Search
Now showing items 71-80 of 136
Haddle: A framework for investigating data leakage attacks in hadoop
(
Institute of Electrical and Electronics Engineers Inc.
, 2015 , Conference Paper)
Nowadays Hadoop is popular among businesses and individuals for its low costs, convenience, and fast speed. However, this also makes it the goal of data leakage attacks as sensitive data stored with an HDFS infrastructure ...
Processing geo-dispersed big data in an advanced mapreduce framework
(
Institute of Electrical and Electronics Engineers Inc.
, 2015 , Article)
Big data has emerged as a new era of information generation and processing. Big data applications are expected to provide a lot of benefits and convenience to our lives. Cloud computing is a popular infrastructure that has ...
Understanding the topologies of BitTorrent networks: A measurement view
(2012 , Conference Paper)
BitTorrent (BT) is one of the most popular Peer-to-Peer (P2P) network applications. Most characteristics (except the topology) of BT network have been examined extensively by measurement approaches. In this work, we deploy ...
A measurement study on the topologies of BitTorrent networks
(
Institute of Electrical and Electronics Engineers Inc.
, 2013 , Article)
BitTorrent (BT) is a widely-used peer-to-peer (P2P) application. Most of BT's characteristics (except the topology) have been studied extensively by measurement approaches. In this paper, we deploy a measurement system to ...
Auditing cloud service level agreement on VM CPU speed
(
IEEE Computer Society
, 2014 , Conference Paper)
In this paper, we present a novel scheme for auditing Service Level Agreement (SLA) in a semi-trusted or untrusted cloud. A SLA is a contract formed between a cloud service provider (CSP)and a user which specifies, in ...
Privacy Leakage in Smart Homes and Its Mitigation: IFTTT as a Case Study
(
Institute of Electrical and Electronics Engineers Inc.
, 2019 , Article)
The combination of smart home platforms and automation apps introduce many conveniences to smart home users. However, this also brings the potential of privacy leakage. If a smart home platform is permitted to collect all ...
Online parallelized service function chain orchestration in data center networks
(
Institute of Electrical and Electronics Engineers Inc.
, 2019 , Article)
In recent years, much attention has been focused on deploying service function chains (SFCs), each of which is composed of a set of virtual network functions (VNFs) in a specified order. This is a promising approach for ...
Toward SLAs Guaranteed Scalable VDC Provisioning in Cloud Data Centers
(
Institute of Electrical and Electronics Engineers Inc.
, 2019 , Article)
Cloud computing has been a cost-efficient paradigm for deploying various applications in datacenters in recent years. Therefore, efficient provisioning for virtual data center (VDC) requests from different service providers ...
Location privacy preservation for mobile users in location-based services
(
Institute of Electrical and Electronics Engineers Inc.
, 2019 , Article)
Because location-based cyber services are increasingly found in mobile applications (e.g., social networking and maps), user location privacy preservation is essential and remains one of the several ongoing research ...
Resource allocation in information-centric wireless networking with D2D-enabled MEC: A deep reinforcement learning approach
(
Institute of Electrical and Electronics Engineers Inc.
, 2019 , Article)
Recently, information-centric wireless networks (ICWNs) have become a promising Internet architecture of the next generation, which allows network nodes to have computing and caching capabilities and adapt to the growing ...