Int. J. Cloud Appl. Comput.最新文献

筛选
英文 中文
The Trusted Hierarchical Access Structure-Based Encryption Scheme for Cloud Computing 基于可信层次访问结构的云计算加密方案
Int. J. Cloud Appl. Comput. Pub Date : 2022-01-01 DOI: 10.4018/ijcac.308273
T. Mujawar, L. B. Bhajantri
{"title":"The Trusted Hierarchical Access Structure-Based Encryption Scheme for Cloud Computing","authors":"T. Mujawar, L. B. Bhajantri","doi":"10.4018/ijcac.308273","DOIUrl":"https://doi.org/10.4018/ijcac.308273","url":null,"abstract":"Cloud computing delivers various resources and services to users over internet. At present many businesses and individual users are adopting cloud services to avail benefits such as, less time, less cost, less management, and maintenance. Still, security is the primary issue that must be tackled and one of the security issues is access control mechanism. The most widely used access control method includes Ciphertext Policy Attribute based Encryption, which is encrypted access control scheme. In order to ensure trustworthy and encrypted access control, a trusted hierarchical access structure based encryption scheme is proposed in this paper. The proposed scheme uses hierarchical access structure to encrypt multiple messages and avoid generation of multiple ciphertexts. The trust evaluation component is also integrated with the proposed access control mechanism. An efficient method to assign trust level for service providers and data users by utilizing their behavioral parameters is proposed in the paper.","PeriodicalId":442336,"journal":{"name":"Int. J. Cloud Appl. Comput.","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125266893","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Load and Cost-Aware Min-Min Workflow Scheduling Algorithm for Heterogeneous Resources in Fog, Cloud, and Edge Scenarios 雾、云和边缘场景下异构资源的负载和成本感知最小最小工作流调度算法
Int. J. Cloud Appl. Comput. Pub Date : 2022-01-01 DOI: 10.4018/ijcac.2022010105
Jyoti Bisht, V. Subrahmanyam
{"title":"Load and Cost-Aware Min-Min Workflow Scheduling Algorithm for Heterogeneous Resources in Fog, Cloud, and Edge Scenarios","authors":"Jyoti Bisht, V. Subrahmanyam","doi":"10.4018/ijcac.2022010105","DOIUrl":"https://doi.org/10.4018/ijcac.2022010105","url":null,"abstract":"Fog computing and Edge computing are few of the latest technologies which are offered as solution to challenges faced in Cloud Computing. Instead of offloading of all the tasks to centralized cloud servers, some of the tasks can be scheduled at intermediate Fog servers or Edge devices. Though this solves most of the problems faced in cloud but also encounter other traditional problems due to resource-related constraints like load balancing, scheduling, etc. In order to address task scheduling and load balancing in Cloud-fog-edge collaboration among servers, we have proposed an improved version of min-min algorithm for workflow scheduling which considers cost, makespan, energy and load balancing in heterogeneous environment. This algorithm is implemented and tested in different offloading scenarios- Cloud only, Fog only, Cloud-fog and Cloud-Fog-Edge collaboration. This approach performed better and the result gives minimum makespan, less energy consumption along with load balancing and marginally less cost when compared to min-min and ELBMM algorithms","PeriodicalId":442336,"journal":{"name":"Int. J. Cloud Appl. Comput.","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130520334","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Analysis of Security-Based Access Control Models for Cloud Computing 基于安全的云计算访问控制模型分析
Int. J. Cloud Appl. Comput. Pub Date : 2022-01-01 DOI: 10.4018/ijcac.2022010104
Sandeep Choudhary, Nanhay Singh
{"title":"Analysis of Security-Based Access Control Models for Cloud Computing","authors":"Sandeep Choudhary, Nanhay Singh","doi":"10.4018/ijcac.2022010104","DOIUrl":"https://doi.org/10.4018/ijcac.2022010104","url":null,"abstract":"Access control has become the most necessary requirement to limit unauthorized and privileged access to information systems in cloud computing. Access control models counter the additional security challenges like rules, domain names, job allocation, multi hosting and separation of tasks. This paper classifies the conventional and modern access control models which has been utilized to restrain these access flaws by