The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The use of secure HTTP calls is a first and critical step toward securing the Android application data when the app interacts with the Internet. However, one of the major causes for the unencrypted communication is app developer's errors or ignorance. Could the paradigm of literally repetitive and ineffective emphasis shift towards emphasis as a mechanism? This paper introduces emphaSSL, a simple,...
With development of outsourcing computation, it is possible for clients with limited computing resources to outsource heavy computational tasks to the cloud server and thus relieve huge burden of the client. As continuous attention of delegation in recent years, requirements of security and efficiency are badly concerned undoubtedly, especially for matrix multiplication. Considering wide applications...
Distributed machine learning is becoming increasingly popular for large scale data mining on large scale cluster. To mitigate the interference of straggler machines, recent distributed machine learning systems support flexible model consistency, which allows worker using a local stale model to compute model update without waiting for the newest model, while limiting the asynchronous step in a certain...
In this paper, we introduce MVPN, a framework for building secure Virtual Private Networks (VPNs) with a novel Mobile IPv6 based Moving Target Defense strategy. Our approach aids in combating remote attacks against a VPN server. By eliminating the static address of the server, we make it difficult for an attacker to find the server. The server''s address is randomly changed at a certain interval creating...
We focus on the provision of Content-Delivery-Network-as-a- Service (CDNaaS) functionality for video distribution and, in particular, on how to appropriately decide on the amount of computing resources to allocate to a CDNaaS instance to satisfy Quality of Experience (QoE) and resource capacity constraints. Our work is put in the context of a telco cloud environment, which is open for content providers...
Crowdsensing recently attracts great attention from both industry and academia. By fusing and analyzing multi- dimensional sensing data collected from crowdsensing users, it is possible to support health caring, environment mentoring, traffic mentoring and social behavior mentoring. Nonetheless, how to preserve users' data privacy during data fusing, e.g., data aggregation, has been rarely discussed...
Mobile cloud computing is increasingly being used in recent times to offload parts of an application to the cloud to reduce its finish time. However, quality of offloading decisions depend on network conditions and hence many offloading solutions assume that MAC layer retransmissions will tackle transient frame errors. This can lead to suboptimal solutions, as well as, degrade service level guarantee...
Wireless caching at users' devices in mobile social network is considered to be a promising solution to alleviate backhaul overload in future wireless networks. However, most of the current works propose caching schemes based on heuristic reasoning and intuition with poor performance or high complexity which are impractical due to individual devices' computing capacity restriction. In this paper,...
Data access control is a challenging issue in cloud storage. Ciphertext-Policy Attribute-based Encryption (CP-ABE) is a potential cryptographic technique to address the above issue, which is able to enforce data access control based on users' permanent characteristics. However, in some scenarios, access policies are associated with users' temporary conditions (such as access time and location) as...
With the increasing popularity of cloud computing, the huge amount of energy consumed by data centers has gained much attention. Current proposals address the energy efficiency problem by two major methods: optimizing the allocation of physical servers and network elements (routers or switches). In order to improve resource utilization and minimize the energy consumption, the former method focuses...
The capability of mobile devices to use multiple interfaces to support a single session is becoming more prevalent. Prime examples include the desire to implement WiFi offloading and the introduction of 5G. Furthermore, an increasing fraction of Internet traffic is becoming delay sensitive. These two trends drive the need to investigate methods that enable communication over multiple parallel heterogeneous...
Network Function Virtualization along with Network Service Chaining envision a reduction in the respective cost that end users, service providers, and network operators are experiencing, while providing complete and high quality services. However, the vast range of available services and the service on-demand model, creates dynamic traffic conditions that necessitates a flexible and automatic network...
Resource abstraction aims at enabling flexible allocation of capacity to serve demands by aggregating physical resources taken out of distributed resource pools accessible via dedicated gateways. This paradigm sits at the heart of many networking models including resource virtualization and other cloud computing. In this paper, we show this generic problem can be modeled by combining and extending...
Mobile-edge computing (MEC) has recently emerged as a promising paradigm to liberate mobile devices from increasingly intensive computation workloads, as well as to improve the quality of computation experience. In this paper, we investigate the tradeoff between two critical but conflicting objectives in multi-user MEC systems, namely, the power consumption of mobile devices and the execution delay...
In this paper, we propose to learn LIfestyles of mobile users via mobile Phone Sensing (LIPS), and we develop a system and algorithms to realize this idea. First, we present the workflow and architecture of our system, LIPS. Combining both unsupervised and supervised learning, we propose a hybrid scheme for lifestyle learning, which consists of two parts: characterization and prediction. Specifically,...
Nowadays people are carrying their mobile devices wherever they go, and as social beings they interact with others all day long. Thus, by exploiting this massive use of smart devices they provide a way to be co-located using only their captured environmental radio signals. In this paper, we design a co-location system that finds groups of people, in real-time, with high accuracy, by exploiting the...
We propose a high network utilization CONGestion- Aware load balancing approach, Multi-hop CONGA. It aims at improving the performance of handling traffic asymmetry, which happens occasionally in data centers. It leverages regular Clos topology and overlays for virtualization. In this paper, we schedule at the unit of flowlet, which is the burst of packets belonging to a flow, and make routing decisions...
In big data clusters, task dispatchers assign arriving tasks to one of many workers (servers) for load balancing. Workers schedule task executions for rapidly completing queueing tasks. Both dispatchers and workers are important for optimizing task/job-completion-time (TCT/JCT). Current dispatchers probe loads on workers before assigning every task/job, which incurs expensive message overheads and...
Vehicular cloud, which is constituted by gathering the under-utilized on-board capabilities on the road, has received considerable attention in recent years. In this paper, we propose a novel secure and privacy-preserving incentive mechanism in vehicular cloud, which employs the Stackelberg Game to model the interaction between the leader and follower vehicles. With the proposed incentive mechanism,...
Information-Centric Networking (ICN) has emerged as a promising way for the efficient content delivery over the Internet, and it can be seen as a super large-scale caching distributed system. However, as one of the most important problems, the cache consistency issue, which refers to whether cached contents in routers are outdated, is still not investigated thoroughly in ICN. Thus, in this paper,...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.