The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
With development of outsourcing computation, it is possible for clients with limited computing resources to outsource heavy computational tasks to the cloud server and thus relieve huge burden of the client. As continuous attention of delegation in recent years, requirements of security and efficiency are badly concerned undoubtedly, especially for matrix multiplication. Considering wide applications...
With the ever increasing data and computational demands from mobile users, heterogenous wireless networks (HetNets) and mobile cloud computing (MCC) have been advocated as a promising solution to meet these demands. Insufficient bandwidth is one of the most important challenges being faced by a successful implementation of the MCC technology due to heavy data traffic. The MCC implementation on HetNet...
The smart phones are used in many aspects of our life, shopping on the Internet, and creating and distributing many types of files. But these devices have many limitations including: short battery life time and limited storage and processing. Mobile Cloud Computing technology can help to overcome these limitations. Offloading technique reduces the power consumption and saves the mobile storage by...
LinkNYC is a first-of-its-kind urban communications network aiming to replace all payphones in the five boroughs of New York City with kiosk-like structures providing free super fast gigabit Wi-Fi to everyone. This work proposes and investigates the applicability of shifting LinkNYC from a traditional IP network to a content-centric network by upgrading all or a subset of their kiosks with standalone...
Recently, mobile cloud offloading is a promising technique to deal with the increasingly complex applications on mobile devices, meeting the ever- increasing energy requirements. However, cloud offloading with multiple mobile devices may cause considerable mutual interference, which may result in intolerable time delay and more energy consumption. In this paper, a novel offloading decision method...
Cloud robotics is an emerging paradigm that enables autonomous robotic agents to communicate and collaborate with cloud computing infrastructures. It further complements Internet of Things (IoT) to improve the performance of smart city applications. By offloading heavy data- intensive computation to the ubiquitous cloud, quality of service (QoS) guarantee can be ensured. Unlike their mobile counterpart,...
With the development of intelligent transport systems (ITS) and vehicular ad hoc network (VANET), vehicular cloud computing (VCC) has been proposed to bring essential and potential benefits, such as improving traffic safety and offering computational services to road users. To make such computational services reliable and secure, the computation results from the vehicular cloud (VC) should be verifiable...
We focus on the provision of Content-Delivery-Network-as-a- Service (CDNaaS) functionality for video distribution and, in particular, on how to appropriately decide on the amount of computing resources to allocate to a CDNaaS instance to satisfy Quality of Experience (QoE) and resource capacity constraints. Our work is put in the context of a telco cloud environment, which is open for content providers...
The Cloud Security Alliance lists data theft and insider attacks as critical threats to cloud security. Our work puts forth an approach using a train, monitor, detect pattern which leverages a stateful rule based k-nearest neighbors anomaly detection technique and system state data to detect inside attacker data theft on Infrastructure as a Service (IaaS) nodes. We posit, instantiate, and demonstrate...
In cloud market, cloud providers offer diverse service options, including on-demand instances and reserved instances. Generally reserved instance price is cheaper than on-demand instance, but excessive reservation may result in high capacity underutilization. To improve resource utilization rate and reduce providers' service cost, a steady broker federation is necessary to propose. Broker federation...
Mobile cloud computing is increasingly being used in recent times to offload parts of an application to the cloud to reduce its finish time. However, quality of offloading decisions depend on network conditions and hence many offloading solutions assume that MAC layer retransmissions will tackle transient frame errors. This can lead to suboptimal solutions, as well as, degrade service level guarantee...
Data access control is a challenging issue in cloud storage. Ciphertext-Policy Attribute-based Encryption (CP-ABE) is a potential cryptographic technique to address the above issue, which is able to enforce data access control based on users' permanent characteristics. However, in some scenarios, access policies are associated with users' temporary conditions (such as access time and location) as...
Cloudlet is a new paradigm in mobile cloud computing to provide resources to nearby mobile users via one-hop wireless connections. In this study, we leverage the social tie structure among mobile users to achieve mutual-beneficial computation offloading decision making and hence enhance the system-wide performance.Drawing on a social group utility maximization (SGUM) framework, we cast users' decision...
The growing density of cellular users is placing an unprecedented demand on radio spectrum. Cognitive cellular networks can alleviate spectrum demand through dynamic spectrum access. In order to be fully functional, cellular users not only need spectrum access but also require network access. However, a cellular carrier grants network access only to accredited users. In this paper, we focus on the...
To integrate Software Defined Networking (SDN) in the envisioned 5G system, a separation of the control and user data plane functions of the Evolved Packet Core (EPC) is required. This separation will impact mainly the functions available at the Serving GateWay (SGW) and Packet data GateWay (PGW) elements, and will result in two new entities; i.e. the S/PGW-C and S/PGW-U (PGW-C and PGW-U). The S/PGW-C...
Abstract-Public-cloud providers do not disclose quantitative information about the performance of their inter- datacenter networks in spite of their importance and of the growing interest they are attracting. In this paper we propose an analysis of the inter-datacenter network of the two leading providers-Amazon Web Services and Microsoft Azure- only leveraging active monitoring approaches and thus...
In medical emergency situations, fair distribution of resources in a multi-tenant scenario is crucial. In such resource-constrained situations, these organizations may behave in a non-cooperative and selfish manner to maximize their individual incentives at the cost of the overall system welfare. Existing research works on dynamic resource allocation, have mostly assumed that the participating agents...
In this paper, we address the problem of downlink resource allocation and admission control for an Orthogonal Frequency Division Multiple Access (OFDMA)-based Cloud Radio Access Network (C-RAN). Specifically, we formulate the resource allocation and admission control for mobile users in C-RAN as an optimization problem, subject to constraints on mobile users data rate requirements, maximum transmission...
Network Function Virtualization (NFV) is promising to lower the network operator's capital expenditure and operational expenditure by replacing proprietary hardware-based network equipment with software-based virtual network functions that can be consolidated into telecom clouds. In particular, NFV provides an efficient way to deploy network services using service function chains that consist of a...
Cloud computing is expected to keep growing and therefore more and more data centers are being built. In parallel of this increasing amount of data centers, there are also more cloud providers. On one side, this heterogeneity in the cloud market allows a user to choose and change its cloud provider. On the other side, thanks to this growing number of cloud providers, it is now possible to have small...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.