employing a variety of practices and methodologies. It examine the frequent security threats to information confidentiality, integrity, data accessibility and their approach used for cloud solutions. This paper proposed a priority based task scheduling access control (PbTAC) model to secure and scheduled access of resources & services rendered to cloud user. PbTAC model will ensure the job allocation, tasks scheduling and security of information through its rule policies during transmission between parties. It also help in reducing system overhead by minimize the computation and less storage cost.","PeriodicalId":442336,"journal":{"name":"Int. J. Cloud Appl. Comput.","volume":"3 4","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"113957164","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Capability-Based Access Control With Trust for Effective Healthcare Systems 有效医疗保健系统的基于功能的信任访问控制
Int. J. Cloud Appl. Comput. Pub Date : 2022-01-01 DOI: 10.4018/ijcac.297107
S. Kaushik, C. Gandhi
{"title":"Capability-Based Access Control With Trust for Effective Healthcare Systems","authors":"S. Kaushik, C. Gandhi","doi":"10.4018/ijcac.297107","DOIUrl":"https://doi.org/10.4018/ijcac.297107","url":null,"abstract":"Because of the expanding fame of distributed storage, numerous medicinal services associations have begun moving electronic wellbeing records or EHR to cloud-based capacity frameworks. This change can diminish the expenses related with the administration of information sharing, correspondence overhead, and improve the Quality of Service. In this paper, we have projected an entrance regulator prototype which depends on the dependability of the mentioned client. This Access Control based Trust Model for Healthcare System structure made out of the trust component, trust model with access control approaches which upgrades exactness and effectiveness of the framework. This entrance control system will guarantee the main trusted and approved client can get to the information and assets. The detail structure and introduction of the working prototype show that the exactness and effectiveness of the social insurance framework identified with cloud are more when contrasted with other trust models.","PeriodicalId":442336,"journal":{"name":"Int. J. Cloud Appl. Comput.","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132469658","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Enhancing the Security and Performance of Cloud for E-Governance Infrastructure: Secure E-MODI 提高电子政务基础设施的云安全性和性能:Secure E-MODI
Int. J. Cloud Appl. Comput. Pub Date : 2022-01-01 DOI: 10.4018/ijcac.2022010108
H. Lamkuche, Vijaya Bhaskar Kondaveety, Vijaya Lakshmi Sapparam, Shruti Singh, Rajiv Rajpurkar
{"title":"Enhancing the Security and Performance of Cloud for E-Governance Infrastructure: Secure E-MODI","authors":"H. Lamkuche, Vijaya Bhaskar Kondaveety, Vijaya Lakshmi Sapparam, Shruti Singh, Rajiv Rajpurkar","doi":"10.4018/ijcac.2022010108","DOIUrl":"https://doi.org/10.4018/ijcac.2022010108","url":null,"abstract":"E-Governance is getting momentous in India. Over the years, e-Governance has played a major part in every sphere of the economy. In this paper, we have proposed E-MODI (E-governance model for open distributed infrastructure) a centralized e-Governance system for government of India, the implementation of this system is technically based on open distributed infrastructure which comprises of various government bodies in one single centralized unit. Our proposed model identifies three different patterns of cloud computing which are DGC, SGC and CGC. In addition, readiness assessment of the services needs to migrate into cloud. In this paper, we propose energy efficient VM allocation algorithm to achieve higher energy efficiency in large scale cloud data centers when system on optimum mode. Our objectives have been explained in details and experiments were designed to demonstrate the robustness of the multi-layered security which is an integration of High secure lightweight block cipher CSL along with Ultra powerful BLAKE3 hashing function in order to maintain information security triad.","PeriodicalId":442336,"journal":{"name":"Int. J. Cloud Appl. Comput.","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117102379","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
