The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Data centers are becoming a significant energy consumer. Server workload, cooling, and supporting infrastructure represents large loads for the grid. This paper intends to present a comprehensive literature review that account for generation, loads, storage, and topology of data centers. It is shown that green data centers are emerging which incorporate renewable energy sources to cap their carbon...
More attention has been paid to congestion control in the emerging area of wireless sensor networks (WSNs). However, most of the existing congestion control schemes are based on the best-effort data transmission service model. When networks congestion occurs, different categories of traffic are discarded indiscriminately, therefore, users' Quality of Service (QoS) is not able to be guaranteed. In...
Memory failures are common in clusters, and their destructive effects (e.g., increasing downtime and losing data) make users suffer great loss. Current memory availability strategies mostly require extra expensive hardware. Software approaches based on check pointing technologies intend to reduce the expense, but their high overhead limits the practical usage. In this paper, we present a novel system...
We propose an attribute-based cryptosystem in which decryption is conditional on the distance between attributes. Alice constructs a cipher text that consists of an encrypted message and a hidden attribute vector. Bob is able to decrypt Alice's message if and only if his attribute vector is within a specified maximum distance from Alice's attribute vector. We provide constructions for Euclidean and...
In Database-as-a-Service (DBaaS), a large number of tenants share DBaaS resources (CPU, I/O and Memory). While the DBaaS provider runs DBaaS to "share" resources across the entire tenant population to maximize resource utilization and minimize cost, the tenants subscribe to DBaaS at a low price point while still having resources conceptually "isolated" according to service level...
The Web Coverage Service(WCS) is an important part of geospatial data interoperability. The Web Coverage Service supports electronic retrieval of geospatial data as “coverages” - that is, digital geospatial information representing space-varying phenomena. Open Geospatial Consortium (OGC) has already developed standard implementation specifications for web coverage service, and for those web coverage...
Alice and Bob possess strings x and y of length m and n respectively and want to compute the Levenshtein distance L(x, y) between the strings under privacy and communication constraints. The Levenshtein distance, or edit distance, has a dynamic programming formulation that solves a series of minimum-finding problems. Based on this formulation, there are known symmetric privacy-preserving protocols...
Multi-tenancy supporting becomes a basic characteristic of Software-as-a-Service (SaaS) operation. In multi-tenancy environment, tenant placement problem is critical for balance the database server workload. In this paper, we discuss how the cross-tenant data access affects the workload and how to optimize resource utilization in tenant placement process. This paper comes up with a SaaS tenant data...
As one of the key characteristics of software as a Service (SaaS), multi-tenancy aims to support massive customers by sharing application instances and databases. To achieve the high economies of scale, one of the most issues needing to be solved in the real industry is that, given a fixed number of nodes, how to optimally place on-boarding tenants to maximize the total supported number of tenants...
Alice and Bob possess sequences xn and yn respectively and would like to compute d(xn, yn) where d(?? , ??) is a distortion measure. However, Alice and Bob do not trust each other and do not wish to reveal their data to each other. This paper describes and analyzes a protocol that uses homomorphic encryption for secure calculation of some special distortion functions without revealing xn and yn. The...
Consider the following problem in secure multiparty computation: Alice and Bob possess integers x and y respectively. Charlie is a researcher who would like to compute the value of some function f(x, y). The requirement is that Charlie should not gain any knowledge about x and y other than that which can be obtained from the function itself. Moreover, Alice and Bob do not trust each other and should...
Multi-tenancy is one of key characteristics of the service oriented computing especially for Software as a Service (SaaS) to leverage economy of scale to drive down total cost of ownership for both service consumer and provider. This paper aims to study the technologies to build a cost-effective, secure and scalable multi-tenant infrastructure, especially in data tier. We first explore all the key...
Remote authentication is an important security control mechanism for Web-based services. Some remote authentication schemes based on smart cards were proposed. A new smart card based remote authentication scheme was proposed in this paper to enhance the robustness to meet the scalability requirement of most Web applications.
Remote user authentication is important to protect web-based services offered over the Internet. The use of smart cards was proposed to avoid the storage of password table in the server. Further protection of user information in the smart cards can be done by imposing a fingerprint verification mechanism. The Lee, Ryu and Yoo (LRY) scheme which provides both smart card based authentication and fingerprint...
A remote user authentication scheme based on the algorithm of Awasthi and Lal is proposed. The proposed scheme uses an iris-based biometric cryptographic technique to overcome the difficulty of managing security parameters in the Awasthi and Lal scheme. By combining remote user authentication and iris-based biometric cryptography, the proposed scheme achieves the security strength of the Awasthi and...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.