Search
Now showing items 1-10 of 49
Processing geo-dispersed big data in an advanced mapreduce framework
(
Institute of Electrical and Electronics Engineers Inc.
, 2015 , Article)
Big data has emerged as a new era of information generation and processing. Big data applications are expected to provide a lot of benefits and convenience to our lives. Cloud computing is a popular infrastructure that has ...
Toward energy-efficient cloud computing: Prediction, consolidation, and overcommitment
(
Institute of Electrical and Electronics Engineers Inc.
, 2015 , Article)
Energy consumption has become a significant concern for cloud service providers due to financial as well as environmental factors. As a result, cloud service providers are seeking innovative ways that allow them to reduce ...
Haddle: A framework for investigating data leakage attacks in hadoop
(
Institute of Electrical and Electronics Engineers Inc.
, 2015 , Conference)
Nowadays Hadoop is popular among businesses and individuals for its low costs, convenience, and fast speed. However, this also makes it the goal of data leakage attacks as sensitive data stored with an HDFS infrastructure ...
Online assignment and placement of cloud task requests with heterogeneous requirements
(
Institute of Electrical and Electronics Engineers Inc.
, 2015 , Conference)
Managing cloud resources in a way that reduces the consumed energy while also meeting clients demands is a challenging task. In this paper, we propose an energy-aware resource allocation framework that: i) places the ...
Enabling smart cloud services through remote sensing: An internet of everything enabler
(
Institute of Electrical and Electronics Engineers Inc.
, 2014 , Article)
The recent emergence and success of cloud-based services has empowered remote sensing and made it very possible. Cloud-assisted remote sensing (CARS) enables distributed sensory data collection, global resource and data ...
Auditing cloud service level agreement on VM CPU speed
(
IEEE Computer Society
, 2014 , Conference)
In this paper, we present a novel scheme for auditing Service Level Agreement (SLA) in a semi-trusted or untrusted cloud. A SLA is a contract formed between a cloud service provider (CSP)and a user which specifies, in ...
QoE-Aware Resource Allocation for Crowdsourced Live Streaming: A Machine Learning Approach
(
Institute of Electrical and Electronics Engineers Inc.
, 2019 , Conference)
Driven by the tremendous technological advancement of personal devices and the prevalence of wireless mobile network accesses, the world has witnessed an explosion in crowdsourced live streaming. Ensuring a better viewers ...
Garbled computation in cloud
(
Elsevier
, 2016 , Article)
With the wide adoption of cloud computing paradigm, it is important to develop appropriate techniques to protect client data privacy in the cloud. Encryption is one of the major techniques that could be used to achieve ...
Edge and fog computing for IoT: A survey on current research activities & future directions
(
Elsevier B.V.
, 2021 , Article Review)
The Internet of Things (IoT) allows communication between devices, things, and any digital assets that send and receive data over a network without requiring interaction with a human. The main characteristic of IoT is the ...
Malicious mining code detection based on ensemble learning in cloud computing environment
(
Elsevier B.V.
, 2021 , Article)
Hackers increasingly tend to abuse and nefariously use cloud services by injecting malicious mining code. This malicious code can be spread through infrastructures in the cloud platforms and pose a great threat to users ...