An Indicator-Based Algorithm for Task Scheduling in Multi-Cloud Environments 多云环境下基于指标的任务调度算法
Int. J. Cloud Appl. Comput. Pub Date : 2022-01-01 DOI: 10.4018/ijcac.308274
S. K. Pande, Priyanka Swain, S. K. Nayak, S. K. Panda
{"title":"An Indicator-Based Algorithm for Task Scheduling in Multi-Cloud Environments","authors":"S. K. Pande, Priyanka Swain, S. K. Nayak, S. K. Panda","doi":"10.4018/ijcac.308274","DOIUrl":"https://doi.org/10.4018/ijcac.308274","url":null,"abstract":"Cloud computing is the ability to scale various resources and services that can be dynamically configured by the cloud service provider (CSP) and delivered on demand by the customers. The objective of most of the task scheduling algorithms is to ensure that the overall processing time of all the tasks (i.e., makespan) is minimized. Here, minimization of makespan in no way guarantees the minimization of execution cost. In indicator-based (IBTS) task scheduling algorithm for the multi-cloud environment, we can outline the significant contributions as the following: (1) IBTS achieves multi-objective solutions while considering parameters, makespan, and execution cost. (2) IBTS proposes a normalization framework with time and cost length indicators for efficient task scheduling. (3) The efficacy of the IBTS algorithm is demonstrated using both the benchmark and synthetic datasets. (4) The simulation outcomes of the IBTS algorithm in comparison with three existing task scheduling algorithms, namely ETBTS, MOTS, and PBTS, clearly exhibit superiority, which proves acceptance of IBTS algorithm.","PeriodicalId":442336,"journal":{"name":"Int. J. Cloud Appl. Comput.","volume":"190 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116408578","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Dynamic Weighted Averaging Technique for Trust Assessment in Cloud Computing 云计算信任评估的动态加权平均技术
Int. J. Cloud Appl. Comput. Pub Date : 2022-01-01 DOI: 10.4018/ijcac.297099
Saima Mehraj, M. T. Banday
{"title":"A Dynamic Weighted Averaging Technique for Trust Assessment in Cloud Computing","authors":"Saima Mehraj, M. T. Banday","doi":"10.4018/ijcac.297099","DOIUrl":"https://doi.org/10.4018/ijcac.297099","url":null,"abstract":"In the Cloud computing, trust management has become a key requirement for its security as it has an important role where service-interactions take place in an anonymous environment. Trust assessment is an essential part of trust management technology for making any authorization decisions in the Cloud-based trust authorization system. The critical concern in trust assessment is the optimal assignment of weights to different factors that are involved in the trust assessment of the Cloud computing. The paper proposes a weighted averaging method for the Cloud computing paradigm wherein multiple factors are assigned weights dynamically by WMA-OWA functions. The proposed work overcomes the influence of the inflexibility of subjective weight assignment methods wherein weights are assigned manually or subjectively by experts based on their preferences such as random allocation, expert opinion, and, average weight. The experimental result shows that the proposed method can achieve greater flexibility, adaptability, and dynamic adjustment capability in the Cloud computing.","PeriodicalId":442336,"journal":{"name":"Int. J. Cloud Appl. Comput.","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125941078","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Evaluating the Impact of Cryptographic Algorithms on Network Performance 评估加密算法对网络性能的影响
Int. J. Cloud Appl. Comput. Pub Date : 2022-01-01 DOI: 10.4018/ijcac.309937
Samuel Asare, Winfred Yaokumah, Ernest B. B. Gyebi, J. Abdulai
