constraints under 5G Satellite-Ground IoV Architecture
( Institute of Electrical and Electronics Engineers Inc. , 2019 , Article)The 5G Internet of Vehicles has become a new paradigm alongside the growing popularity and variety of computation-intensive applications with high requirements for computational resources and analysis capabilities. Existing ... -
A context-aware approach for long-term behavioural change detection and abnormality prediction in ambient assisted living
( Elsevier , 2015 , Article)This research aims to describe pattern recognition models for detecting behavioural and health-related changes in a patient who is monitored continuously in an assisted living environment. The early anticipation of anomalies ... -
A cost-aware model for risk mitigation in Cloud computing systems
( IEEE Computer Society , 2016 , Conference Paper)Security is an important element in Cloud computing. Intruders may exploit clouds for their advantage. This paper presents a cost-aware model for risk mitigation in cloud computing systems. The proposed model is integrated ... -
A finite context intrusion prediction model for cloud systems with a probabilistic suffix tree
( Institute of Electrical and Electronics Engineers Inc. , 2014 , Conference Paper)The success of the cloud computing paradigm depends on how effectively the cloud infrastructures will be able to instantiate and dynamically maintain computing platforms that meet Quality of Service (QoS) requirements. ... -
A finite state hidden markov model for predicting multistage attacks in cloud systems
( IEEE , 2014 , Conference Paper)Cloud computing significantly increased the security threats because intruders can exploit the large amount of cloud resources for their attacks. However, most of the current security technologies do not provide early ... -
A machine learning-based optimization approach for pre-copy live virtual machine migration
( Springer , 2023 , Article)Organizations widely use cloud computing to outsource their computing needs. One crucial issue of cloud computing is that services must be available to clients at all times. However, the cloud services may be temporarily ... -
A parallel patient treatment time prediction algorithm and its applications in hospital queuing-recommendation in a big data environment
( Institute of Electrical and Electronics Engineers Inc. , 2016 , Article)Effective patient queue management to minimize patient wait delays and patient overcrowding is one of the major challenges faced by hospitals. Unnecessary and annoying waits for long periods result in substantial human ... -
A Process Model for Customisation of Software in Multi-tenant SaaS Model
( Institute of Electrical and Electronics Engineers Inc. , 2015 , Conference Paper)This paper outlines a generic process framework for customisation of software in cloud computing. The flexibility for client-specific customisation of the software offered by software-as-a-service (SaaS) is limited. The ... -
A resource provisioning framework for bioinformatics applications in multi-cloud environments
( Elsevier , 2018 , Article)The significant advancement in Next Generation Sequencing (NGS) have enabled the generation of several gigabytes of raw data in a single sequencing run. This amount of raw data introduces new scalability challenges in ... -
A risk mitigation approach for autonomous cloud intrusion response system
( Springer-Verlag Wien , 2016 , Article)Cloud computing delivers on-demand resources over the Internet on a pay-for-use basis, intruders may exploit clouds for their advantage. This paper presents Autonomous Cloud Intrusion Response System (ACIRS), a proper ... -
A secure client-side framework for protecting the privacy of health data stored on the cloud
( Institute of Electrical and Electronics Engineers Inc. , 2018 , Conference Paper)In the past decade, Cloud-Computing emerged as a new computing concept with a distributed nature using virtual network and systems. Many businesses rely on this technology to keep their systems running but concerns are ... -
A survey and taxonomy on energy efficient resource allocation techniques for cloud computing systems
( Springer , 2014 , Article)In a cloud computing paradigm, energy efficient allocation of different virtualized ICT resources (servers, storage disks, and networks, and the like) is a complex problem due to the presence of heterogeneous application ... -
Application delivery in multi-cloud environments using software defined networking
( Elsevier , 2014 , Article)Today, most large Application Service Providers (ASPs) such as Google, Microsoft, Yahoo, Amazon and Facebook operate multiple geographically distributed datacenters, serving a global user population that are often mobile. ... -
Attack Prediction Models for Cloud Intrusion Detection Systems
( Institute of Electrical and Electronics Engineers Inc. , 2014 , Conference Paper)In spite of the functional and economic benefits of the cloud-computing systems, they also expose entirely several attacks. Most of the current cloud security technologies do not provide early warnings about such attacks. ... -
AUDIT: approving and tracking updates with dependencies in collaborative databases
( Springer New York LLC , 2018 , Article)Collaborative databases such as genome databases, often involve extensive curation activities where collaborators need to interact to be able to converge and agree on the content of data. In a typical scenario, a member ... -
Auditing cloud service level agreement on VM CPU speed
( IEEE Computer Society , 2014 , Conference Paper)In this paper, we present a novel scheme for auditing Service Level Agreement (SLA) in a semi-trusted or untrusted cloud. A SLA is a contract formed between a cloud service provider (CSP)and a user which specifies, in ... -
Automatic verification of health regulatory compliance in cloud computing
( IEEE , 2013 , Conference Paper)This paper aims to develop an approach that enables cloud computing clients to verify health regulatory compliance claimed by cloud computing providers. In this approach, clients of cloud computing could check automatically ... -
Blockchain-based incentives for secure and collaborative data sharing in multiple clouds
( Institute of Electrical and Electronics Engineers Inc. , 2020 , Article)The prosperity of cloud computing has driven an increasing number of enterprises and organizations to store their data on private or public cloud platforms. Due to the limitation of individual data owners in terms of data ... -
Challenges And Practices Identification Via A Systematic Literature Review In The Adoption Of Green Cloud Computing: Client’s Side Approach
( IEEE , 2021 , Article)Green cloud computing gains popularity over the last decade due to the extensive use of cloud computing. The trend towards cloud computing is spreading at a fast rate. Cloud computing providers extend their data centers ...