Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (15)
  • Open Access


    A Load-Fairness Prioritization-Based Matching Technique for Cloud Task Scheduling and Resource Allocation

    Abdulaziz Alhubaishy1,*, Abdulmajeed Aljuhani2

    Computer Systems Science and Engineering, Vol.45, No.3, pp. 2461-2481, 2023, DOI:10.32604/csse.2023.032217

    Abstract In a cloud environment, consumers search for the best service provider that accomplishes the required tasks based on a set of criteria such as completion time and cost. On the other hand, Cloud Service Providers (CSPs) seek to maximize their profits by attracting and serving more consumers based on their resource capabilities. The literature has discussed the problem by considering either consumers’ needs or CSPs’ capabilities. A problem resides in the lack of explicit models that combine preferences of consumers with the capabilities of CSPs to provide a unified process for resource allocation and task scheduling in a more efficient… More >

  • Open Access


    Light-Weighted Decision Support Framework for Selecting Cloud Service Providers

    Abdulmajeed Aljuhani1,*, Abdulaziz Alhubaishy2, Mohammad Khalid Imam Rahmani2, Ahmad A. Alzahrani3

    CMC-Computers, Materials & Continua, Vol.74, No.2, pp. 4293-4317, 2023, DOI:10.32604/cmc.2023.033893

    Abstract Multi-criteria decision making (MCDM) is a technique used to achieve better outcomes for some complex business-related problems, whereby the selection of the best alternative can be made in as many cases as possible. This paper proposes a model, the multi-criteria decision support method, that allows both service providers and consumers to maximize their profits while preserving the best matching process for resource allocation and task scheduling. The increasing number of service providers with different service provision capabilities creates an issue for consumers seeking to select the best service provider. Each consumer seeks a service provider based on various preferences, such… More >

  • Open Access


    Towards Developing Privacy-Preserved Data Security Approach (PP-DSA) in Cloud Computing Environment

    S. Stewart Kirubakaran1,*, V. P. Arunachalam1, S. Karthik1, S. Kannan2

    Computer Systems Science and Engineering, Vol.44, No.3, pp. 1881-1895, 2023, DOI:10.32604/csse.2023.026690

    Abstract In the present scenario of rapid growth in cloud computing models, several companies and users started to share their data on cloud servers. However, when the model is not completely trusted, the data owners face several security-related problems, such as user privacy breaches, data disclosure, data corruption, and so on, during the process of data outsourcing. For addressing and handling the security-related issues on Cloud, several models were proposed. With that concern, this paper develops a Privacy-Preserved Data Security Approach (PP-DSA) to provide the data security and data integrity for the outsourcing data in Cloud Environment. Privacy preservation is ensured… More >

  • Open Access


    An Integrated Framework for Cloud Service Selection Based on BOM and TOPSIS

    Ahmed M. Mostafa*

    CMC-Computers, Materials & Continua, Vol.72, No.2, pp. 4125-4142, 2022, DOI:10.32604/cmc.2022.024676

    Abstract Many businesses have experienced difficulties in selecting a cloud service provider (CSP) due to the rapid advancement of cloud computing services and the proliferation of CSPs. Many independent criteria should be considered when evaluating the services provided by different CSPs. It is a case of multi-criteria decision-making (MCDM). This paper presents an integrated MCDM cloud service selection framework for determining the most appropriate service provider based on the best only method (BOM) and technique for order of preference by similarity to ideal solution (TOPSIS). To obtain the weights of criteria and the relative importance of CSPs based on each criterion,… More >

  • Open Access


    Cloud Data Encryption and Authentication Based on Enhanced Merkle Hash Tree Method

    J. Stanly Jayaprakash1, Kishore Balasubramanian2, Rossilawati Sulaiman3, Mohammad Kamrul Hasan3,*, B. D. Parameshachari4, Celestine Iwendi5

    CMC-Computers, Materials & Continua, Vol.72, No.1, pp. 519-534, 2022, DOI:10.32604/cmc.2022.021269

    Abstract Many organizations apply cloud computing to store and effectively process data for various applications. The user uploads the data in the cloud has less security due to the unreliable verification process of data integrity. In this research, an enhanced Merkle hash tree method of effective authentication model is proposed in the multi-owner cloud to increase the security of the cloud data. Merkle Hash tree applies the leaf nodes with a hash tag and the non-leaf node contains the table of hash information of child to encrypt the large data. Merkle Hash tree provides the efficient mapping of data and easily… More >

