The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
We develop an innovative PC2PC (personal computer to pervasive computing) system to enable the secure, robust and pervasive mobile workstyle. PC2PC server compresses the desktop screens of any virtualized system, and delivers the stream through any popular networks to PC2PC client remotely for stream decoding, rendering and end-user interaction (such as keyboard/mouse commands). We have implemented...
Mobility is a major problem in urban centers and vehicular networks have been a focus of study in the attempt to create applications focused on intelligent transport systems (ITS). With that in mind, ITS initiatives act as a possible solution to improve the functioning and performance of traffic systems, reducing congestion and increasing security for citizens. In this way, the present work presents...
If we send our data to the cloud, how do we know the cloud will not outsource our data to another cloud provider? We leverage the originator controlled access control policy (ORCON) which is originator focused and provides the opportunity to express consumer specific desires relating to our data in the cloud. We present a novel cloud trust policy framework which allows for the consumer to make more...
It is well known that the fragmentation of Android ecosystem has caused severe compatibility issues. Therefore, for Android apps, cross-platform testing (the apps must be tested on a multitude of devices and operating system versions) is particularly important to assure their quality. Although lots of cross-platform testing techniques have been proposed, there are still some limitations: 1) it is...
With the development of technology, smart phones and tablets had begun to integrate into the people's working, in order to protect the development of enterprisesmobile device management has become an essential part of the enterprise. This study designs and implements an enterprise mobile device management system that based on AOSP (Android Open Source Project) and SELinux, by analyzing the control...
We consider a system where a local cache maintains a collection of N dynamic content items that are randomly requested by local users. A capacity-constrained link to a remote network server limits the ability of the cache to hold the latest version of each item at all times, making it necessary to design an update policy. Using an age of information metric, we show under a relaxed problem formulation...
Middleboxes are pervasive in today's Internet as they are deployed for an increasing number of reasons. An example is the network address translation (NAT), one of the first task to be performed to cope with the lack of IPv4 addresses. Recently the landscape for NATs has become even more crowded, especially in mobile networks, mainly due to the impossibility of IPv6 to be a large-scale solution to...
The design and implementation of cryptographic systems offer many subtle pitfalls. One such pitfall is that cryptography may create unique identifiers potentially usable to repeatedly and precisely re-identify and hence track users. This work investigates TLS Client Certificate Authentication (CCA), which currently transmits certificates in plain text. We demonstrate CCA's impact on client traceability...
This paper is devoted to analysis of QoS parameters of WebRTC traffic presented for centralized videoconferencing system used for collaborative work. This system consists of a videoconference application, built according to the WebRTC architecture, and a telemetric system, built as the IoT environment. Tests were carried out for three locations of the conference bridge: in private cloud (the OpenStack...
The popularity of Location-Based Services (LBSs) has resulted in varieties of applications with more conveniences in our daily life. However, since mobile users need to submit some sensitive information to the untrusted LBS servers, they may lose their privacy while they are enjoying the provided social activities. In this paper, we first point out and define the Time-Sensitive Side Information (TSSI)...
This paper describes the experimentation on the Future Internet Research & Experimentation (FIRE) Long Term Evolution (LTE) testbeds for open experimentation (FLEX) facilities by combining the existing Evolved Node B (eNB) with an execution infrastructure. In this direction, LTE Edge Network Enhancement with Core Functionalities (LENA) project will enhance the LTE FLEX testbed with a Network Function...
In order to realize data sharing in mobile cloud computing, decentralized attribute-based encryption (ABE) has been widely concerned. However, the existing ABE schemes are full of flaws. First, the main drawback of ABE is that the computation cost of encryption and decryption are expensive. Second, the existing ABE schemes are inapplicable due to the inefficiency of user revocation. Besides, in a...
The quality of service of a mobile application is critical to ensure user satisfaction. Techniques have been proposed to accomplish adaptation of quality of service dynamically. However, there is still a limited understanding about how to provide a utility model for code execution. One key challenge is modeling the level of quality in the code execution that can be provisioned by the cloud. Since...
Cloud storage services, such as Dropbox, iCloud Drive, Google Drive, and Microsoft OneDrive, have greatly facilitated users’ synchronizing files across heterogeneous devices. Among them, Dropbox-like services are particularly beneficial owing to the delta sync functionality that strives towards greater network-level efficiency. However, when delta sync trades computation overhead for network-traffic...
Several utilities in Africa are planning to build Smart Distribution Management System (SDMS) to provide better customer service, improve reliability & quality of power supply and also improve commercial viability of their utilities. The SDMS architecture and design for each Utility has to be determined considering current operational status of distribution network, ability to mobilize resources...
Mobile crowdsourcing has received considerable attention as it enables people to collect and share large volume of data through their mobile devices. Since the accuracy of the collected data is usually hard to ensure, researchers have proposed techniques to identify truth from noisy data by inferring and utilizing the reliability of users, and allocate tasks to users with higher reliability. However,...
Crowdsourced content sharing has become a fast-growing activity in today's online social networks, where contents of interest are created by diverse source users and conveyed over the network as friends view and reshare. The rapid and boundless propagation in a mobile crowd however often creates severe bottlenecks on the server side and incurs significant energy and monetary costs on the mobile side,...
As a major branch of LBSs, geosocial networking services become popular. An important functionality of geosocial networking services is allowing people to find potential friends who have similar profile within close proximity and initiate communication with each other. However, in order to realize this functionality, most existing services require mobile users to reveal their profiles and location...
In mobile edge computing, a mobile or IoT device requests a nearby device to execute some functionality and return back the results. However, the executable code must either be pre-installed on the nearby device or be transferred from the requester device, reducing the utility or safety of device-to-device computing, respectively. To address this problem, we present a micro-service middleware that...
Mobile Crowdsensing is often used for involving large number of persons in distributed sensing experiments. In some cases, (e.g., online games, online sensing of sensitive data, etc.) privacy and security issues arise. Peer-to-peer networks can be effectively used to guarantee anonymity and solve the above mentioned issues. In this scenario, we describe an experiment of browser-based peer-to-peer...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.