Current Issue : July - September Volume : 2020 Issue Number : 3 Articles : 5 Articles
With the development of Internet of Things (IoT) technologies, Internet-enabled devices have been widely used in our daily\nlives. As a new service paradigm, cloud computing aims at solving the resource-constrained problem of Internet-enabled\ndevices. It is playing an increasingly important role in resource sharing. Due to the complexity and openness of wireless\nnetworks, the authentication protocol is crucial for secure communication and user privacy protection. In this paper, we\ndiscuss the limitations of a recently introduced IoT-based authentication scheme for cloud computing. Furthermore, we\npresent an enhanced three-factor authentication scheme using chaotic maps. The session key is established based on Chebyshev\nchaotic-based Diffieâ??Hellman key exchange. In addition, the session key involves a long-term secret. It ensures that our scheme\nis secure against all the possible session key exposure attacks. Besides, our scheme can effectively update user password locally.\nBurrowsâ??Abadiâ??Needham logic proof confirms that our scheme provides mutual authentication and session key agreement.\nThe formal analysis under random oracle model proves the semantic security of our scheme. The informal analysis shows that\nour scheme is immune to diverse attacks and has desired features such as three-factor secrecy. Finally, the performance\ncomparisons demonstrate that our scheme provides optimal security features with an acceptable computation and\ncommunication overheads....
Wireless body area network (WBAN) is an emerging technology that has enormous potentials for continuous health monitoring\nof various diseases. For different medical and healthcare applications, the collected physiological data from multiple WBANs are\nfurther transmitted to the remote medical cloud servers. However, several technical issues and challenges are associated with the\nintegration of WBANs and cloud computing services. In this study, we develop a new cloud-assisted WBAN control scheme to\neffectively use the limited system resource. By employing the main ideas of Generalized Gini and Choquet bargaining solutions,\nour approach unfolds into dual stages of bargaining processes while increasing the flexibility and adaptability. In particular, we\nconsider the unique features of cloud-assisted WBAN applications and provide a generalized fair-efficient solution for the\nresource allocation problem. Numerical simulation results demonstrate that we can verify the superiority of our proposed scheme\nover the existing protocols. Lastly, major further challenges and future research directions about the cloud-assisted WBAN\nparadigm are summarized and discussed....
Data clustering is the unsupervised classification of data records into groups. As one of the steps in data analysis, it has been widely\nresearched and applied in practical life, such as pattern recognition, image processing, information retrieval, geography, and\nmarketing. In addition, the rapid increase of data volume in recent years poses a huge challenge for resource-constrained data\nowners to perform computation on their data. This leads to a trend that users authorize the cloud to perform computation on\nstored data, such as keyword search, equality test, and outsourced data clustering. In outsourced data clustering, the cloud\nclassifies usersâ?? data into groups according to their similarities. Considering the sensitive information in outsourced data and\nmultiple data owners in practical application, it is necessary to develop a privacy-preserving outsourced clustering scheme under\nmultiple keys.....................
In recent years, cloud computing technology has attracted extensive attention from both academia and industry. The popularity of\ncloud computing was originated from its ability to deliver global IT services such as core infrastructure, platforms, and applications\nto cloud customers over the web. Furthermore, it promises on-demand services with new forms of the pricing package.\nHowever, cloud job scheduling is still NP-complete and became more complicated due to some factors such as resource\ndynamicity and on-demand consumer application requirements. ..............................
Cloud computing can enable organizations to do more by breaking the physical bonds between an IT foundation. The raised\nsecurity dangers in cloud computing must be overpowered to profit the new processing perspective that offers an imaginative\narrangement of activity for relationship to IT................
Loading....