The competition among providers leads to the dynamics of cloud resource pricing. Modelling this competition involves the description of the user’s choice behaviour and the formulation of the dynamic pricing strategies of providers to adapt to the market state. Cloud providers may cooperate with each other to improve their final revenue. Based on a Service […]
COMPETITION AND COOPERATION AMONG CLOUD PROVIDERS USING A NOVEL MODEL
A provider naturally wishes to set a higher price to get a higher revenue; however, in doing so, it also bears the risk of discouraging demand in the future. On the other hand, they also look for the means to cooperate with other providers to reduce the operation cost and therefore improve their final revenue. […]
UNTRUSTED CLOUD ENVIRONMENTS USING SECURE KNN QUERY PROCESSING
Users send their current location as the query parameter, and wish to receive as result the nearest POIs, i.e., nearest – neighbors (NNs). But typical data owners do not have the technical means to support processing queries on a large scale, so they outsource data storage and querying to a cloud service provider. Many such […]
K-NEAREST NEIGHBOUR QUERY PROCESSING IN UNTRUSTED CLOUD ENVIRONMENTS
The emergence of mobile devices with fast Internet connectivity and geo-positioning capabilities has le d to a revolution in customized location – based services (LBS) , where users are enabled to access information about points of interest (POI ) that are relevant to their interests and are also close to their geographical coordinates. Pro b- […]
TOF-A GENERAL TRANSFORMATION-BASED OPTIMIZATION FRAMEWORK FOR WORKFLOWS IN THE CLOUD
A workflow management system should balance the cost and performance. Thus, performance and (monetary) cost optimizations have recently become a hot research topic for workflows in the cloud. However, we find that most existing studies adopt ad hoc optimization strategies, which fail to capture the key optimization opportunities for different workloads and cloud offerings (e.g., […]
WORKFLOWS IN THE CLOUD USING TRANSFORMATION-BASED MONETARY COST OPTIMIZATIONS
This abstract proposes ToF, a general transformation-based optimization framework for workflows in the cloud. Specifically, ToF formulates six basic workflow transformation operations. An arbitrary performance and cost optimization process can be represented as a transformation plan (i.e., a sequence of basic transformation operations). All transformations form a huge optimization space. We further develop a cost […]
A MEDIATED CERTIFICATELESS ENCRYPTION SCHEME FOR SECURELY SHARING SENSITIVE INFORMATION IN PUBLIC CLOUDS
In this abstract, we propose a new mCL-PKE scheme. We present the formal security model and provide the security proof. Since our mCL-PKE scheme does not depend on the pairing-based operation, it reduces the computational overhead. Moreover, we introduce an extension of mCL-PKE scheme to efficiently encrypt data for multiple users. We propose a novel […]
MCLPKE SCHEME WITHOUT USING PAIRING OPERATIONS FOR SECURE DATA SHARING IN PUBLIC CLOUDS
An advantage of using a public cloud for storage is that the provider is responsible for building and maintaining the storage infrastructure and its associated costs including power, cooling and server maintenance. We propose a mediated certificateless encryption scheme without pairing operations for securely sharing sensitive information in public clouds. Mediated certificateless public key encryption […]
CLOUD COMPUTING WITH SHARED AUTHORITY BASED PRIVACY-PRESERVING AUTHENTICATION PROTOCOL
In our model, privacy is accomplished by encrypting the data it can prevent the un authorized access. We are going to raise the privacy level of the data owner and the confidentiality of the data by providing access to users. Here we proposed the secured system and data owner can decide whether the user can […]
SAPA PROTOCOL FOR CLOUD STORAGE
In this abstract, we propose a shared authority based privacy preserving authentication protocol (SAPA) for the cloud data storage, which realizes authentication and authorization without compromising a user’s private information. The main contributions are as follows. 1) Identify a new privacy challenge in cloud storage, and address a subtle privacy issue during a user challenging […]
- 1
- 2
- 3
- …
- 6
- Next Page »