  • Open Access


    Binary Multifold Encryption Technique for Complex Cloud Systems

    N. Ansgar Mary1,*, T. Latha2

    Computer Systems Science and Engineering, Vol.42, No.3, pp. 1199-1213, 2022, DOI:10.32604/csse.2022.022404

    Abstract Data security is a major cloud computing issue due to different user transactions in the system. The evolution of cryptography and cryptographic analysis are regarded domains of current research. deoxyribo nucleic acid (DNA) cryptography makes use of DNA as a sensing platform, which is then manipulated using a variety of molecular methods. Many security mechanisms including knowledge-based authentication, two-factor authentication, adaptive authentication, multifactor authentication and single password authentication have been deployed. These cryptographic techniques have been developed to ensure confidentiality, but most of them are based on complex mathematical calculations and equations. In the proposed approach, a novel and unique… More >

  • Open Access


    Deep Learning Based Intrusion Detection in Cloud Services for Resilience Management

    S. Sreenivasa Chakravarthi1,*, R. Jagadeesh Kannan2, V. Anantha Natarajan3, Xiao-Zhi Gao4

    CMC-Computers, Materials & Continua, Vol.71, No.3, pp. 5117-5133, 2022, DOI:10.32604/cmc.2022.022351

    Abstract In the global scenario one of the important goals for sustainable development in industrial field is innovate new technology, and invest in building infrastructure. All the developed and developing countries focus on building resilient infrastructure and promote sustainable developments by fostering innovation. At this juncture the cloud computing has become an important information and communication technologies model influencing sustainable development of the industries in the developing countries. As part of the innovations happening in the industrial sector, a new concept termed as ‘smart manufacturing’ has emerged, which employs the benefits of emerging technologies like internet of things and cloud computing.… More >

  • Open Access


    Cloud-IoT Integration: Cloud Service Framework for M2M Communication

    Saadia Malik1, Nadia Tabassum2, Muhammad Saleem3, Tahir Alyas4, Muhammad Hamid5,*, Umer Farooq4

    Intelligent Automation & Soft Computing, Vol.31, No.1, pp. 471-480, 2022, DOI:10.32604/iasc.2022.019837

    Abstract With the ongoing revolution in the Internet of Things (IoT) and cloud computing has made the potential of every stack holder that is connected through the Internet, to exchange and transfer data. Various users perceive this connection and interaction with devices as very helpful and serviceable in their daily life. However, an improperly configured network system is a soft target to security threats, therefore there is a dire need for a security embedded framework for IoT and cloud communication models is the latest research area. In this paper, different IoT and cloud computing frameworks are discussed in detail and describes… More >

  • Open Access


    Enhanced Trust Based Access Control for Multi-Cloud Environment

    N. R. Rejin Paul1,*, D. Paul Raj2

    CMC-Computers, Materials & Continua, Vol.69, No.3, pp. 3079-3093, 2021, DOI:10.32604/cmc.2021.018993

    Abstract Security is an essential part of the cloud environment. For ensuring the security of the data being communicated to and from the cloud server, a significant parameter called trust was introduced. Trust-based security played a vital role in ensuring that the communication between cloud users and service providers remained unadulterated and authentic. In most cloud-based data distribution environments, emphasis is placed on accepting trusted client users’ requests, but the cloud servers’ integrity is seldom verified. This paper designs a trust-based access control model based on user and server characteristics in a multi-cloud environment to address this issue. The proposed methodology… More >

  • Open Access


    Cloud Data Center Selection Using a Modified Differential Evolution

    Yousef Sanjalawe1,2, Mohammed Anbar1,*, Salam Al-E’mari1, Rosni Abdullah1, Iznan Hasbullah1, Mohammed Aladaileh1

    CMC-Computers, Materials & Continua, Vol.69, No.3, pp. 3179-3204, 2021, DOI:10.32604/cmc.2021.018546

    Abstract The interest in selecting an appropriate cloud data center is exponentially increasing due to the popularity and continuous growth of the cloud computing sector. Cloud data center selection challenges are compounded by ever-increasing users’ requests and the number of data centers required to execute these requests. Cloud service broker policy defines cloud data center’s selection, which is a case of an NP-hard problem that needs a precise solution for an efficient and superior solution. Differential evolution algorithm is a metaheuristic algorithm characterized by its speed and robustness, and it is well suited for selecting an appropriate cloud data center. This… More >

Displaying 1-10 on page 1 of 15. Per Page  

Share Link