The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The integration of multiple Unmanned Aerial Vehicles (UAVs) in civil applications have been attracted a lot of attentions in many scientific and engineering fields. Most of Multi-UAV systems have been characterized to be controlled by one Ground Control Station (GCS). However, in a case of an enormous number of UAVs with different assignments to each one or each group, one GCS cannot handle such a...
Recent years have witnessed a growing popularity of file synchronization systems. In this paper, we take a first step towards the understandings of a new Peer-to-Peer file synchronization system, Resilio Sync. Our real-world measurement identifies its unique features and reveals its potential fairness issues
In this paper, we investigate the problem of integrity auditing for cloud deduplication storage. Specifically, in addition to the outsourced data confidentiality, we also aim to ensure the integrity of the deduplicated cloud storage. With the existing works based on Provable Data Possession (PDP)/Proof of Retrievability (PoR), we are either required to rely on a fully trusted proxy server or inevitably...
The GENI network testbed was designed to enable experimentation with network protocols by offering the capability to construct virtual networks at the link layer (L2). GENI users build virtual networks in their GENI slices that span resources on multiple GENI aggregates, linked by L2 network circuits from network fabric providers (e.g., Internet2). This paper summarizes new features for cross-slice...
This paper introduces a new lightweight key exchange (KE) protocol which can be suitably implemented on resource-constrained smart devices to protect the privacy of communications in mobile networks. The most attractive features of this new KE protocol are provable security and lightweight. The security of this new KE protocol is based on the known impossibility of finding the unique values for variables...
Resilience is an essential property for critical networked environments such as utility networks (e.g. gas, water and electricity grids), industrial control systems, and communication networks. Due to the complexity of such networked environments achieving resilience is multi-dimensional since it involves a range of factors such as redundancy and connectivity of different system components as well...
Cloud computing is a growing technology that offers compute, storage and network resources as a service over the internet. It enables the individuals, clients or the enterprises to outsource their data and application software to the cloud server. The services are offered by a cloud service provider (CSP) and the users need to pay for what they use. There are many security concerns needs to be addressed...
Vehicular Adhoc Networks (VANETs) have been attracted a lot of research recent years. Although VANETs are deployed in reality offering several services, the current architecture has been facing many difficulties in deployment and management because of poor connectivity, less scalability, less flexibility and less intelligence. We propose a new VANET architecture called FSDN which combines two emergent...
IoT and/or WoT related technologies are prevailing these days. IoT technologies combine various network protocols to enable communications for user to control connected devices. However, to promote IoT technology, more attractive usage scenarios other than remote control functionality are needed. This paper suggests a novel framework to cooperate cloud-level IoT services on a smart device with the...
Cloud networking is an integral part of interconnected data centres operated in cloud environment. Cloud users heavily rely on cloud networking to transmit to and receive data from data centres. In this context, we explore how to provide cloud users with more controls so that they could ensure confidentiality of their data without using extensive public key encryption in cloud networking or sharing...
IT services realized within cloud environments often suffer from a lack of transparency. On the one hand this opacity with respect to operational practices protects business secrets of a cloud provider. On the other hand, if services from critical infrastructures run within clouds this opacity becomes a severe problem, e.g., for a later root cause analysis in case of failures. This paper presents...
Cloud storage security has attracted a lot of research interest in recent years with the large-scale application of cloud computing. Although there is considerable work on verifying the integrity of the outsourced data in the cloud, research on verifying the file search results returned from the cloud is still lacking. To fill this gap, in this paper, we tackle the verifiable file search problem and...
Tasklets provide means for lightweight distributed computing. Based on virtual machines, they allow to utilize excess capacity in cloud computing as well as integrate cloud resources into mobile computing. So far, the Tasklets architecture only provides a best-effort computing abstraction while using direct addressing of peers. However, a higher level of service is often desirable, as is found in...
When there is the necessity to send an email message to a big list of email destinations and following the valid standard Simple Mail Transfer Protocol (SMTP), it takes too much time to be delivered, because this message is sent one by one to each of the email destinations. If we talk also of an important message that all the recipients are in need to receive it in a timeless way, converting this...
Autonomic Clouds emerge as a result of applying four self-management properties of Autonomic Computing (self configuration, self-healing, self-optimization, and self-protection) in Cloud environment. In this way, Autonomic Cloud Computing is seen as a Cloud with autonomy to take important decisions about resource management, such as the resource allocation for incoming requests, and the optimization...
In this paper, we propose Accountable MapReduce, which forces each machine to be held responsible for its behavior. We set up a group of auditors to perform an Accountability Test (A-test) which will check all working machines and detect malicious nodes in real time.
Along with variant advantages, cloud storage also poses new security challenges. Potential users are reluctant to move important and sensitive data to cloud unless security challenges have been well addressed. This paper reports our on-going efforts to address three data security issues in cloud storage: repudiation, fairness, and roll-back attacks. We proposed a novel fair multi-party non-repudiation...
With the recent focus on cloud computing a new type of system topology came up: clusters in geographically distributed datacenters that are connected by high-latency networks. Current structured overlay networks (SONs) are not well prepared for such environments with heterogeneous network performance and correlated node failures. We show how the beneficial features of SONs, namely self-management,...
The following topics are dealt with: cloud computing; resource management; P2P networks; distributed storage; delay assurance; data security; wireless networks; QoS routing; TCP; and service management.
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.