The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Cloud computing enables resource-constrained endusers to outsource their computational tasks to the cloud in a flexible manner. One major concern of computation outsourcing is the security of the outsourced data as well as the results. In this paper, we propose a secure outsourcing scheme (SecMul) for one basic and expensive computation in cryptography, that is scalar multiplication of points on elliptic...
Process schedulers are part of the core functionality of an operating system (OS), and have been enhanced over the years to account for multiple cores in the processors and to support multi-threaded applications. In this study, we investigate the impact of the Linux scheduler's load-balancing algorithm on the performance of multi-threaded OpenSIPS (an open source SIP proxy server, SPS) running on...
This work examines the user-pair selection problem for distributed-input distributed-output (DIDO) wireless systems. A DIDO system refers to a network of densely deployed transmitter and receiver pairs, where the transmitters are connected to and coordinated by a DIDO server. The system sum rate is known to grow without bound as the number of transmitter-receiver pairs increases. However, when zero-forcing...
Wireless caching has been used to improve network performance and reduce bandwidth and energy consumption. In this paper, we study the issue of joint admission control and content caching for wireless access points with energy harvesting capability. Given limited energy supply, the access points, in a competitive environment, aim to maximize their payoff defined in terms of revenue by optimizing their...
A considerable percentage of worldwide electrical energy is consumed by information and communication technology. One significant element in this perspective are the data distribution systems via Content Delivery Networks (CDNs). We introduce a new model to compute the total energy consumption of CDNs which is based on a hierarchical Internet map and that takes into account the energy consumption...
Information-Centric Networking (ICN) or Content-Centric Networking (CCN), as it also known for, has recently been proposed as an evolutionary framework to propel the current Internet network architecture towards a content oriented design. Mobility-aware caching can be deemed as indispensable for improving the experience of mobile users. To this end, we propose a proactive caching with redirection...
The rapid development of cloud computing has raised big concerns over the high energy consumption of modern data centers. To satisfy the ever increasing data traffic needs, the energy consumption of data center network (DCN) also takes a significant proportion. The newly emerging technology, Software Defined Networking (SDN), which allows flexible control of network devices, brings a new opportunity...
Network slicing enables mobile virtual network operators (MVNOs) to lease network resources from a mobile network operator (MNO). The cloud radio access network (CRAN) architecture reduces the capital and operational expenditures for the MNO and also facilitates MVNOs running virtual machines on the cloud server. In this paper, we propose a beamforming scheme that coordinates multiple remote radio...
Carpooling, as an effective and eco-friendly travel mode, becomes a kind of public spontaneous behavior with multiple travellers sharing a vehicle to reduce individuals' travel cost, carbon emissions and traffic congestion. Although ubiquitous network access offers great convenience for travellers to find carpools, the safety becomes a big obstacle for them to accept this emerging travel mode. To...
This paper addresses an efficient data collection scheme based on the cooperative communications by using the UAV for wireless sensor network (WSN). Specifically, we propose a novel system architecture and MAC protocol, which is included how to select the target cooperative sensor node and which sensing data should be retransmitted by using the decided cooperative sensor node. In our evaluations,...
Oblivious RAM can hide a client's access pattern from an untrusted storage server. However current ORAM schemes incur a large communication overhead and/or client storage overhead, especially as the server storage size grows. We have proposed a matrix-based ORAM, M-ORAM, that makes the communication overhead independent of the server size. This requires selecting a height of the matrix; we present...
This paper presents a mechanism to use Traffic Analysis (TA) for identifying sources of tunneled video streaming traffic. The key idea is to probe encrypted and tunneled video streaming traffic at a client-side firewall so that the firewall can identify the traffic source using traffic analysis, and block or throttle traffic from that particular source. The key contribution in this paper is to evaluate...
We present an SDN-based orchestration system that enables automated and coordinated arrangement of both computing and network resources in virtualized DC environments. The orchestrator is validated through a set of simulations, as well as through experiments carried out in a real laboratory. Results show that the proposed orchestration system improves the service requests acceptance rate and the utilization...
Location-Based Service (LBS) is one of the fundamental and central functionalities of mobile social networks. Since users usually have to report their locations to the LBS providers while using services, the protection of user's location privacy poses a critical challenge. Although many existing approaches can preserve user's location privacy effectively, most of them must include and use the user's...
Attribute-Based Encryption (ABE) is a public key encryption scheme that allows users to encrypt and decrypt messages based on user attributes. In this paper, we consider the problem of constructing a ciphertext-policy attribute-based encryption (CP-ABE) scheme in a setting where the attributes distributor is also the owner of messages that are to be encrypted and shared. The CP-ABE scheme we propose...
The smart power grid integrates communication technology and intelligent power management to balance power generation and consumption. New stakeholders, e.g. households or prosumers, are connected to the smart grid and participate in e.g. Demand Response (DR). An important factor in this new environment is privacy. In this paper we present a Homomorphic Encryption Scheme (HES) for Distributed Load...
The rapid increase of portable devices providing a multitude of mobile applications have led to excessive cellular traffic demands and consequently to the overload of cellular networks. Recently, migrating this traffic by opportunistic vehicular networks has attracted a great interest and appeared as a promising solution. Indeed, only a limited set of vehicles (seeds) is selected to download objects...
Energy efficient prefetching systems for smart-phones can greatly reduce energy consumption and data transmission, and maintain the timely response when information is prefetched. However, the proxy structure of the system can cause security problem to reveal private information to the third party. The end-to-end encryption (SSL) in traditional prefetching systems cannot solve the security problem...
Virtualized access to M2M (Machine-to-Machine) devices can offer to operators various benefits in terms of hardware and management costs. However, it is often impeded by the inability to efficiently handle the traffic from the devices towards servers that are appropriate to serve as virtual hosts for the given devices. In this paper we present a solution which can be applied in a virtual Home Gateway...
Solving large-scale systems of linear equations (L-SLE) is a common scientific and engineering computational task. But such problem involves enormous computing resources, which is burdensome for the resource-limited clients. Cloud computing enables computational resource-limited clients to economically outsource such problems to the cloud server. However, outsourcing LSLE to the cloud brings great...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.