Matches in SemOpenAlex for { <https://semopenalex.org/work/W2019552488> ?p ?o ?g. }
Showing items 1 to 66 of
66
with 100 items per page.
- W2019552488 endingPage "1987" @default.
- W2019552488 startingPage "1985" @default.
- W2019552488 abstract "As cloud computing becomes prevalent, many organizations outsource the expensive computing and storage into the cloud servers. This brings many benefits including relief of the burden for storage management, universal data access with independent geographical locations, and avoidance of capital expenditure on hardware, software, and personnel maintenances. Despite the tremendous benefits, the outsource storage inevitably suffers from the security, privacy, trustworthiness, and the access of outsourced data. To address these issues, there has been increased interest to propose and design new algorithms and methodologies for cloud computing and cloud services. This special issue brings together high quality contributions in these research areas. The papers of the special issue have also identified and discussed the challenges in the field that will lead to new solutions and applications for cloud computing and cloud services. The special issue consists of 12 papers organized as follows. In the first paper 1, the authors propose the guidelines of a holistic security model in online collaborative learning through an effective trustworthiness. They consider a parallel processing approach, which can considerably decrease the time of data processing, thus allowing for building relevant trustworthiness models to support learning activities even in real time. The authors used a distributed infrastructure, such as Hadoop and cluster computing, to implement and evaluate the proposed approach for massive processing of log data. The experimental results showed the feasibility of coping with the problem of structuring and processing ill-formatted, heterogeneous, large log files to extract information on trustworthiness indicators and levels from learning groups and ultimately fill a global framework devoted to improve information security in e-learning in real time. In the second paper 2, the authors present a ciphertext-policy attribute-based proxy re-encryption scheme for data sharing in public clouds. They proposed a new single-hop unidirectional Ciphertext-Policy Attribute-Based Proxy Re-Encryptio (CP-ABPRE) scheme, which supports attribute-based re-encryption with any monotonic access structure, to tackle the open problem left by the existing CP-ABPRE schemes. The authors showed that the proposed scheme can be proved secure in the random oracle model under the decisional q-parallel bilinear Diffie–Hellman exponentiation assumption. In the third paper 3, the authors propose Ontology as a Service (OaaS), where the ontology tailoring process serves as a service in the cloud. To illustrate OaaS, in this paper, they propose sub-ontology extraction and extension, whereby multiple sub-ontologies are extracted from various source ontologies and then these extracted sub-ontologies are extended to form a complete ontology to be used by the user. The authors use a maximum extraction method to facilitate this. Unified Medical Language System (UMLS) metathesaurus ontology is used as a walk-through case study to illustrate the proposed methods. In the fourth paper 4, the authors present an auditing mechanism for the security of service in grid. They define and analyze some atomic services for grid application based on the service processes of the task. Then, some detecting methods are used for these automatic services. The authors evaluate the proposed auditing mechanism by experiments. The results show that it is feasible to ensure the security of service in grid. In the fifth paper 5, the authors show the performance of Optimized Link State Routing (OLSR) protocol for video streaming application in Vehicular Ad-hoc NETworks (VANETs) cloud computing. The simulations are conducted in urban environment in three scenarios, where roadside access points (APs) are present and not present, with and without buildings. They consider 802.11p standard and send multiple video streaming flows over User Datagram Protocol (UDP). They use different parameters for carrying out the simulation. The simulation results show that transmission for streaming is improved when roadside APs are used. In the sixth paper 6, the authors present distributed Semi-Random Low Density Parity Check (SR-LDPC) codes over multiple-access relay channel and its applications in cloud storage. They propose a novel encoding procedure to realize codes that resemble SR-LDPC codes in both structure and performance. For the case of two sources communicating with a single destination via a common relay, the two sources separately encode their own symbols of information using SR-LDPC codes. The relay then makes XOR for the two sequences received from the two sources. The destination can recover the information bits of the two sources using the sequences received directly from the two sources and the sequence received from the relay. It is shown that the sequences received by the destination are still SR-LDPC codes. Iterative decoding can be used by the destination using the sequences received from both the relay and the sources and obtain good performance. In the seventh paper 7, the authors examine the distinguishing characteristics of big data along the lines of the 3Vs (variety, volume, and velocity). Accordingly, they provide an insight into the main processing paradigms in relation to the 3Vs. It defines a lifecycle for big data processing and classifies various available tools and technologies in terms of the lifecycle phases of big data, which include data acquisition, data storage, data analysis, and data exploitation. They analyze the trends and technologies in relation to the characteristics, evolution, and processing of big data. In the eighth paper 8, the authors investigate the performance of time division broadcast (TDBC) protocol in bidirectional cloud networks in the presence of channel estimation errors (CEEs). The tight asymptotic expressions for individual and system outage probabilities are presented in closed form. It is shown that CEE causes