Current Issue : July - September Volume : 2019 Issue Number : 3 Articles : 5 Articles
Nowadays, due to the rapid development and wide deployment of handheld mobile devices, the mobile users begin to save\ntheir resources, access services, and run applications that are stored, deployed, and implemented in cloud computing which\nhas huge storage space and massive computing capability with their mobile devices. However, the wireless channel is insecure\nand vulnerable to various attacks that pose a great threat to the transmission of sensitive data. Thus, the security mechanism of\nhow the mobile devices and remote cloud server authenticate each other to create a secure session in mobile cloud computing\nenvironment has aroused the interest of researchers. In this paper, we propose an efficient and provably secure anonymous twofactor\nuser authentication protocol for the mobile cloud computing environment.The proposed scheme not only provides mutual\nauthentication between mobile devices and cloud computing but also fulfills the known security evaluation criteria. Moreover,\nutilization of ECC in our scheme reduces the computing cost for mobile devices that are computation capability limited and battery\nenergy limited. In addition, the formal security proof is given to show that the proposed scheme is secure under random oracle\nmodel. Security analysis and performance comparisons indicate that the proposed scheme has reasonable computation cost and\ncommunication overhead at the mobile client side as well as the server side and is more efficient and more secure than the related\ncompetitive works....
The increasing use of cloud computing, especially in commercial, government and\nhealthcare institutions, started with the use of computerized clouds. Clouds store important data,\nwhich reduces the cost of management and ensures easy access. To protect this data, cryptographic\nmethods are used to ensure confidentiality of the data, as well as to secure access to user data and\nincrease trust in cloud technology. In our paper, we suggest a new scheme to support an attributebased\nencryption system (ABE) that involves multiple parties such as data owners, data users, cloud\nservers and authority. A verified and authenticated decryption process for the cloud environment\nis the imperative feature of our proposed architecture. The data owner encrypts their data and sends\nit to the cloud. The cloud server performs partial decryption and the final decrypted data are shared\nfor users as per their privileges. Thus, the data owner reduces complexity of productivity by\ndelegating the decryption process to the cloud server. Analysis of the experimental results confirms\nthat data access in the electronic cloud atmosphere is safer due to a controlled multiple-users-rights\nscheme. Our performance evaluation results show that the proposed model condensed the\ncommunication overhead and made Digital Imaging and Communications in Medicine (DICOM)\nmore secure....
As IoT systems spread, transmissions of all data from various sensing devices to a remote OM (Operation and Management) server\nthrough the Internet can lead to many problems, such as an explosion of network traffic and delayed responses to data. Fog\ncomputing is a good means of resolving these problems in an IoT system environment. In this paper, a management method for\nsensor data in a fog computing node is proposed. The monitoring node monitors data from sensor devices using a data pattern\nfrom the OM server, which dynamically generates and updates the pattern. The monitoring node reports only the data beyond\nthe normal range of the pattern to the OM server rather than sending all data to the OM server. The monitoring node can\ncontrol the operations of sensor devices remotely according to the requests of the OM server....
The fourth industrial revolution heralds a paradigm shift in how people, processes,\nthings, data and networks communicate and connect with each other. Conventional computing\ninfrastructures are struggling to satisfy dramatic growth in demand from a deluge of connected\nheterogeneous end points located at the edge of networks while, at the same time, meeting quality\nof service levels. The complexity of computing at the edge makes it increasingly difficult for\ninfrastructure providers to plan for and provision resources to meet this demand. While simulation\nframeworks are used extensively in the modelling of cloud computing environments in order to test\nand validate technical solutions, they are at a nascent stage of development and adoption for fog and\nedge computing. This paper provides an overview of challenges posed by fog and edge computing\nin relation to simulation....
With self-provisioning of resources as premise, dew computing aims at providing computing\nservices by minimizing the dependency over existing internetwork back-haul. Mobile devices have a\nhuge potential to contribute to this emerging paradigm, not only due to their proximity to the end user,\never growing computing/storage features and pervasiveness, but also due to their capability to render\nservices for several hours, even days,without being plugged to the electricity grid. Nonetheless,misusing\nthe energy of their batteries can discourage owners to offer devices as resource providers in dew\ncomputing environments. Arguably, having accurate estimations of remaining battery would help to\ntake better advantage of a deviceâ??s computing capabilities. In this paper, we propose a model to estimate\nmobile devices battery availability by inspecting traces of real mobile device ownerâ??s activity and\nrelevant device state variables.Themodel includes a feature extraction approach to obtain representative\nfeatures/variables, and a prediction approach, based on regression models and machine learning\nclassifiers. On average, the accuracy of our approach, measured with the mean squared error metric,\noverpasses the one obtained by a relatedwork. Prediction experiments at five hours ahead are performed\nover activity logs of 23 mobile users across several months....
Loading....