{"title":"Evaluating the Impact of Cryptographic Algorithms on Network Performance","authors":"Samuel Asare, Winfred Yaokumah, Ernest B. B. Gyebi, J. Abdulai","doi":"10.4018/ijcac.309937","DOIUrl":"https://doi.org/10.4018/ijcac.309937","url":null,"abstract":"Cryptographic algorithms enable secure data communication over public insecure networks. Though they enhance network security, complex cryptographic operations consume substantial amounts of computing resources, introducing significant network overhead costs. This study aims to find the cryptographic algorithm that can efficiently utilize network resources. The study evaluates three cryptographic algorithms with different file formats on varying numbers of node densities. The NS-3 simulator was used to measure latency, data throughput, end-to-end delay, packet delivery ratio, and packet loss of files in text, image, and audio formats. The results find AES as better than DES and 3DES for a large number of node densities for the three file formats in terms of latency, data throughput, end-to-end delay, and packet delivery ratio. However, DES has the lowest packet loss as AES records the highest packet loss. The findings provide researchers avenues for further research and the practitioners the choice of suitable algorithms based on the overhead performance.","PeriodicalId":442336,"journal":{"name":"Int. J. Cloud Appl. Comput.","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130745307","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Tifinagh Handwriting Character Recognition Using a CNN Provided as a Web Service 使用CNN作为Web服务提供的Tifinagh手写字符识别
Int. J. Cloud Appl. Comput. Pub Date : 2022-01-01 DOI: 10.4018/ijcac.297093
Kadri Ouahab, A. Benyahia, Adel Abdelhadi
{"title":"Tifinagh Handwriting Character Recognition Using a CNN Provided as a Web Service","authors":"Kadri Ouahab, A. Benyahia, Adel Abdelhadi","doi":"10.4018/ijcac.297093","DOIUrl":"https://doi.org/10.4018/ijcac.297093","url":null,"abstract":"Many cloud providers offer very high precision services to exploit Optical Character Recognition (OCR). However, there is no provider offers Tifinagh Optical Character Recognition (OCR) as Web Services. Several works have been proposed to build powerful Tifinagh OCR. Unfortunately, there is no one developed as a Web Service. In this paper, we present a new architecture of Tifinagh Handwriting Recognition as a web service based on a deep learning model via Google Colab. For the implementation of our proposal, we used the new version of the TensorFlow library and a very large database of Tifinagh characters composed of 60,000 images from the Mohammed Vth University in Rabat. Experimental results show that the TensorFlow library based on a Tensor processing unit constitutes a very promising framework for developing fast and very precise Tifinagh OCR web services. The results show that our method based on convolutional neural network outperforms existing methods based on support vector machines and extreme learning machine.","PeriodicalId":442336,"journal":{"name":"Int. J. Cloud Appl. Comput.","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125371159","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Marketing Analytics for Analyzing Social Media and Branding Efforts of Indian Telecom Operators 分析印度电信运营商的社交媒体和品牌努力的营销分析
Int. J. Cloud Appl. Comput. Pub Date : 2022-01-01 DOI: 10.4018/ijcac.297092
Sujata Joshi, Sindhu Koparrati, Vaishali Singhal
{"title":"Marketing Analytics for Analyzing Social Media and Branding Efforts of Indian Telecom Operators","authors":"Sujata Joshi, Sindhu Koparrati, Vaishali Singhal","doi":"10.4018/ijcac.297092","DOIUrl":"https://doi.org/10.4018/ijcac.297092","url":null,"abstract":"Business Analytics has become the new mantra in today’s digital transformation age. Digitization has changed the way marketing functions. Use of Marketing analytics and Social media platforms are some of the biggest digital transformations, seen in new marketing approaches. However, not much research has been done to witness the influence of the social media in the Indian telecom sector. So the objective of this paper is to study two digitization aspects in marketing which is the application marketing analytics for social media platform with respect to the Indian telecom operators Thus, the research intends to Study the impact of Social Media Efforts (SMME) on Branding and Customer Response (CR) with respect to Indian telecom brands. Primary data was collected from 184 respondents and statistical analysis has been performed to see the effect of SMME on branding and consumer response for telecom brands. Findings of the study confirm that Social Media Marketing Efforts (SMME) have significance impact on both Branding and Consumer Response (CR).","PeriodicalId":442336,"journal":{"name":"Int. J. Cloud Appl. Comput.","volume":"71 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126276712","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信