Search

  • Select Article Type
  • Abstract Supplements
  • Blood Group Review
  • Call to Arms
  • Hypothesis
  • In Memoriam
  • Interview
  • Introduction
  • Short Report
  • abstract
  • Abstracts
  • Article
  • book-review
  • case-report
  • case-study
  • Clinical Practice
  • Commentary
  • Conference Presentation
  • conference-report
  • congress-report
  • Correction
  • Editorial
  • Editorial Comment
  • Erratum
  • Events
  • Letter
  • Letter to Editor
  • mini-review
  • minireview
  • News
  • Obituary
  • original-paper
  • Original Research
  • Pictorial Review
  • Position Paper
  • Practice Report
  • Preface
  • Preliminary report
  • Product Review
  • rapid-communication
  • Report
  • research-article
  • Research Communicate
  • research-paper
  • Research Report
  • Review
  • review -article
  • review-article
  • Review Paper
  • Sampling Methods
  • Scientific Commentary
  • short-communication
  • Student Essay
  • Varia
  • Welome
  • Select Journal
  • In Jour Smart Sensing And Intelligent Systems
  • International Journal Advanced Network Monitoring Controls

 

Research Article

The Design and Evaluation of a Strategy of Data Placement in Cloud Computing Platform

Cloud computing has become a new platform for personal computing. However, while designing the strategy of data placement, there still lacks the consideration of systematic diversity of distributed transaction costs. This paper proposes the use of genetic algorithms to address the data placement problem in cloud computing. This strategy has adequately considered the correlation between data slices to minimize the total cost of distributed transactions. Compared to other methods, genetic

Wei Guo, Kaibo Luo, Xinjun Wang, Lizhen Cui

International Journal on Smart Sensing and Intelligent Systems , ISSUE 1, 13–30

Article

Research on Trust-Role Access Control Model in Cloud Computing

I. INTRODUCTION Cloud computing[1] is a commercial implementation of distributed processing, parallel processing, and grid computing development; its main features are large scale, virtualizable, high reliability, high scalability, and on-demand services. In a cloud environment, various resources are dynamically connected to the Internet, users can not only apply for services, but all participants in the cloud environment can dynamically join or quit[2]. However, with the popularization of

Yuchen Wu, Pingping Liu

International Journal of Advanced Network, Monitoring and Controls , ISSUE 2, 75–80

Article

Multi Objective Optimization of Virtual Machine Migration Placement Based on Cloud Computing

How to improve the resource utilization of the cloud computing system has been one of the key content of the research of the cloud computing. The traditional multi-objective ant colony optimization was improved, studied the virtual machine live migration framework, combined with the elimination method to solve virtual machine migration and placement of multi-objective optimization problem, the load balanced specific strategies are integrated into the framework of a dynamic migration, simulation

Sun Hong, Tang Qing, Xu Liping, Chen Shiping

International Journal of Advanced Network, Monitoring and Controls , ISSUE 2, 120–129

Article

ADVANCED SECURE USER AUTHENTICATION FRAMEWORK FOR CLOUD COMPUTING

Cloud Computing, as an emerging, virtual, large-scale distributed computing model, has gained increasing attention these years. Meanwhile it also faces many security challenges, one of which is authentication. Lots of researches have been done in this area. Recently, Choudhury et al proposed a user authentication framework to ensure user legitimacy before entering into the cloud. They claimed their scheme could provide identity management, mutual authentication, session key agreement between

Rui Jiang

International Journal on Smart Sensing and Intelligent Systems , ISSUE 4, 1700–1724

Article

SECURE DATA STORAGE MECHANISM FOR INTEGRATION OF WIRELESS SENSOR NETWORKS AND MOBILE CLOUD

Together with an explosive growth of the mobile applications and emerging of cloud computing concept, mobile cloud computing (MCC) has been introduced to be a potential technology for mobile services. Wireless Sensor Networks (WSN) is the technology that connects the virtual world and the physical world where nodes can autonomously communicate among each other and with intelligent systems. This paper describes the concept of wireless sensor networks and mobile cloud computing. Recently, much

Chengwei Hu

International Journal on Smart Sensing and Intelligent Systems , ISSUE 3, 1563–1591

Article

Research and Implementation of Load Balancing Technology for Cloud Computing

Sun Hong, Wang Weifeng, Chen Shiping, Xu Liping

International Journal of Advanced Network, Monitoring and Controls , ISSUE 2, 17–28

Article

Association Rule Mining Based on Estimation of Distribution Algorithm for Blood Indices

update the population, the algorithm increases the convergence speed and enhances the searching ability, compared to GA. In the experiment of mining association, rules in blood indices data, PBIL algorithm performs better not only in running time, convergence speed, but also achieve better searching results. Meanwhile, this paper proposed a parallel algorithm for association rule mining based on PBIL and designed a system architecture based on cloud computing for blood indices analysis, providing a

Xinyu Zhang, Botu Xue, Guanghu Sui, Jianjiang Cui

International Journal of Advanced Network, Monitoring and Controls , ISSUE 3, 20–26

