A great success of Wireless Sensor Networks (WSNs). Recent advances in Wireless Sensor Network technologies provide people the ability to better understand the physical world. With the data collected from the entire network, the sensor network supports a variety of applications, including security surveillance, localization, information enquiry, and transmission. The ubiquitous data collection by mobile […]
M/M/m queuing model for Profit maximization in cloud computing
This paper focuses the problem of optimal multi-server configuration for profit maximization in a cloud computing environment. This approach is to treat a multi-server system as an M/M/m queuing model, such that our optimization problem can be formulated and solved analytically. We consider two server speed and power consumption models, namely, the idle-speed model and […]
Optimal Client-Server Assignment for Internet Distributed Systems
We investigate an underlying mathematical model and algorithms for optimizing the performance of a class of distributed systems over the Internet. Such a system consists of a large number of clients who communicate with each other indirectly via a number of intermediate servers. Optimizing the overall performance of such a system then can be formulated […]
Secure Multi-Party algorithm for Mining of Association Rule in Databases
We propose a protocol for secure mining of association rules in horizontally distributed databases. The current leading protocol is that of Kantarcioglu and Clifton . The main ingredients in our protocol are two novel secure multi-party algorithms — one that computes the union of private subsets that each of the interacting players hold, and another […]
Facilitates systematic detection and resolution of XACML policy anomalies
In this paper, we represent an innovative policy anomaly analysis approach for Web access control policies, focusing on XACML (eXtensible Access Control Markup Language) policy.We introduce a policy based segmentation technique to accurately identify policy anomalies and derive effective anomaly resolutions, along with an intuitive visualization representation of analysis results. We also discuss a proof-of-concept […]
Authorization Security model conceived to secure access to Semantic repositories
Most semantic repositories are designed to manage semantic models but do not deal with access rights. As in the case of databases that are traditional, data stored inside a semantic database should be protected. by granting access to authorized users only. Semantic models help in achieving semantic interoperability among sources of data and applications. The […]
HIGH UTILIZATION STRATEGIES FOR COMPUTATIONAL ECONOMIES
Utility computing models have long been the focus of academic research, and with the recent success of commercial cloud providers, computation and storage is finally being realized as the fifth utility. Computational economies are often proposed as an efficient means of resource allocation , however adoption has been limited due to a lack of performance […]
Efficient Global Snapshot Algorithms for Large-Scale Distributed Systems
A global snapshot represents a consistent global state of the system. A global state is consistent if and only if all pairs of its constituent local states of processors are consistent, i.e., if the receiving event of message is recorded, the sending event of the same message must also be recorded, and all in-transit messages […]
FUSION-BASED FAULT TOLERANT DATA STRUCTURES HOSTED ON DISTRIBUTED SERVER
In this paper, we present a technique referred to as fusion which combines the best of both these worlds to achieve the space efficiency of coding and the minimal update overhead of replication. Given a set of data structures, we maintain a set of fused backup data structures that can tolerate f crash faults among […]
Certificate Revocation Scheme with proof facility to provide secure communications in MANETs
Mobile ad hoc networks (MANETs) have attracted much attention due to their mobility and ease of deployment. However, the wireless and dynamic natures render them more vulnerable to various types of security attacks than the wired networks. The major challenge is to guarantee secure network services. To meet this challenge, certificate revocation is an important […]