The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Cloud data centers are critical infrastructures to deliver cloud services. Although security and performance of cloud data centers have been well studied in the past, their networking aspects are overlooked. Current network infrastructures in cloud data centers limit the ability of cloud provider to offer guaranteed cloud network resources to users. In order to ensure security and performance requirements...
Crowdsourcing coordinates a large group of workers online to do self-contained small tasks that are published by job requesters on a crowdsourcing platform. Many papers propose incentive strategies to motivate workers to participate in crowdsourcing. In this paper, we shift the focus from the workers to the job requesters by addressing two of their issues: how to design a good payment scheme to maximize...
As the International Data Corporation (IDC) estimated, public cloud services spending reached nearly 70B in 2015. While enterprise and public adoption of cloud applications and services is accelerating over time, security and performance remain as dominant concerns. As many studies try to address the security and performance of cloud data centers and cloud networks, it is unclear how to evaluate the...
Cluster computing is excellent for parallel computation. It has become increasingly popular. In cluster computing, a service level agreement (SLA) is a set of quality of services (QoS) and a fee agreed between a customer and an application service provider. It plays an important role in an e-business application. An application service provider uses a set of cluster computing resources to support...
Supervisory Control and Data Acquisition (SCADA) systems are critical assets to public utility and manufacturing organizations. These systems, although critical, are prone to numerous cyber security related threats and attacks. To combat such challenges, we propose a Dynamic Generated Containment System (DGCS), a moving target defense model as a method of threat evasion. Under the proposed approach,...
With the wide use of smart mobile devices and the popularity of mobile social networks (MSNs), direct marketing has been adopted by more and more companies to announce the news of their products first to a group of selected profitable customers and let them diffuse the news by "word-of-mouth" to other potential buyers to control the marketing cost. In this paper, we study the diffusion minimization...
Software Defined Networking (SDN) has the potential to enable novel security applications that support flexible, on-demand deployment of system elements. It can offer targeted forensic evidence collection and investigation of computer network attacks. Such unique capabilities are instrumental to network intrusion detection that is challenged by large volumes of data and complex network topologies...
The National Highway Traffic Safety Administration data show that drowsy driving causes more than 100,000 crashes a year. In order to prevent these devastating accidents, it is necessary to build a reliable driver drowsiness detection system which could alert the driver before a mishap happens. In the literature, the drowsiness of a driver can be measured by vehicle-based, behavior-based, and physiology-based...
Video surveillance data analysis plays a key role in homeland security where non-linear target tracking through distributed camera systems is often necessary. However, such a tracking problem poses a grand challenge because the subject of interest can be lost through obscuration. In this paper, we propose a novel approach to solving the track obscuration problem by f using optical measurements and...
This paper studies the problem of secure network bandwidth provisioning. Solving the problem plays a key role in the successful delivery of cloud services since secure network performance is a fundamental consideration in cloud computing design that is associated with service level agreement (SLA) An SLA is a contract agreed on between a customer and a network service provider. It defines the quality...
This paper studies the problem of resource management and placement for high performance clouds. It is concerned with the three most important performance metrics: response time, throughput, and utilization as Quality of Service (QoS) metrics defined in a Service Level Agreement (SLA). We propose SLA-based approaches for resource management in clouds. Specifically, we first quantify the metrics of...
Software-defined networking (SDN) and Open Flow have been driving new security applications and services. However, even if some of these studies provide interesting visions of what can be achieved, they stop short of presenting realistic application scenarios and experimental results. In this paper, we discuss a novel attack detection approach that coordinates monitors distributed over a network and...
The work in this paper studies the performance of Carrier Sense Multiple Access/Collision Avoidance (CSMA/CA) medium access control (MAC) mechanism in IEEE 802.11 DCF. From studying the propagation delay and clock synchronization differences between terminals, it is concluded that the slight timing differences, effectively a relative jitter, contributes to reducing the probability of collisions after...
Quality of Service (QoS) -- based bandwidth allocation plays a key role in real-time computing systems and applications such as voice IP, teleconferencing, and gaming. Likewise, customer services often need to be distinguished according to their service priorities and requirements. In this paper, we consider bandwidth allocation in the networks of a cloud carrier in which cloud users' requests are...
With the popularity of mobile devices, mobile social networks (MSNs) formed by people carrying mobile devices moving around and contacting each other have become a hot research topic these days. In this paper, we study a specific kind of MSNs that is formed impromptu (e.g. when people carrying mobile devices gather at some social events). We refer to them as Impromptu Mobile Social Networks (IMSNs)...
Cloud computing based delivery model has been adopted by end-users and enterprises to reduce IT costs and complexities. The ability to offload user software and data to cloud data centers has raised many security and privacy concerns over the cloud computing model. Significant research efforts have focused on hyper visor security and low-layer operating system implementations in cloud data centers...
Hands-on lab experience is often necessary and important, but it requires time and financial investment in computer and engineering curricula. The Global Environment for Network Innovations (GENI) is a real-world, repeatable, programmable, at-scale, virtual infrastructure for experiments in a variety of computer science areas such as networking, security, and distributed computing sponsored by National...
MapReduce has recently evolved in data-intensive parallel computing. It is a programming model for processing large data sets. The implementation of MapReduce typically runs on a large scale of cluster computing systems consisting of thousands of commodity machines. Such cluster computing systems are called MapReduce clusters. The high power consumption of MapReduce clusters has become a major concern...
Recent years have witnessed a rapid growth of wireless sensor network applications in civil and military environments. Radio interference tends to be a serious threat in such applications. Jamming attacks are a direct consequence of radio interference that an adversary may intentionally launch. While it is necessary to defend against jamming attacks in order for sensor communication channels to be...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.