Cloud computing, a critical pattern for advanced data service, has became a necessary feasibility for data users to outsource data. Controversies on privacy, It is incessantly presented as outsourcing of sensitive information including emails, health history and personal photos is explosively expanding. Traditional SSE schemes enable users to securely retrieve the cipher text, but these […]
Archives for October 2013
TPA Public audit-ability for secure Cloud Computing
CLOUD computing has been envisioned as the next generation information technology (IT) architecture for enterprises, due to its long list of unprecedented advantages in the IT history: on-demand self-service, ubiquitous network access, location independent resource pooling, rapid resource elasticity, usage-based pricing and transference of risk storing data remotely to the cloud in a flexible on-demand […]
Predictive ACKs: Reducing Latency and Operational Cost in Cloud Computing
PACK (Predictive ACKs), traffic redundancy elimination (TRE) system, designed for cloud computing customers. In this paper, we present a novel receiver-based end-to-end TRE solution that relies on the power of predictions to eliminate redundant traffic between the cloud and its end-users. In this solution, each receiver observes the incoming stream and tries to match its […]
M/M/m queuing model for Profit maximization in cloud computing
This paper focuses the problem of optimal multi-server configuration for profit maximization in a cloud computing environment. This approach is to treat a multi-server system as an M/M/m queuing model, such that our optimization problem can be formulated and solved analytically. We consider two server speed and power consumption models, namely, the idle-speed model and […]
Skewness Minimization: Improving utilization of Cloud servers
In this paper, we present the design and implementation of an automated resource management system that achieves a good balance between the two goals i.e. Overload avoidance and Green computing. We develop a resource allocation system that can avoid overload in the system effectively while minimizing the number of servers used. . We introduce the […]
To protect the Patient’s privacy for mobile health monitoring system
In this paper, we design a cloud-assisted privacy preserving mobile health monitoring system, called CAM, which can effectively protect the privacy of clients and the intellectual proerty of m Health service providers. To protect the clients’privacy, we apply the anonymous Boneh-Franklin identity based encryption (IBE) in medical diagnostic branching programs. To reduce clients’ decryption complexity, […]
Performance evaluation of Cloud computing infrastructures using SRN (Stochastic Reward Nets)
In order to integrate business requirements and application level needs, in terms of Quality of Service (QoS), cloud service provisioning is regulated by Service Level Agreements. In this paper, we present a stochastic model, based on Stochastic Reward Nets (SRNs), that exhibits features allowing capturing the key concepts of an IaaS cloud system. The proposed […]
Secure data sharing for dynamic groups in the cloud
This paper proposes a secure multi-owner data sharing scheme. It implies that any user in the group can securely share data with others by the untrusted cloud. The proposed scheme is able to support dynamic groups efficiently. Specifically, new granted users can directly decrypt data files uploaded before their participation without contacting with data owners. […]
CloudRank: Cloud Service QoS Ranking Prediction
Nonfunctional performance of cloud services is usually described by quality-of-service (QoS). QoS is an important research topic in cloud computingThis paper proposes a personalized ranking prediction framework, named CloudRank, to predict the QoS ranking of a set of cloud services without requiring additional real-world service invocations from the intended users. Our approach takes advantage of […]
Anonymous Location-based efficient routing protocol
In order to provide high anonymity protection (for sources, destination, and route) with low cost, this paper proposes an Anonymous Location-based and Efficient Routing proTocol (ALERT). ALERT dynamically partitions a network field into zones and randomly chooses nodes in zones as intermediate relay nodes, which form a non traceable anonymous route. Specifically, in each routing […]