Article

Optimal Pricing Strategies for Resource Allocation in IaaS Cloud

In cloud computing environment, pricing is an effective method for resource allocation and it provides efficient incentive for cloud providers to provide cloud services. In this paper, we investigate two pricing schemes for the allocation of cloud resources in a monopoly cloud market subject to constrained capacity of the cloud provider. There are two main pricing schemes, on-demand and reserved pricing mechanisms adopted by leading cloud providers, i.e., Amazon and Gogrid. We analyze how cloud

Zhengce Cai, Xianwei Li

International Journal of Advanced Network, Monitoring and Controls , ISSUE 2, 60–67

Article

HSCLOUD: CLOUD ARCHITECTURE FOR SUPPORTING HOMELAND SECURITY

Governmental institutions all over the world are trying to increase the level of security of their countries emphasizing the usage Information Technology solutions. We believe that Cloud Computing may strongly help Homeland Security, since it offers a very flexible support for organizing and managing heterogeneous systems, providing huge amount of processing, storing and sensing resources. In this work we introduce a new Cloud architecture able to virtualize different types of sensing

M. Fazio, M. Paone, A. Puliafito, M. Villari

International Journal on Smart Sensing and Intelligent Systems , ISSUE 1, 246–276

Article

Fine-grained Access Control Scheme Based on Cloud Storage

Cloud storage originates from cloud computing, and brings new model of data sharing and storage, which provided great convenience for users. However, cloud environment confronts with many problems, and one of the most important problems is the security problem. This paper researched on security problem based on encryption, and proposed a secure and efficient scheme according to system characteristics of data storage on cloud platform, and applied it in cloud storage system with fine-grained

Xiaojie Niu

International Journal of Advanced Network, Monitoring and Controls , ISSUE 4, 207–210

Research Article

A MULTI-KEYWORD RANKED SEARCH SCHEME OVER ENCRYPTED BASED ON HIERARCHICAL CLUSTERING INDEX

A Secure and Dynamic Multi-keyword Ranked Search Scheme over Encrypted Cloud Data Due to the increasing popularity of cloud computing, more and more data owners are motivated to outsource their data to cloud servers for great convenience and reduced cost in data management. In this project, present a secure multi-keyword ranked search scheme over encrypted cloud data, which simultaneously supports dynamic update operations like deletion and insertion of documents. Specifically, the vector space

A. Indhuja, T.P.Udaya shankar, R.M Balajee Mastan Vali Shaik, P Sujatha

International Journal on Smart Sensing and Intelligent Systems , ISSUE 5, 539–559

Article

Optimal Pricing for Service Provision in an IaaS Cloud Market with Delay Sensitive Cloud Users

Cloud computing has received a significant amount of attentions from both engineering and academic fields. Designing optimal pricing schemes of cloud services plays an important role for the success of cloud computing. How to set optimal prices of cloud resources in order to maximize these CSPs’ revenues in an Infrastructure as a Service (IaaS) cloud market while at the same time meeting the cloud users’ demand satisfaction is a challenging problem that CSPs should consider. However

Gang Fang, Xianwei Li

International Journal of Advanced Network, Monitoring and Controls , ISSUE 2, 1–8

Article

A Study of Edge Computing Offloading Based on Security

have limited computing power, poor real-time and energy consumption limitations, it is difficult to bear the needs of computation-intensive, latency-sensitive and high energy consumption applications, In order to meet these challenges, the first solution proposed is to apply compute offload technology in mobile cloud computing (Mobile Cloud Computing (MCC)) architecture. By offloading the compute tasks of the terminal to a cloud data center with sufficient compute and storage resources, the delay

Luo Pei, Lei Juchao

International Journal of Advanced Network, Monitoring and Controls , ISSUE 2, 58–63

Research Article

CLOUD SECURITY AND COMPLIANCE - A SEMANTIC APPROACH IN END TO END SECURITY

R. Kalaiprasath, R. Elankavi, R. Udayakumar

International Journal on Smart Sensing and Intelligent Systems , ISSUE 5, 482–494

Article

Optimal Pricing for Service Provision in IaaS Cloud Markets

Pricing plays an important role for service provision in cloud computing. In this paper, we investigate price based resource access control in two Monopoly IaaS cloud market, respectively. The two IaaS cloud market is formed by one public cloud service providers (CSPs) and cloud broker (CB), provisioning cloud services to delay-sensitive cloud users (CUs). In the first monopoly cloud market, we treat the public CSP as an M/M/1 queueing system and study this CSP’s pricing effect on the

Gang Fang, Zhengce Cai, Xianwei Li

International Journal of Advanced Network, Monitoring and Controls , ISSUE 3, 153–157

Research Article

WSN and M2M for cycling performance assessment

José Barreiro, Octavian Postolache, Pedro Passos

International Journal on Smart Sensing and Intelligent Systems , ISSUE 5, 1–6

Research Article

A NEW APPROACH FOR CLOUD DATA SECURITY: FROM SINGLE TO CLOUD-OF-CLOUDS

R. Kalaiprasath, R. Elankavi, Dr. R. Udayakumar

International Journal on Smart Sensing and Intelligent Systems , ISSUE 5, 604–613

No Record Found..
Page Actions