Search
Now showing items 11-20 of 21
Performance analysis of data intensive cloud systems based on data management and replication: a survey
(
Springer New York LLC
, 2016 , Article)
As we delve deeper into the ‘Digital Age’, we witness an explosive growth in the volume, velocity, and variety of the data available on the Internet. For example, in 2012 about 2.5 quintillion bytes of data was created on ...
Systematic identification of threats in the cloud: A Survey
(
Elsevier B.V.
, 2019 , Article)
When a vulnerability is discovered in a system, some key questions often asked by the security analyst are what threat(s) does it pose, what attacks may exploit it, and which parts of the system it affects. Answers to those ...
Enabling smart cloud services through remote sensing: An internet of everything enabler
(
Institute of Electrical and Electronics Engineers Inc.
, 2014 , Article)
The recent emergence and success of cloud-based services has empowered remote sensing and made it very possible. Cloud-assisted remote sensing (CARS) enables distributed sensory data collection, global resource and data ...
Toward energy-efficient cloud computing: Prediction, consolidation, and overcommitment
(
Institute of Electrical and Electronics Engineers Inc.
, 2015 , Article)
Energy consumption has become a significant concern for cloud service providers due to financial as well as environmental factors. As a result, cloud service providers are seeking innovative ways that allow them to reduce ...
Processing geo-dispersed big data in an advanced mapreduce framework
(
Institute of Electrical and Electronics Engineers Inc.
, 2015 , Article)
Big data has emerged as a new era of information generation and processing. Big data applications are expected to provide a lot of benefits and convenience to our lives. Cloud computing is a popular infrastructure that has ...
A blockchain-based fog computing framework for activity recognition as an application to e-Healthcare services
(
Elsevier B.V.
, 2019 , Article)
In modern e-Healthcare systems, human activity recognition (HAR) is one of the most challenging tasks in remote monitoring of patients suffering from mental illness or disabilities for necessary assistance. One of the major ...
Garbled computation in cloud
(
Elsevier
, 2016 , Article)
With the wide adoption of cloud computing paradigm, it is important to develop appropriate techniques to protect client data privacy in the cloud. Encryption is one of the major techniques that could be used to achieve ...
A context-aware approach for long-term behavioural change detection and abnormality prediction in ambient assisted living
(
Elsevier
, 2015 , Article)
This research aims to describe pattern recognition models for detecting behavioural and health-related changes in a patient who is monitored continuously in an assisted living environment. The early anticipation of anomalies ...
Secure policy execution using reusable garbled circuit in the cloud
(
Elsevier B.V.
, 2018 , Article)
While cloud computing is fairly mature, there are underpinning data privacy and confidentiality issues that have yet to be resolved by existing security solutions such as cross domain access control policies. The latter ...
Garbled computation in cloud
(
Elsevier
, 2016 , Article)
With the wide adoption of cloud computing paradigm, it is important to develop appropriate techniques to protect client data privacy in the cloud. Encryption is one of the major techniques that could be used to achieve ...