The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
After the success of the previous edition CloudTech'15, we are very glad to announce CloudTech'16, the Second International Conference of Cloud Computing Technologies and Applications. This is one of the most successful IEEE technically co-sponsored events on Cloud computing technologies and applications organized here in this wonderful imperial Moroccan city of Marrakech.
The adoption of cloud computing is accelerating among health care providers, as they realize the limitations of traditional systems of computerized medical file. Many obstacles must be overcome, however, with regard to respect for privacy and patient safety. In order to ensure the respect for privacy, an encryption of data is required. An encryption that allows to compute over encrypted data without...
The storage service is one of the most popular services in the cloud. This service allows outsourcing of data storage in service provider servers while having the ability to access it from different devices. Moreover, this service provides the ability to make data-sharing operations with one or more customers, which requires the implementation of a method to maintain data confidentiality while providing...
Cloud computing offers a simple way to provide access to servers, storage, databases and a broad set of application services over the Internet. Its popularity is growing spectacularly. Consequently, there is a need for strong authentication schemes, offering besides privacy also anonymity to the users during these actions. Therefore, this paper presents two userfriendly authentication protocols, able...
Elasticity is a key feature of cloud computing where resources are allocated and released according to user demands. Reactive auto scaling, in which the scaling actions take place just after meeting the triggering thresholds, suffers from several issues like risk of under provisioning at peak loads and over provisioning during other times. Proactive scaling solutions, where future resource demand...
In this work we study the I/O performance of long, sequential workloads that mimic those of Big Data applications, to understand the implications of system virtualization on data-intensive frameworks such as Apache Hadoop and Spark, which are frequently run in clusters of Virtual Machines (VMs). We do so through an experimental measurement campaign that collects low-level traces and metrics, to show...
Cloud computing systems are often seen as dynamic pools of Virtual Machines (VM) installed on provider side physical machines to be offered to Cloud users. Cloud customers could use these Virtual Machines as services, platforms or as a whole infrastructure. However, in practice the infrastructure of a computing Cloud includes several levels, such as virtual gateways, virtual clusters and virtual nodes...
This paper deals with the hybridization of Global Positioning System (GPS) with an Inertial Navigation System (INS) and an Odometer, for land vehicle navigation, and more precisely with the calibration of inertial sensor errors. We focus here on the complementary characteristics of GPS and odometer to provide periodic corrections to Inertial Navigation System alternatively in different environmental...
Despite the growing importance of mobile crowdsourcing applications and cloud computing, little is known about the actual performances of web services deployed within public cloud computing platforms. In order to provide an assessment of the achievable performances in such scenario, we design and implement a back-end general architecture for mobile applications requiring crowdsourcing. We deploy our...
The easy deployment of wireless sensors allows the development of context-aware applications that could react to the environment changes and users' preferences. For example, information extracted from data gathered using mobile phones and embedded computers in buses and taxis could be used to understand city dynamics in real-time and therefore take mitigation actions. However, gathering and real-time...
Cloud computing has transformed the standard model of service provisioning, allowing the delivery of on-demand services over the Internet. With its inherent requirements for elastic scalability and a pay-as-you-go pricing model, an additional level of complexity is added to its Quality of Service (QoS) management. This has made service provisioning more prone to performance anomalies due to the large-scale...
Cloud computing is becoming increasingly a magical solution and a widely adopted technology for delivering services over the Internet thanks to its diverse benefits, including services on demand, reducing costs, sharing and configuring computing resources, and high services scalability and flexibility. However, with the emergence of this technology, the concept of security and privacy has become a...
Cloud-based medical image is a promising technology. In fact, it provides cost-efficient services and allows collaboration between healthcare ecosystem. Despite its multiple advantages, migrating to this new paradigm arises several challenges: technical, legal and managerial. Recently, the healthcare sector has been interested in adopting this technology to improve the quality of medical care. In...
In this paper, we describe a texture analysis which plays an important role in face analysis. Many studies have used texture image to characterize a face. Local Binary Pattern (LBP) coding is a state-of-the-art technique characterized by it's simplicity and efficiency. In the proposed method, we associate Local Binary Pattern with integral image representation, which permits to evaluate the sum of...
Recently, with the rapid growth of distributed computing, high performance computing and cloud services, trust issue is a primary concern and become a hot topic. Furthermore, the lack of trust comes from a lack of transparency, loss of control over data and unclear security assurances, which impedes its large-scale adoption. To fill these gaps, the authors have dissected the challenges related to...
Task scheduling is one of the most challenging aspects in cloud computing nowadays, which plays an important role to improve the overall performance and services of the cloud such as response time, cost, makespan, throughput etc. Mostly a non-optimal task scheduling algorithm can be a key tool in over utilization or under utilization of cloud resources. In order to solve these problems, this paper...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.