Geographically distributed data centers are contains a huge number of servers. Our goal then is to minimize power cost by deciding, how to distribute the workload from the front-end servers to the back-end clusters, how many servers to activate at each back-end cluster at any given time; and how to set the service rates (or […]
BROKER-LESS PUBLISH/SUBSCRIBE SYSTEMS WITH IDENTITY-BASED ENCRYPTION
In publish/subscribe (pub/sub) communication, Publishers inject information into the pub/sub system, and subscribers specify the events of interest by means of subscriptions. Published events are routed to their relevant subscribers, without the publishers knowing the relevant set of subscribers, or vice versa. This abstract presents a novel approach to provide confidentiality and authentication in a […]
STOCHASTIC POWER REDUCTION SCHEME BASED POWER COST REDUCTION IN DISTRIBUTED DATA CENTERS
Geographically distributed data centers are contains a huge number of servers. Our goal then is to minimize power cost by deciding, how to distribute the workload from the front-end servers to the back-end clusters, how many servers to activate at each back-end cluster at any given time; and how to set the service rates (or […]
REDUCING POWER COST USING SAVE ALGORITHM IN DISTRIBUTED DATA CENTERS
In this abstract propose a two-time-scale control algorithm aimed at reducing power cost and facilitating a power cost versus delay trade-off in geographically distributed data centers. By extending the traditional Lyapunov optimization approach, which operates on a single time scale, to two different time scales, we derive analytical bounds on the time average power cost […]
CLOUD COMPUTING WITH RESILIENT UCONABC REEVALUATION AUTHORIZATION MODEL
UCONABC applies continuous authorization reevaluation, which requires usage accounting that enables fine-grained access control for cloud computing. The UCONABC usage control enhances the classical access control by reevaluating continuously the user attributes during consumption of a service or resource against the usage policies. The usage can be understood as an object’s (e.g., a file) read […]
A SECURITY AND PRIVACY AWARE LOCATION-BASED REWARDING PROTOCOL FOR THE LOCAWARD SYSTEM
In this abstract, we propose a secure, privacy-preserving, and realistic mobile location-based rewarding system, called LocaWard, which strives to address the above concerns. The proposed system consists of a trusted third party (TTP), mobile users (MUs), token distributors (TDs), token collectors (TCs), and a central controller (CC). The TTP issues each MU with a real […]
LOCAWARD: A SECURE, PRIVACY-PRESERVING, AND REALISTIC MOBILE LOCATION-BASED REWARDING SYSTEM
Location-based social networking, such as Facebook, here users share their locations with friends and find others who are nearby. Another type of MLBSs requires the users to provide current or historical location proof to fulfill some purposes. Emerging as a new type of mobile marketing, mobile location-based services (MLBSs) have attracted intense attention recently. Unfortunately, […]
RESILIENCE TO THE UCONABC CONTINUOUS AUTHORIZATION REEVALUATION FOR CLOUD COMPUTING
The proposed approach provides a resilient UCONABC reevaluation authorization model for cloud computing. The usage architecture for collecting contextual data allows for fine-grained services accounting and authorization attributes. The data are consolidated on a management domain and provided to consumer management systems, enabling the reconfiguration of usage policies and monitoring of SLA fulfillment. The management […]
DOS ATTACK DETECTION BASED ON MULTIVARIATE CORRELATION ANALYSIS
DoS attacks severely degrade the availability of a victim, which can be a host, a router, or an entire network. They impose intensive computati on tasks to the victim by exploiting its system vulnerability or flooding it with huge amount of useless packets. The victim can be forced out of service from a few minutes […]
MULTIVARIATE CORRELATION ANALYSIS BASED DOS ATTACK DETECTION
A denial of service (DoS) attack is a malicious attempt to make a server or a network resource unavailable to users, usually by temporarily interrupting or suspending the services of a host connected to the Internet. They impose intensive computation tasks to the victim by exploiting its system vulnerability or flooding it with huge amount […]
- « Previous Page
- 1
- 2
- 3
- 4
- 5
- …
- 8
- Next Page »