outage probability to remain fixed even if the channel is noiseless. Then, the Symbol Error Rate (SER) performance for TDBC protocol with M-ary phase shift keying and M-ary quadrature amplitude modulation signals is analyzed. Simulation results validate the accuracy of the analytical results. Furthermore, comparison of signal-to-noise ratio gap ratio shows that TDBC protocol is less sensitive to the effect of CEE than analog network coding protocol. In the ninth paper 9, the authors deal with the development of a methodology that considers security concerns as an integral part of cloud-based systems design and implementation. They present a set of stereotypes that define a vocabulary for annotating UML-based models with information relevant for integrating the specification of security requirements into cloud architectures. This approach can be used to significantly improve productivity and overall success in the development of secure distributed cloud applications and systems. In the 10th paper 10, the authors design a secure and practical proxy re-encryption scheme, which is Chosen Ciphertext Attacks (CCA) secure under the computational Diffie–Hellman assumption in the random oracle model. They evaluate the efficiency of the proposed scheme both in theoretical comparisons with related schemes and in implementations at several security levels. The results indicate that the proposed scheme can be practical in cloud-based data sharing. In the 11th paper 11, the authors present a semantic client-side approach for web personalization of software as a service (SaaS)-based cloud services. The proposed model also provides a full prototype for the semantic client-side personalization approach and has been systematically assessed with a set of metrics. The benchmark results show good outcomes with impressive high performance and satisfied recommendation utility, which provides sufficient evidence that the proposed approach achieves significantly high benefits to encourage the further pursuit of personalization for SaaS services. Finally, in the 12th paper 12, the authors show the secure obfuscation for multiuse re-encryption and its application in cloud computing. The authors study the secure obfuscation for three kinds of new re-encryption functions: multiuse re-encryption, conditional re-encryption with keyword search, and broadcast re-encryption. They utilize the obfuscated results as tools to satisfy secure cloud computing. The authors show that the cloud computing schemes based on obfuscation have better security compared with other tools. The guest editors of this special issue wish to thank the authors for their interesting contributions to this special issue as well as for their timely collaboration in the preparation of the manuscripts. We would like to appreciate the reviewers for the careful reviewing of the papers, the useful suggestions, and feedback that helped the authors improve their manuscripts. We would like to sincerely thank Prof. Geoffrey Fox (editor-in-chief of the Concurrency and Computation: Practice and Experience) for the opportunity to edit this special issue and his guidance." @default.
- W2019552488 created "2016-06-24" @default.
- W2019552488 creator A5007964745 @default.
- W2019552488 creator A5021725931 @default.
- W2019552488 creator A5033144376 @default.
- W2019552488 date "2014-10-09" @default.
- W2019552488 modified "2023-10-16" @default.
- W2019552488 title "Advances on cloud services and cloud computing" @default.
- W2019552488 cites W1574326402 @default.
- W2019552488 cites W1854803429 @default.
- W2019552488 cites W1866785230 @default.
- W2019552488 cites W1918238974 @default.
- W2019552488 cites W1934999955 @default.
- W2019552488 cites W1942012263 @default.
- W2019552488 cites W1942874267 @default.
- W2019552488 cites W1960517978 @default.
- W2019552488 cites W2126405779 @default.
- W2019552488 cites W2129000204 @default.
- W2019552488 cites W2150386609 @default.
- W2019552488 cites W2154148713 @default.
- W2019552488 doi "https://doi.org/10.1002/cpe.3414" @default.
- W2019552488 hasPublicationYear "2014" @default.
- W2019552488 type Work @default.
- W2019552488 sameAs 2019552488 @default.
- W2019552488 citedByCount "11" @default.
- W2019552488 countsByYear W20195524882015 @default.
- W2019552488 countsByYear W20195524882016 @default.
- W2019552488 countsByYear W20195524882017 @default.
- W2019552488 countsByYear W20195524882018 @default.
- W2019552488 countsByYear W20195524882020 @default.
- W2019552488 crossrefType "journal-article" @default.
- W2019552488 hasAuthorship W2019552488A5007964745 @default.
- W2019552488 hasAuthorship W2019552488A5021725931 @default.
- W2019552488 hasAuthorship W2019552488A5033144376 @default.
- W2019552488 hasBestOaLocation W20195524881 @default.
- W2019552488 hasConcept C111919701 @default.
- W2019552488 hasConcept C2522767166 @default.
- W2019552488 hasConcept C38652104 @default.
- W2019552488 hasConcept C41008148 @default.
- W2019552488 hasConcept C79974875 @default.
- W2019552488 hasConceptScore W2019552488C111919701 @default.
- W2019552488 hasConceptScore W2019552488C2522767166 @default.
- W2019552488 hasConceptScore W2019552488C38652104 @default.
- W2019552488 hasConceptScore W2019552488C41008148 @default.
- W2019552488 hasConceptScore W2019552488C79974875 @default.
- W2019552488 hasIssue "8" @default.
- W2019552488 hasLocation W20195524881 @default.
- W2019552488 hasOpenAccess W2019552488 @default.
- W2019552488 hasPrimaryLocation W20195524881 @default.
- W2019552488 hasRelatedWork W1967490545 @default.
- W2019552488 hasRelatedWork W2115798421 @default.
- W2019552488 hasRelatedWork W2291819951 @default.
- W2019552488 hasRelatedWork W2383532021 @default.
- W2019552488 hasRelatedWork W2571381109 @default.
- W2019552488 hasRelatedWork W2805919076 @default.
- W2019552488 hasRelatedWork W4233956083 @default.
- W2019552488 hasRelatedWork W4313017920 @default.
- W2019552488 hasRelatedWork W4385451241 @default.
- W2019552488 hasRelatedWork W4385451301 @default.
- W2019552488 hasVolume "27" @default.
- W2019552488 isParatext "false" @default.
- W2019552488 isRetracted "false" @default.
- W2019552488 magId "2019552488" @default.
- W2019552488 workType "article" @default.